SlideShare a Scribd company logo
REAL-TIMEWEB APPLICATION PROTECTION.
A W F S E R I E S D A T A S H E E T
WEB APPLICATION
FIREWALL
AWF Series Web application firewalls provide industry-leading
Web application attack protection, ensuring continuity and high
availability of Web applications while reducing security risks.
Array’s AWF Series Web application firewalls extend beyond traditional firewalls and intrusion detection systems
(IDSs) to provide comprehensive protection for business-critical Web applications. The AWF Series not only detects
the complex Web application attacks of today, but also blocks the attack traffic in real time without affecting the
normal flow of business data traffic. In addition, the AWF Series provides extremely fine-grained attack detection
and analysis capabilities while protecting against the most common Web application threats including SQL injection
attacks, Web page tampering, Web site malicious code, and disclosure of sensitive information.
AWF SERIES DATASHEET
•	 Web page tamper-proofing through centralized
management and control of all Web tamper-
proofing endpoints, with content monitoring,
synchronization and publish functions
•	 Customizable feature library and flexible
configuration model to meet the needs of
complex Web applications
•	 Guided configuration with exception rules to
reduce installation complexity and errors
•	 Comprehensive management portal provides
visualized monitoring at the system, hardware,
attack and tamper-proofing levels
•	 Role-based authentication at the administrator
level to secure configuration and data and allow
for auditing
•	 Logging and log analysis with graphical
representation and easy export of logs and
statistics
Highlights & Benefits
•	 Next-generation Web application firewall
operates on multiple levels to protect vital Web
servers and applications
•	 Continuous scanning for Web application
vulnerabilities and for SQL injection or cross-site
scripting and other threats within applications
•	 DDoS protection via brute force attacks
mitigation
•	 Active incident response including detection,
blocking and prevention of intrusion and
other attacks, including zero-day detection by
abnormal behavior analysis techniques
•	 Post-incident diagnosis and analysis of security
issues to reduce overall security risk and
maintain Web site credibility
•	 Highly refined rules library includes sophisticated
protections such as information disclosure
protection, embedded Trojan detection and
protection, protocol integrity detection, keyword
filtering and much more
•	 Comprehensive Layer 1 through 7 protection
for Web servers at the network level, including
packet-filtering, URL-based access control,
blacklist/whitelist and other protection functions
AWF SERIES DATASHEET
Next-Generation WAF Protection
As applications have increasingly moved to the Web,
the servers that host critical business applications
have become targets of malicious attacks, tampering
and other security incidents that can compromise
intellectual property, customer information and other
sensitive business data.
Array’s AWF Series Web application firewalls protect
against the most widespread attack mechanisms
while providing active incident response to halt
hackers in their tracks, with post-incident analysis
and diagnosis to provide guidance for strengthening
servers against future attacks.
Continuous Threat Scanning
The AWF Series continuously scans Web application
servers for known vulnerabilities, and scans the
applications for the existence of SQL injection or
cross-site script vulnerabilities as well.
Active Incident Response
During a security incident, the AWF Series
effectively detects, blocks, and prevents further
intrusion, SQL injection, cross-site scripting and
other types of Web application attacks.
Post-Incident Diagnosis
and Analysis 
After a security incident, the AWF Series
diagnoses for critical security issues such as
Web site tampering and malicious code, allowing
administrators to reduce security risk and maintain
the Web servers’ credibility.
Sophisticated Rules Library
Based on years of network security research, the
AWF Series’ highly refined rules library provides a
wide variety of protections, including:
•	 Preventing attacks including SQL injection,
cross-site attack, cookie injection, malicious
code, buffer overflow and other variant Web
server attacks
•	 Information disclosure prevention
•	 Web site embedded Trojan protection and
detection
•	 Protocol integrity detection
•	 CSRF anti-stealing link
•	 Integrity inspection of HTTP RFC protocol
•	 Keyword filtering
Comprehensive Server Protection
The AWF Series includes key network firewall
features to provide comprehensive Layer 1
through 7 protection for Web application servers.
These features include packet filtering, blacklist/
whitelist, URL-based access control and other basic
protection functions at the network layer.
Web Page Tamper-Proofing
To support Web page tamper-proofing, the AWF
Series supports centralized management and
control of all Web page tamper-proofing endpoints,
and provides content monitoring, synchronization
and publishing functions. Because it uses driver-
level folder protection technology, and uses an
event-triggered mechanism, it occupies very few
system resources.
Each time a user accesses a protected Web page,
such as a login page, the AWF Series checks
the page integrity before permitting access, thus
preventing access to contaminated pages.
AWF SERIES DATASHEET
Guided Configuration
Configuration of Web application firewalls has been
notoriously more complex than that of network-level
firewalls. The AWF Series provides configuration
guidance in order to assist network administrators
in accurately configuring and setting up the Web
application firewall. For example, false alarms are
frequently encountered during set-up. The AWF
Series supports generation of exception rules, with
a single click on the corresponding strategy that is
generating the false alarm.
Visualized Management
The AWF Series’ powerful equipment monitoring
functions allow administrators to monitor, in real
time, the associated equipment’s working condition,
attack threats and other system information. This
capability allows timely discovery and elimination of
network problems, promoting stable operation.
Role-Based Authentication
Three separate administration roles are supported
within the AWF Series: Administrator, account
administrator and audit administrator. Assignment
of distinct roles can assist in meeting quality
standards and audit needs of regulatory and other
requirements.
Logging and Log Analysis
The AWF Series’ logging function records the admin,
Web site access, attack, Web page tamper-proofing,
audit and other logs. For applications requiring high
volumes of logs or long-term logging, an external log
server can be supported.
The advanced log analysis system displays multiple
types of logs in graphical format, and supports
export of the logs in various formats to facilitate
collection fo statistics.
AWF Series Appliances
The AWF Series features three models to choose
from, supporting from four to eight 1 GbE or 10
GbE interfaces and from 800K to 2M concurrent
connections per second, depending on model.
The AWF appliances leverage next-generation
processors and memory, energy-efficient
components and 10 GigE to create solutions
purpose-built for scalable Web application security.
Available for common hypervisors, the vAWF virtual
appliances are ideal for organizations seeking to
benefit from the flexibility of virtual environments,
offer infrastructure services and new elastic
business models or evaluate Array application
delivery with minimal risk and up-front cost.
AWF SERIES DATASHEET
Feature Specifications
Topology Bridge mode – Transparent/reverse proxy mode (inline) – Router mode –
Reverse proxy mode (inline) – Passive mode
Static IP – Bonding (Link Aggregation)/LCAP – Bridge – Trunk (802.1q) – Policy-
based route – ARP – DNS server
Networking
Management
Web Security
Networking Security
Logging 
Monitoring
Reporting
Topology and Networking
Protection against cookie injection, command injection, XSS, etc. – Blocking
invalid file upload, such as Web shell upload – Filtering sensitive words in HTTP
request and response body – Blocking information leakage, malicious code, weak
password attacks, etc. – Limiting the action of Web crawler and scanner – Traffic
blocking: redirection to error page, TCP reset, redirect to URL; block source
address, etc. – HTTPS offloading and acceleration – Support zero-day attack
detection by abnormal behavior analysis technologies – Support positive security
model to configuration automatically by self-learning – Support the protection
of multiple virtual hosts on one server – Strict protocol validation – Brute force
attacks mitigation – Anti-DDoS
Access Control List – IP blacklist/whitelist – URL blacklist/whitelist
Security
Structured system log – SNMP (v2/v3) – CPU usage – Memory usage – Disk
usage – HTTP CC number – I/O usage
Support log query by year, month and week – Support log query by attack time,
site, page, attack type and time, etc. – Support report exported as .pdf, .html,
.csv and .doc
Logging, Monitoring  Reporting
AWF SERIES DATASHEET
Product Specifications
AWF Series Model 1500 3500 5500
Fixed I/O 6x1GbE 6x1GbE 2x1GbE
Optional LAN Interfaces
(1GbE Copper)
4 4 or 8 4 or 8
Optional LAN Interfaces
(10GbE Fiber)
4xSFP 4xSFP, 8xSFP 4xSFP, 8xSFP, 2xXE
Bypass Pair 2 2 (up to 4) 2 (up to 6)
Maximum Throughput
(Single 32KB HTML page)
600Mbps 1.2Gbps 5Gbps
L3 Maximum Throughput
(Mixed Traffic)
2.5Gbps 4Gbps 9Gbps
Maximum Requests per
Second (Keep-Alives Enabled)
10,000 30,000 60,000
Maximum Concurrent
Connections
800K 1M 2M
Number of Protected Web
Servers
32 256 1024
Dimensions 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7 W x 16.9” D x 3.5” H
Maximum Power Draw 250W 350W 350W
Power Supply Redundancy No Yes Yes
Weight 6.6 lbs. 6.6 lbs. 17.6 lbs.
Environmental Operating Temperature: 5º to 40ºC. Operating Humidity: 20% to 90%
Supported Hypervisors (64-bit only) Virtual Machine Requirements
vAWF
vAWF virtual
application delivery
controllers support
all AWF features.
VMware ESXi 4.1 or Later
KVM 1.1.1-1.8.1 or later
2 Virtual CPUs
2GB RAM
AWF SERIES DATASHEET
1371 McCarthy Blvd. Milpitas, CA 95035 | Phone: (408) 240-8700 Toll Free: 1-866-MY-ARRAY | www.arraynetworks.com
VERSION: NOV-2015-REV-A
© 2015 Array Networks, Inc. All rights reserved. Array Networks and the Array Networks logo are trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or
registered service marks are the property of their respective owners. Array Networks assumes no responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise revise
this publication without notice.
Ad

More Related Content

What's hot (19)

OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
OWASP Top 10 2017
OWASP Top 10 2017OWASP Top 10 2017
OWASP Top 10 2017
Siddharth Phatarphod
 
OWASP -Top 5 Jagjit
OWASP -Top 5 JagjitOWASP -Top 5 Jagjit
OWASP -Top 5 Jagjit
Jagjit Singh Brar
 
Anatomy Web Attack
Anatomy Web AttackAnatomy Web Attack
Anatomy Web Attack
Kelly Speiser
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
Dilum Bandara
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
Rich Helton
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
Security Innovation
 
Owasp 2017 oveview
Owasp 2017   oveviewOwasp 2017   oveview
Owasp 2017 oveview
Shreyas N
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
Securing Traditional Workloads on AWS
Securing Traditional Workloads on AWSSecuring Traditional Workloads on AWS
Securing Traditional Workloads on AWS
Tim Feng
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
Sophos Benelux
 
OWASP TOP 10
OWASP TOP 10OWASP TOP 10
OWASP TOP 10
Robert MacLean
 
Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017
Sampath Bhargav Pinnam
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
Alert Logic
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
Douglas Gourlay
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
ibrahimumer2
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
Dilum Bandara
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
Rich Helton
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Owasp 2017 oveview
Owasp 2017   oveviewOwasp 2017   oveview
Owasp 2017 oveview
Shreyas N
 
Securing Traditional Workloads on AWS
Securing Traditional Workloads on AWSSecuring Traditional Workloads on AWS
Securing Traditional Workloads on AWS
Tim Feng
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
Sophos Benelux
 
Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017
Sampath Bhargav Pinnam
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
Alert Logic
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
Douglas Gourlay
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 

Similar to Web Application Firewall (WAF) Data Sheet - Array Networks (20)

WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
Array Networks
 
Why Do You Need a Web Application Firewall?
Why Do You Need a Web Application Firewall?Why Do You Need a Web Application Firewall?
Why Do You Need a Web Application Firewall?
BORNSEC CONSULTING
 
Web Access Firewall
Web Access FirewallWeb Access Firewall
Web Access Firewall
BalaBhaskaraRao CEH,CCNA Security,CHFI,Qualys Specialist
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDots
GlobalDots
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
Aju Thomas
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
Web Application Firewall. Enhancing web security in the digital age.pdf
Web Application Firewall. Enhancing web security in the digital age.pdfWeb Application Firewall. Enhancing web security in the digital age.pdf
Web Application Firewall. Enhancing web security in the digital age.pdf
PriyaSharma401031
 
Forti web
Forti webForti web
Forti web
Lan & Wan Solutions
 
Forti web
Forti webForti web
Forti web
Lan & Wan Solutions
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
F5 Networks
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
Компания ИНТРО
 
The Top 11 Powerful Web Application Firewalls.pptx
The Top 11 Powerful Web Application Firewalls.pptxThe Top 11 Powerful Web Application Firewalls.pptx
The Top 11 Powerful Web Application Firewalls.pptx
BluechipComputerSyst
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
Philippe Gamache
 
375 378
375 378375 378
375 378
Editor IJARCET
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 
Secure your web application with an open source WAF.pdf
Secure your web application with an open source WAF.pdfSecure your web application with an open source WAF.pdf
Secure your web application with an open source WAF.pdf
PriyaSharma401031
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers 
Jeff Suratt
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
Scott Sims
 
Benefits of web application firewall (1).pdf
Benefits of web application firewall (1).pdfBenefits of web application firewall (1).pdf
Benefits of web application firewall (1).pdf
PriyaSharma401031
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
Array Networks
 
Why Do You Need a Web Application Firewall?
Why Do You Need a Web Application Firewall?Why Do You Need a Web Application Firewall?
Why Do You Need a Web Application Firewall?
BORNSEC CONSULTING
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDots
GlobalDots
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
Aju Thomas
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
Web Application Firewall. Enhancing web security in the digital age.pdf
Web Application Firewall. Enhancing web security in the digital age.pdfWeb Application Firewall. Enhancing web security in the digital age.pdf
Web Application Firewall. Enhancing web security in the digital age.pdf
PriyaSharma401031
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
F5 Networks
 
The Top 11 Powerful Web Application Firewalls.pptx
The Top 11 Powerful Web Application Firewalls.pptxThe Top 11 Powerful Web Application Firewalls.pptx
The Top 11 Powerful Web Application Firewalls.pptx
BluechipComputerSyst
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
Philippe Gamache
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 
Secure your web application with an open source WAF.pdf
Secure your web application with an open source WAF.pdfSecure your web application with an open source WAF.pdf
Secure your web application with an open source WAF.pdf
PriyaSharma401031
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers 
Jeff Suratt
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
Scott Sims
 
Benefits of web application firewall (1).pdf
Benefits of web application firewall (1).pdfBenefits of web application firewall (1).pdf
Benefits of web application firewall (1).pdf
PriyaSharma401031
 
Ad

More from Array Networks (20)

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Array Networks
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
Array Networks
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
Array Networks
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
Array Networks
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
Array Networks
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
Array Networks
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
Array Networks
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
Array Networks
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
Array Networks
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
Array Networks
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
Array Networks
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
Array Networks
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
Array Networks
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
Array Networks
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
Array Networks
 
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Array Networks
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
Array Networks
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
Array Networks
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
Array Networks
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
Array Networks
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
Array Networks
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
Array Networks
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
Array Networks
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
Array Networks
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
Array Networks
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
Array Networks
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
Array Networks
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
Array Networks
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
Array Networks
 
Ad

Recently uploaded (20)

AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and MLGyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
Gyrus AI
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Play It Safe: Manage Security Risks - Google Certificate
Play It Safe: Manage Security Risks - Google CertificatePlay It Safe: Manage Security Risks - Google Certificate
Play It Safe: Manage Security Risks - Google Certificate
VICTOR MAESTRE RAMIREZ
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and MLGyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
Gyrus AI
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Play It Safe: Manage Security Risks - Google Certificate
Play It Safe: Manage Security Risks - Google CertificatePlay It Safe: Manage Security Risks - Google Certificate
Play It Safe: Manage Security Risks - Google Certificate
VICTOR MAESTRE RAMIREZ
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 

Web Application Firewall (WAF) Data Sheet - Array Networks

  • 1. REAL-TIMEWEB APPLICATION PROTECTION. A W F S E R I E S D A T A S H E E T WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity and high availability of Web applications while reducing security risks. Array’s AWF Series Web application firewalls extend beyond traditional firewalls and intrusion detection systems (IDSs) to provide comprehensive protection for business-critical Web applications. The AWF Series not only detects the complex Web application attacks of today, but also blocks the attack traffic in real time without affecting the normal flow of business data traffic. In addition, the AWF Series provides extremely fine-grained attack detection and analysis capabilities while protecting against the most common Web application threats including SQL injection attacks, Web page tampering, Web site malicious code, and disclosure of sensitive information.
  • 2. AWF SERIES DATASHEET • Web page tamper-proofing through centralized management and control of all Web tamper- proofing endpoints, with content monitoring, synchronization and publish functions • Customizable feature library and flexible configuration model to meet the needs of complex Web applications • Guided configuration with exception rules to reduce installation complexity and errors • Comprehensive management portal provides visualized monitoring at the system, hardware, attack and tamper-proofing levels • Role-based authentication at the administrator level to secure configuration and data and allow for auditing • Logging and log analysis with graphical representation and easy export of logs and statistics Highlights & Benefits • Next-generation Web application firewall operates on multiple levels to protect vital Web servers and applications • Continuous scanning for Web application vulnerabilities and for SQL injection or cross-site scripting and other threats within applications • DDoS protection via brute force attacks mitigation • Active incident response including detection, blocking and prevention of intrusion and other attacks, including zero-day detection by abnormal behavior analysis techniques • Post-incident diagnosis and analysis of security issues to reduce overall security risk and maintain Web site credibility • Highly refined rules library includes sophisticated protections such as information disclosure protection, embedded Trojan detection and protection, protocol integrity detection, keyword filtering and much more • Comprehensive Layer 1 through 7 protection for Web servers at the network level, including packet-filtering, URL-based access control, blacklist/whitelist and other protection functions
  • 3. AWF SERIES DATASHEET Next-Generation WAF Protection As applications have increasingly moved to the Web, the servers that host critical business applications have become targets of malicious attacks, tampering and other security incidents that can compromise intellectual property, customer information and other sensitive business data. Array’s AWF Series Web application firewalls protect against the most widespread attack mechanisms while providing active incident response to halt hackers in their tracks, with post-incident analysis and diagnosis to provide guidance for strengthening servers against future attacks. Continuous Threat Scanning The AWF Series continuously scans Web application servers for known vulnerabilities, and scans the applications for the existence of SQL injection or cross-site script vulnerabilities as well. Active Incident Response During a security incident, the AWF Series effectively detects, blocks, and prevents further intrusion, SQL injection, cross-site scripting and other types of Web application attacks. Post-Incident Diagnosis and Analysis After a security incident, the AWF Series diagnoses for critical security issues such as Web site tampering and malicious code, allowing administrators to reduce security risk and maintain the Web servers’ credibility. Sophisticated Rules Library Based on years of network security research, the AWF Series’ highly refined rules library provides a wide variety of protections, including: • Preventing attacks including SQL injection, cross-site attack, cookie injection, malicious code, buffer overflow and other variant Web server attacks • Information disclosure prevention • Web site embedded Trojan protection and detection • Protocol integrity detection • CSRF anti-stealing link • Integrity inspection of HTTP RFC protocol • Keyword filtering Comprehensive Server Protection The AWF Series includes key network firewall features to provide comprehensive Layer 1 through 7 protection for Web application servers. These features include packet filtering, blacklist/ whitelist, URL-based access control and other basic protection functions at the network layer. Web Page Tamper-Proofing To support Web page tamper-proofing, the AWF Series supports centralized management and control of all Web page tamper-proofing endpoints, and provides content monitoring, synchronization and publishing functions. Because it uses driver- level folder protection technology, and uses an event-triggered mechanism, it occupies very few system resources. Each time a user accesses a protected Web page, such as a login page, the AWF Series checks the page integrity before permitting access, thus preventing access to contaminated pages.
  • 4. AWF SERIES DATASHEET Guided Configuration Configuration of Web application firewalls has been notoriously more complex than that of network-level firewalls. The AWF Series provides configuration guidance in order to assist network administrators in accurately configuring and setting up the Web application firewall. For example, false alarms are frequently encountered during set-up. The AWF Series supports generation of exception rules, with a single click on the corresponding strategy that is generating the false alarm. Visualized Management The AWF Series’ powerful equipment monitoring functions allow administrators to monitor, in real time, the associated equipment’s working condition, attack threats and other system information. This capability allows timely discovery and elimination of network problems, promoting stable operation. Role-Based Authentication Three separate administration roles are supported within the AWF Series: Administrator, account administrator and audit administrator. Assignment of distinct roles can assist in meeting quality standards and audit needs of regulatory and other requirements. Logging and Log Analysis The AWF Series’ logging function records the admin, Web site access, attack, Web page tamper-proofing, audit and other logs. For applications requiring high volumes of logs or long-term logging, an external log server can be supported. The advanced log analysis system displays multiple types of logs in graphical format, and supports export of the logs in various formats to facilitate collection fo statistics. AWF Series Appliances The AWF Series features three models to choose from, supporting from four to eight 1 GbE or 10 GbE interfaces and from 800K to 2M concurrent connections per second, depending on model. The AWF appliances leverage next-generation processors and memory, energy-efficient components and 10 GigE to create solutions purpose-built for scalable Web application security. Available for common hypervisors, the vAWF virtual appliances are ideal for organizations seeking to benefit from the flexibility of virtual environments, offer infrastructure services and new elastic business models or evaluate Array application delivery with minimal risk and up-front cost.
  • 5. AWF SERIES DATASHEET Feature Specifications Topology Bridge mode – Transparent/reverse proxy mode (inline) – Router mode – Reverse proxy mode (inline) – Passive mode Static IP – Bonding (Link Aggregation)/LCAP – Bridge – Trunk (802.1q) – Policy- based route – ARP – DNS server Networking Management Web Security Networking Security Logging Monitoring Reporting Topology and Networking Protection against cookie injection, command injection, XSS, etc. – Blocking invalid file upload, such as Web shell upload – Filtering sensitive words in HTTP request and response body – Blocking information leakage, malicious code, weak password attacks, etc. – Limiting the action of Web crawler and scanner – Traffic blocking: redirection to error page, TCP reset, redirect to URL; block source address, etc. – HTTPS offloading and acceleration – Support zero-day attack detection by abnormal behavior analysis technologies – Support positive security model to configuration automatically by self-learning – Support the protection of multiple virtual hosts on one server – Strict protocol validation – Brute force attacks mitigation – Anti-DDoS Access Control List – IP blacklist/whitelist – URL blacklist/whitelist Security Structured system log – SNMP (v2/v3) – CPU usage – Memory usage – Disk usage – HTTP CC number – I/O usage Support log query by year, month and week – Support log query by attack time, site, page, attack type and time, etc. – Support report exported as .pdf, .html, .csv and .doc Logging, Monitoring Reporting
  • 6. AWF SERIES DATASHEET Product Specifications AWF Series Model 1500 3500 5500 Fixed I/O 6x1GbE 6x1GbE 2x1GbE Optional LAN Interfaces (1GbE Copper) 4 4 or 8 4 or 8 Optional LAN Interfaces (10GbE Fiber) 4xSFP 4xSFP, 8xSFP 4xSFP, 8xSFP, 2xXE Bypass Pair 2 2 (up to 4) 2 (up to 6) Maximum Throughput (Single 32KB HTML page) 600Mbps 1.2Gbps 5Gbps L3 Maximum Throughput (Mixed Traffic) 2.5Gbps 4Gbps 9Gbps Maximum Requests per Second (Keep-Alives Enabled) 10,000 30,000 60,000 Maximum Concurrent Connections 800K 1M 2M Number of Protected Web Servers 32 256 1024 Dimensions 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7 W x 16.9” D x 3.5” H Maximum Power Draw 250W 350W 350W Power Supply Redundancy No Yes Yes Weight 6.6 lbs. 6.6 lbs. 17.6 lbs. Environmental Operating Temperature: 5º to 40ºC. Operating Humidity: 20% to 90% Supported Hypervisors (64-bit only) Virtual Machine Requirements vAWF vAWF virtual application delivery controllers support all AWF features. VMware ESXi 4.1 or Later KVM 1.1.1-1.8.1 or later 2 Virtual CPUs 2GB RAM
  • 7. AWF SERIES DATASHEET 1371 McCarthy Blvd. Milpitas, CA 95035 | Phone: (408) 240-8700 Toll Free: 1-866-MY-ARRAY | www.arraynetworks.com VERSION: NOV-2015-REV-A © 2015 Array Networks, Inc. All rights reserved. Array Networks and the Array Networks logo are trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Array Networks assumes no responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.