Signatures
These are in-built rules of WAF.
Overview
Signatures contain rules that are evaluated for each request that passes through WAF. The rules offer protection from many different types of attacks for Web Service/API including OWASP top 10, and they can also help users specify the behavior for their application. The WAF has multiple types of rules designed to target specific use cases.
These signatures include OS-specific rule sets (such as UNIX/Linux and Windows) for broader coverage; however, signature functionality is not dependent on the deployed operating system and can be applied consistently across environments.
Signature Capabilities
These capabilities enable the WAF to effectively safeguard applications against a wide range of threats, ensuring a robust security posture tailored to the specific technologies in use.
OS-Specific Targets:
- UNIX / Linux
- Windows
Framework-Specific Targets:
- .NET
- Java
- PHP
- Struts2
Vulnerability Protection:
- SQL Injection
- Server-Side Inclusion (SSI)
- Cross-Site Scripting (XSS)
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- Insecure Object References
- Command Injection Vulnerabilities
- Remote Code Execution (RCE) Commands

How to Use :
- Go to WAF > Listeners > Profiles > Signatures
- You can change the status of the signature to AUTO, PROD, STAGED, DISABLED.
- Configurations will be deployed successfully.
Description
Rule ID
Predefined rule ID for the signatures. The ID is unique for each rule.
Type
It specifies the type of signature like Firewall, Response, etc.