Call a Specialist Today! 800-886-5369

AWF5500
Virtual Web Application Firewall

Array Networks AWF5500

Array Networks Web Application Firewalls Controllers
Array Networks AWF5500
Contact us for pricing!

Overview:

Array AWF Series WAF Appliances

enterprise icon

Enterprise & Government

Enterprise and government Web sites and applications are increasingly the target of malicious attacks. Array's AWF Series WAF can protect against the most widespread attack mechanisms while providing active incident response to halt hackers in their tracks, with post-incident analysis and diagnosis to guide in strengthening servers against future attacks.

cloud icon

Cloud Providers

For Software-as-a-Service providers, the AWF Series protects the most vital business asset – the software applications that generate revenues – from malicious attacks, tampering and other security incidents. Infrastructure-as-a-Service providers can also leverage the AWF Series to offer WAF-as-a-Service for customers operating eCommerce sites and other Web assets in their cloud.

ecommerce icon

eCommerce Sites

Like enterprises and governments, eCommerce sites face a growing threat from Web site attacks and tampering, with the added danger of the loss of customer financial or other private information. Array's AWF Series protects eCommerce sites through a strong portfolio of tools such as continuous scanning, active incident response and post-incident analysis/diagnosis, and much more.

Comprehensive Protection

Continuous Threat Scanning

Array's Web application firewall continuously scans servers for known vulnerabilities, and scans applications for SQL injection or cross-site scripting vulnerabilities. In addition, a sophisticated rules library protects against a wide variety of Web server attacks, prevents inadvertent information disclosure, and protects and detects Web site embedded Trojans.

Strong Incident Response

During a security incident, the AWF Series effectively detects, blocks and prevents further intrusion, SQL injection, cross-site scripting and other types of Web application attacks. After a security incident, the AWF Series diagnoses for critical security issues such as Web site tampering and malicious code, allowing administrators to reduce security risk and maintain the Web servers' credibility.

Web Page Tamper-Proofing

Array's AWF Series Web application firewall (WAF) supports centralized management and control of all Web-page tamper-proofing endpoints, and provides content monitoring, synchronization and publishing functions while utilizing very few system resources. Page integrity of protected Web pages is checked before permitting end-users to access, thus preventing access to contaminated pages.

AWF Network

Comprehensive Server Protection

The AWF Series includes key network firewall features to provide comprehensive Layer 1 through 7 protection for Web application servers, including packet filtering, blacklist/whitelist, URL-based access control and other basic protection functions at the network layer.

Easy Configuration & Management

Guided Configuration

Configuration of Web application firewalls has been notoriously more complex than that of network-level firewalls. The AWF Series provides configuration guidance to assist administrators in accurately configuring and setting up the Web application firewall.

Visualized Management

The AWF Series' powerful equipment monitoring functions allow administrators to monitor – in real time – the associated equipment's working condition, attack threats and other system information, allowing timely discovery and elimination of network problems, and promoting stable operation.

Role-Based Authentication

The AWF Series supports three separate administration roles: administrator, account administrator and audit administrator. Using distinct roles can assist in meeting quality standards and the audit needs of regulatory and other requirements.

Highlights & Benefits

  • Next-generation Web application firewall operates on multiple levels to protect vital Web servers and applications
  • Continuous scanning for Web application vulnerabilities and for SQL injection or cross-site scripting and other threats within applications
  • DDoS protection via brute force attacks mitigation
  • Active incident response including detection, blocking and prevention of intrusion and other attacks, including zero-day detection by abnormal behavior analysis techniques
  • Post-incident diagnosis and analysis of security issues to reduce overall security risk and maintain Web site credibility
  • Highly refined rules library includes sophisticated protections such as information disclosure protection, embedded Trojan detection and protection, protocol integrity detection, keyword filtering and much more
  • Comprehensive Layer 1 through 7 protection for Web servers at the network level, including packet-filtering, URL-based access control, blacklist/whitelist and other protection functions
  • Web page tamper-proofing through centralized management and control of all Web tamperproofing endpoints, with content monitoring, synchronization and publish functions
  • Customizable feature library and flexible configuration model to meet the needs of complex Web applications
  • Comprehensive management portal provides visualized monitoring at the system, hardware, attack and tamper-proofing levels
  • Guided configuration with exception rules to reduce installation complexity and errors
  • Comprehensive management portal provides visualized monitoring at the system, hardware, attack and tamper-proofing levels
  • Role-based authentication at the administrator level to secure configuration and data and allow for auditing
  • Logging and log analysis with graphical representation and easy export of logs and statistics

Features:

Industry-Leading Attack Protection

AWF Infographic

AWF Series physical and virtual appliances are deployed in front of Web and application servers either inline or in a one-arm configuration to monitor traffic, protect against threats and reduce security risks.

Array Web application firewalls are ideal for protecting business-critical Web and application servers, protecting against common threats as well as zero-day attacks. In addition, fine-grained attack detection and analysis capabilities can help proactively defend vital servers and assets.

Each Array AWF Series appliance shares an all-inclusive feature set for simple, cost-effective ordering.

Continuous Threat Scanning

The AWF Series continuously scans Web application servers for known vulnerabilities, and scans the applications for the existence of SQL injection or cross-site script vulnerabilities as well.

Active Incident Response

During a security incident, the AWF Series effectively detects, blocks, and prevents further intrusion, SQL injection, cross-site scripting and other types of Web application attacks.

Post-Incident Diagnosis and Analysis

After a security incident, the AWF Series diagnoses for critical security issues such as Web site tampering and malicious code, allowing administrators to reduce security risk and maintain the Web servers’ credibility.

Sophisticated Rules Library

Based on years of network security research, the AWF Series’ highly refined rules library provides a wide variety of protections, including:

  • Preventing attacks including SQL injection, cross-site attack, cookie injection, malicious code, buffer overflow and other variant Web server attacks
  • Information disclosure prevention
  • Web site embedded Trojan protection and detection
  • Protocol integrity detection
  • CSRF anti-stealing link
  • Integrity inspection of HTTP RFC protocol
  • Keyword filtering
AWF Network

Comprehensive Server Protection

The AWF Series includes key network firewall features to provide comprehensive Layer 1 through 7 protection for Web application servers. These features include packet filtering, blacklist/ whitelist, URL-based access control and other basic protection functions at the network layer.

Web Page Tamper-Proofing

To support Web page tamper-proofing, the AWF Series supports centralized management and control of all Web page tamper-proofing endpoints, and provides content monitoring, synchronization and publishing functions. Because it uses driverlevel folder protection technology, and uses an event-triggered mechanism, it occupies very few system resources.

Each time a user accesses a protected Web page, such as a login page, the AWF Series checks the page integrity before permitting access, thus preventing access to contaminated pages.

Guided Configuration

Configuration of Web application firewalls has been notoriously more complex than that of network-level firewalls. The AWF Series provides configuration guidance in order to assist network administrators in accurately configuring and setting up the Web application firewall. For example, false alarms are frequently encountered during set-up. The AWF Series supports generation of exception rules, with a single click on the corresponding strategy that is generating the false alarm.

Visualized Management

The AWF Series’ powerful equipment monitoring functions allow administrators to monitor, in real time, the associated equipment’s working condition, attack threats and other system information. This capability allows timely discovery and elimination of network problems, promoting stable operation.

Role-Based Authentication

Three separate administration roles are supported within the AWF Series: Administrator, account administrator and audit administrator. Assignment of distinct roles can assist in meeting quality standards and audit needs of regulatory and other requirements.

Logging and Log Analysis

The AWF Series’ logging function records the admin, Web site access, attack, Web page tamper-proofing, audit and other logs. For applications requiring high volumes of logs or long-term logging, an external log server can be supported.

The advanced log analysis system displays multiple types of logs in graphical format, and supports export of the logs in various formats to facilitate collection fo statistics.

AWF Series Appliances

The AWF Series features three models to choose from, supporting from four to eight 1 GbE or 10 GbE interfaces and from 800K to 2M concurrent connections per second, depending on model. The AWF appliances leverage next-generation processors and memory, energy-efficient components and 10 GigE to create solutions purpose-built for scalable Web application security.

Available for common hypervisors, the vAWF virtual appliances are ideal for organizations seeking to benefit from the flexibility of virtual environments, offer infrastructure services and new elastic business models or evaluate Array application delivery with minimal risk and up-front cost.

Specifications:

Feature Specifications
Topology and Networking
Topology Bridge mode – Transparent/reverse proxy mode (inline) – Router mode – Reverse proxy mode (inline) – Passive mode
Networking Management Static IP – Bonding (Link Aggregation)/LCAP – Bridge – Trunk (802.1q) – Policybased route – ARP – DNS server
Security
Web Security Protection against cookie injection, command injection, XSS, etc. – Blocking invalid file upload, such as Web shell upload – Filtering sensitive words in HTTP request and response body – Blocking information leakage, malicious code, weak password attacks, etc. – Limiting the action of Web crawler and scanner – Traffic blocking: redirection to error page, TCP reset, redirect to URL; block source address, etc. – HTTPS offloading and acceleration – Support zero-day attack detection by abnormal behavior analysis technologies – Support positive security model to configuration automatically by self-learning – Support the protection of multiple virtual hosts on one server – Strict protocol validation – Brute force attacks mitigation – Anti-DDoS
Networking Security Access Control List – IP blacklist/whitelist – URL blacklist/whitelist
Logging, Monitoring & Reporting
Logging & Monitoring Structured system log – SNMP (v2/v3) – CPU usage – Memory usage – Disk usage – HTTP CC number – I/O usage
Reporting Support log query by year, month and week – Support log query by attack time, site, page, attack type and time, etc. – Support report exported as .pdf, .html, .csv and .doc
Product Specifications
AWF Series Model 1500 3500 5500
Fixed I/O 6x1GbE 6x1GbE 2x1GbE
Optional LAN Interfaces (1GbE Copper) 4 4 or 8 4 or 8
Optional LAN Interfaces (10GbE Fiber) 4xSFP 4xSFP, 8xSFP 4xSFP, 8xSFP, 2xXE
Bypass Pair 2 2 (up to 4) 2 (up to 6)
Maximum Throughput (Single 32KB HTML page) 600Mbps 1.2Gbps 5Gbps
L3 Maximum Throughput (Mixed Traffic) 2.5Gbps 3.8Gbps 9Gbps
Maximum Requests per Second (Keep-Alives Enabled) 10,000 30,000 60,000
Maximum Concurrent Connections 800K/s 1M/s 2M/s
Number of Protected Web Servers 32 256 1024
Dimensions 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7” W x 16.9” D x 3.5” H 2U: 17.7 W x 16.9” D x 3.5” H
Maximum Power Draw 250W 350W 350W
Power Supply Redundancy No Yes Yes
Weight 6.6 lbs. 6.6 lbs. 17.6 lbs.
Environmental Operating Temperature: 5º to 40ºC. Operating Humidity: 20% to 90%
  Supported Hypervisors (64-bit only) Virtual Machine Requirements
vAWF
vAWF virtual application delivery controllers support all AWF features.
VMware ESXi 4.1 or Later
KVM 1.1.1-1.8.1 or later
2 Virtual CPUs
2GB RAM

Documentation:

Download the Array Networks AWF Series Datasheet (PDF).

Pricing Notes:

Array Networks Web Application Firewalls Controllers
Array Networks AWF5500
Contact us for pricing!