Cequence API Edge Protection augments API Spartan deployments with web application firewall (WAF), distributed denial of service (DDoS) protection, and transport layer security (TLS) certificate provisioning. Cequence API Edge Protection is available in any AWS region that makes AWS CloudFront and WAF available.
Configuring CloudFront
- Log in to CloudFront.
- Click Create Distribution.
Fill in the fields as required by your implementation. - Choose your Protocol policy.
The origin protocol policy determines the protocol (HTTP or HTTPS) that you want CloudFront to use when connecting to the origin. You can choose the following options.
HTTP Only: CloudFront uses only HTTP to access the origin. This is the default setting when the origin is an Amazon S3 static website hosting endpoint and cannot be changed.
HTTPS Only: CloudFront uses only HTTPS to access the origin. <we currently set https only>
Match Viewer: CloudFront communicates with your origin using HTTP or HTTPS, depending on the protocol of the viewer request. To match HTTPS viewer requests that CloudFront forwards to this origin, one of the domain names in the SSL certificate on your origin server must match the domain name that you specify for Origin domain. - Name your Origin.
- (Optional) Add custom headers.
- Open the Default Cache Behavior panel.
- Choose what methods to cache.
- Choose a cache policy.
- Set the Origin Request Policy to AllViewer in order to pass all client headers, cookies, and request strings through CloudFront to the origin.
- (Optional) Add other functions.
- Choose a Price Class.
- Close a WAF ACL if one is open.
Any WAF ACLs created later are also added at this screen. - Add CNAMES, if any are in use.
These are publicly routable hostnames that route through CloudFront. - Choose a certificate. Any certificates created later are also added at this screen.
- Choose Create Distribution.
Configuring the WAF
- Click Create web ACL.
Fill in the appropriate fields as required. - Choose CloudFront Distribution, if applicable.
The fields refresh and erase any information that has already been input and not submitted. - Name your Web ACL and add associated resources such as your CloudFront distribution.
- Add Rules and Groups.
- Select Add Rules.
- Select Add managed rule groups.
- In Core rule set, click the action slider.
The core rule set is now added. - Select Edit.
- Select Set all rule actions to count.
This changes the rule action to Alert. - Click Save.
- Choose Add rules.
- Verify that Default action is set to Allow.
- (Optional) Add custom headers.
- Choose Next.
- Set a rule priority.
- Choose Next.
- Configure metric settings if needed.
- Click Next.
- Click Confirm.
- Click Create your Web ACL.
- Return to your CloudFront Distribution, and add your new Web ACL.
When you are ready to block traffic, disable 'Set all rule actions to count” as in the above step, where it was enabled. This will cause requests which trigger CRS rules to be blocked.
Generating the certificate
- Click Request.
- Click Next.
- Complete the certificate request form.
- Enter your FQDN.
- Choose DNS Validation.
- Enter tags.
Typically, these are Name and Customer, with the value of the customer name. - Click Request.
An entry is automatically created in Route 53. - Provide this CNAME to the customer, for them to create an CNAME to route to this CloudFront CNAME. Alternately, you can change this Record to reflect your FQDN.
- Change the record to route traffic from your new CNAME to your CloudFront distribution. The automatically-created record is a placeholder.
- Add the certificate to your CloudFront distribution.
- Add the newly created certificate to your origin or load balancer.