<menuitem id="lvxh5"><dl id="lvxh5"></dl></menuitem>
<ins id="lvxh5"></ins>
<ins id="lvxh5"></ins><ins id="lvxh5"><span id="lvxh5"><cite id="lvxh5"></cite></span></ins><ins id="lvxh5"><noframes id="lvxh5"><cite id="lvxh5"></cite><del id="lvxh5"><noframes id="lvxh5">
<ins id="lvxh5"></ins>
<ins id="lvxh5"><noframes id="lvxh5"><cite id="lvxh5"></cite>
<del id="lvxh5"><noframes id="lvxh5"><ins id="lvxh5"></ins>
<ins id="lvxh5"></ins>

NGINX is now part of F5. See why we’re?better together.

What Is NGINX Web Application Firewall?

Even when you understand security, it is difficult to create secure applications, especially when working under the pressures so common in today’s enterprise. The NGINX Web Application Firewall (WAF) protects applications against sophisticated Layer 7 attacks that might otherwise lead to systems being taken over by attackers, loss of sensitive data, and downtime. The NGINX WAF is based on the widely used ModSecurity open source software.




Used by more than a million websites, ModSecurity is the most trusted name in application security

Circle with 4 arrows pointing outwards from circle


NGINX WAF is open source software that can be deployed in any environment – bare metal, public cloud, private cloud, hybrid cloud, virtual machines, and containers

Cost icon


PCI compliance at a fraction of the cost of hardware WAFs


NGINX Layer 7 Attack

Layer 7 Attack Protection

Detect and stop a broad range of Layer 7 attacks:

  • SQL injection (SQLi), cross‑site scripting (XSS), and Local File Include (LFI), which which together account for over 90% of known Layer 7 attacks
  • Cross‑site request forgery (CSRF), Remote File Include (RFI), remote code execution (RCE), and HTTP protocol violations
  • Other common attack vectors, detected by your own custom regex‑based rules
NGINX Security IP

IP Reputation

Automatically block traffic from known malicious IP addresses:

  • Look up IP addresses in Project Honey Pot database in real time and deny access to blacklisted users
  • Cache results from lookups for up to 24 hours to improve performance
  • Set up your own honey pot of malicious IP addresses and contribute back to the community

Audit Logging

Get detailed logs for auditing and visibility:

  • Detailed information about all transactions, including requests, responses, and details as to which rules were activated
  • Remote syslogging for archival and centralized analysis

Technical Specifications

Amazon Linux Logo
FreeBSD Logo
Oracle Linux Logo
Red Hat
Suse logo

x86 Logo

Amazon Web Services
Google Cloud Platform Logo
Microsoft Azure Logo