Application Creation Wizard

Purpose

You can start the Application Creation Wizard manually in Application Control via the button with Create Application with Application Creation Wizard.

The Application Creation Wizard guides you through the process of setting up a new application step by step.

When it finishes, the Application Creation Wizard brings up the Logfilestab for the application that you just created. On this tab, you can monitor how vWAF and your web application handle requests now that your basic configuration has been set up. For details on viewing log files, see Monitoring Attacks, Statistics, Log Files, Reports and Log Files.

For more information regarding Wizards, see Using Wizards to Configure Applications.

Attributes

Attribute Meaning

Name of the application

The name that you want to assign to the application. You are free to choose any descriptive text here. The name of an application is only for you to be able to handle the application in the user interface. It is not used for request processing.

Mode

Here you can select whether the application runs in detection mode or in protection mode. We recommend running your application in detection mode for some time before switching to protection mode. This only logs ruleset violations and does not interfere with the actual traffic. For detailed information on detection mode versus protection mode, see Detection Mode, Protection Mode.

Customer key

Here you can select the customer key for application mapping. For details on customer keys, see Application Mapping, Paths, Preconditions.

When using vWAF integrated in Brocade Virtual Traffic Manager (Traffic Manager), you typically do not have any other customer keys than the empty "[Default Customer Key]" because typically there is only one cluster and all enforcers (here: Traffic Managers) are identical.

Host name

Here you need to add the hosts of your application. For information on adding hosts in general, see Editing Application Mapping. If your vWAF installation has already been running for some time, the drop-down list labeled select a host name contains a list of hostname suggestions. These suggestions are compiled from log file entries that could not be assigned to any application configured in vWAF , so it is likely that you want to select one of these. Enter or select a host name, and then click the Add this hostname button. Repeat this action for all hosts that you want to assign to the application.

Reduced logging

Choose whether you want to enable reduced logging for the given hosts.

Later, you can also enable reduced logging for individual hosts. To do so, you need to edit the settings of each host manually on the Application Settings tab (see Editing Applications).

Full request logging

Choose whether you want to enable full request logging for the application. This enables you to conduct in-depth analysis of denied requests but might write confidential data to your log files. Important: This option only has an effect if full request logging is also enabled generally in Global Configuration, or if you had enabled it when running the Initial Setup Wizard. For more information on full request logging, seeGlobal Configuration.

Baseline protection

Select whether or not to activate baseline protection for the given application. For detailed information on baseline protection, see Baseline Protection.