Build OCI WAF protection rules, access control, and rate limiting configurations.
Last verified: May 2026
Output will appear here...Your team's e-commerce site has been getting hit with credential stuffing attacks — automated bots trying leaked username/password combos against /login. The builder generates a WAF policy: rate limit /login to 10 req/IP/min with CAPTCHA challenge above threshold, plus OWASP SQL injection + XSS rules in Block mode (after 1-week Detect validation), plus a bot management rule challenging User-Agent strings matching known credential-stuffing tools. Within hours of deploy, automated login attempts drop 95%+; legitimate users barely notice the rate limit because real humans don't try 10+ logins/minute.
Oracle Cloud Infrastructure Web Application Firewall (WAF) protects web applications from common exploits like SQL injection, cross-site scripting (XSS), and bot traffic by inspecting HTTP/HTTPS requests at the edge. WAF policies combine access control rules, rate limiting, protection rules mapped to OWASP categories, and custom rules with flexible matching conditions. This builder helps you configure WAF policies with protection rules, request rate limiting, access control lists, and bot management settings for OCI Load Balancer or Flexible Load Balancer deployments.
The builder constructs OCI WAF policy definitions with: access control rules (CIDR-based allow/deny), rate limiting rules (requests per IP per period, with action: block/challenge/allow), protection capabilities (preconfigured OWASP rule sets like SQL injection, XSS, command injection, with sensitivity levels), bot management rules (Good Bot Allow, Suspicious Bot Challenge, Bad Bot Block), and custom rules (with conditions on URL/headers/IP/country and actions). Output is generated as oci waf policy commands and Terraform oci_waf_web_app_firewall_policy resources.
ALWAYS deploy WAF rules in Detect-only mode first. The OWASP rule sets generate false positives on legitimate traffic patterns specific to your app. Run for 1-2 weeks, review hits, build exception rules, THEN switch to Block mode. Going straight to Block guarantees blocking some legitimate users.
Custom rules with allowlist patterns evaluate BEFORE the OWASP rules — use this to whitelist known-good traffic patterns that the OWASP rules might falsely flag. For example, allow `/api/search` with single-quote characters in queries before SQLi rules block them.
Rate limiting in OCI WAF is per-IP-address by default. For APIs behind NAT or CDN where many users share an outbound IP, this can block legitimate users. Use the X-Forwarded-For header for true client IP detection in such scenarios — verify your CDN sets this correctly.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.