An active HTTP DDoS attack has exposed fundamental limitations in Azure's Application Gateway WAF. These aren't edge cases — they are architectural constraints.
Gap 1
CRS-Only WAF Rules
Rules are based on OWASP CRS with no Cloudflare-equivalent proprietary threat intelligence or ML-based attack scoring
Gap 2
No ASN Blocking
No native capability to block traffic by Autonomous System Number — impossible without custom scripting outside the WAF
Gap 3
CAPTCHA Requires Azure Front Door
Challenge/CAPTCHA capabilities are only available when routing through Azure Front Door — a significant architectural dependency
Gap 4
No Global Policy Management
Separate WAF policies per site means no way to push a global block or exclusion across all protected properties without scripting