actually testing from my phone and a laptop on a hotspot. yeah, I know the existing cisco Pix behaves the same when testing.
Not sure that I can help with your question, but I can strongly recommend that you put a WAF in front of every website published to the internet.
If someone creates a bogus reply to your web site, sending 500 text characters instead of the five digits that you are expecting for a US postal zipcode:
The answer to all three are probably "I don't know and I don't want to find out by surprise."
WAF is the defense that saves you from these types of attacks.
Test your WAF configuration to ensure it is locked down as tightly as possible without breaking something. In case you have not seen this elsewhere my process is:
Then I suggest that you declare success and move on to a different problem.
Excellent suggestions, Doug - thanks!
Your final point is excellent advice. I've had two clients get bogged down in getting WAF going. In both cases, it was because Marketing had higher priority than Security when it came to getting changes made by the web developer. Using your approach at least would have gotten them some protection. Some false-positives are harmless, but I think I'd get a list of some of the disabled rules to someone that could get the developer to change the code so that that protection could be enabled.
Cheers - Bob