Skip to content

Commit 079ba85

Browse files
Merge pull request #39403 from teresayao/patch-6
Update waf-overview.md
2 parents 7df7022 + ccd3080 commit 079ba85

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/frontdoor/waf-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ A WAF policy can consist of two types of security rules - custom rules, authored
6868

6969
You can configure custom rules WAF as follows:
7070

71-
- **IP allow list and block list:** You can configure custom rules to control access to your web applications based on a list of client IP addresses or IP address ranges. Both IPv4 and IPv6 address types are supported. This list can be configured to either block or allow those requests where the source IP matches an IP in the list.
71+
- **IP allow list and block list:** You can configure custom rules to control access to your web applications based on a list of client IP addresses or IP address ranges. Both IPv4 and IPv6 address types are supported. This list can be configured to either block or allow those requests where the source IP matches an IP in the list. A client IP address can be different from the IP address WAF observes, for example, when a client accesses WAF via a proxy. You can create [IP restriction rules](https://docs.microsoft.com/azure/frontdoor/waf-front-door-configure-ip-restriction) based on either Client IP addresses (RemoteAddr) or IP addresses seen by WAF (SocketAddr). Configuration of a SocketAddr IP restriction rule is currently supported using Powershell and Azure CLI.
7272

7373
- **Geographic based access control:** You can configure custom rules to control access to your web applications based on the country code associated with a client’s IP address.
7474

0 commit comments

Comments
 (0)