Skip to content

Commit 0fc3f73

Browse files
authored
Merge pull request #79831 from vhorne/ag-custom
make clear this is for v2
2 parents b299a75 + 2725b9c commit 0fc3f73

File tree

4 files changed

+19
-19
lines changed

4 files changed

+19
-19
lines changed

articles/application-gateway/configure-waf-custom-rules.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
2-
title: Configure Web Application Firewall custom rules using Azure PowerShell
3-
description: Learn how to configure WAF custom rules using Azure PowerShell
2+
title: Configure Web Application Firewall v2 custom rules using Azure PowerShell
3+
description: Learn how to configure WAF v2 custom rules using Azure PowerShell
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 6/7/2019
8+
ms.date: 6/18/2019
99
ms.author: victorh
1010
---
1111

12-
# Configure Web Application Firewall with a custom rule using Azure PowerShell
12+
# Configure Web Application Firewall v2 with a custom rule using Azure PowerShell
1313

1414
<!--- If you make any changes to the PowerShell in this article, also make the change in the corresponding Sample file: azure-docs-powershell-samples/application-gateway/waf-rules/waf-custom-rules.ps1 --->
1515

16-
Custom rules allow you to create your own rules evaluated for each request that passes through the Web Application Firewall (WAF). These rules hold a higher priority than the rest of the rules in the managed rule sets. The custom rules have an action (to allow or block), a match condition, and an operator to allow full customization.
16+
Custom rules allow you to create your own rules evaluated for each request that passes through the Web Application Firewall (WAF) v2. These rules hold a higher priority than the rest of the rules in the managed rule sets. The custom rules have an action (to allow or block), a match condition, and an operator to allow full customization.
1717

18-
This article creates an Application Gateway WAF that uses a custom rule. The custom rule blocks traffic if the request header contains User-Agent *evilbot*.
18+
This article creates an Application Gateway WAF v2 that uses a custom rule. The custom rule blocks traffic if the request header contains User-Agent *evilbot*.
1919

2020
To see more custom rule examples, see [Create and use custom web application firewall rules](create-custom-waf-rules.md)
2121

articles/application-gateway/create-custom-waf-rules.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Create and use Azure Web Application Firewall (WAF) custom rules
3-
description: This article provides information on how to create Web Application Firewall (WAF) custom rules in Azure Application Gateway.
2+
title: Create and use Azure Web Application Firewall (WAF) v2 custom rules
3+
description: This article provides information on how to create Web Application Firewall (WAF) v2 custom rules in Azure Application Gateway.
44
services: application-gateway
55
ms.topic: article
66
author: vhorne
77
ms.service: application-gateway
8-
ms.date: 6/5/2019
8+
ms.date: 6/18/2019
99
ms.author: victorh
1010
---
1111

12-
# Create and use Web Application Firewall custom rules
12+
# Create and use Web Application Firewall v2 custom rules
1313

14-
The Azure Application Gateway web application firewall (WAF) provides protection for web applications. This protection is provided by the Open Web Application Security Project (OWASP) Core Rule Set (CRS). In some cases, you may need to create your own custom rules to meet your specific needs. For more information about WAF custom rules, see [Custom web application firewall rules overview](custom-waf-rules-overview.md).
14+
The Azure Application Gateway Web Application Firewall (WAF) v2 provides protection for web applications. This protection is provided by the Open Web Application Security Project (OWASP) Core Rule Set (CRS). In some cases, you may need to create your own custom rules to meet your specific needs. For more information about WAF custom rules, see [Custom web application firewall rules overview](custom-waf-rules-overview.md).
1515

16-
This article shows you some example custom rules that you can create and use with your WAF. To learn how to deploy a WAF with a custom rule using Azure PowerShell, see [Configure Web Application Firewall custom rules using Azure PowerShell](configure-waf-custom-rules.md).
16+
This article shows you some example custom rules that you can create and use with your v2 WAF. To learn how to deploy a WAF with a custom rule using Azure PowerShell, see [Configure Web Application Firewall custom rules using Azure PowerShell](configure-waf-custom-rules.md).
1717

1818
>[!NOTE]
1919
> If your application gateway is not using the WAF tier, the option to upgrade the application gateway to the WAF tier appears in the right pane.

articles/application-gateway/custom-waf-rules-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Azure Web Application Firewall (WAF) custom rules
3-
description: This article provides an overview of web application firewall (WAF) custom rules in Azure Application Gateway.
2+
title: Azure Web Application Firewall (WAF) v2 custom rules
3+
description: This article provides an overview of Web Application Firewall (WAF) v2 custom rules in Azure Application Gateway.
44
services: application-gateway
55
ms.topic: article
66
author: vhorne
77
ms.service: application-gateway
8-
ms.date: 6/5/2019
8+
ms.date: 6/18/2019
99
ms.author: victorh
1010
---
1111

12-
# Custom rules for Web Application Firewall
12+
# Custom rules for Web Application Firewall v2
1313

14-
The Azure Application Gateway web application firewall (WAF) comes with a pre-configured, platform-managed ruleset that offers protection from many different types of attacks. These attacks include cross site scripting, SQL injection, and others. If you're a WAF admin, you may want to write you own rules to augment the core rule set (CRS) rules. Your rules can either block or allow requested traffic based on matching criteria.
14+
The Azure Application Gateway Web Application Firewall (WAF) v2 comes with a pre-configured, platform-managed ruleset that offers protection from many different types of attacks. These attacks include cross site scripting, SQL injection, and others. If you're a WAF admin, you may want to write you own rules to augment the core rule set (CRS) rules. Your rules can either block or allow requested traffic based on matching criteria.
1515

1616
Custom rules allow you to create your own rules that are evaluated for each request that passes through the WAF. These rules hold a higher priority than the rest of the rules in the managed rule sets. The custom rules contain a rule name, rule priority, and an array of matching conditions. If these conditions are met, an action is taken (to allow or block).
1717

articles/application-gateway/powershell-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 6/7/2019
8+
ms.date: 6/18/2019
99
ms.author: victorh
1010
---
1111
# Azure Application Gateway PowerShell samples
@@ -16,5 +16,5 @@ The following table includes links to Azure PowerShell script samples that creat
1616
|---|---|
1717
| [Manage web traffic](./scripts/create-vmss-powershell.md) | Creates an Application Gateway and all related resources.|
1818
| [Restrict web traffic](./scripts/create-vmss-waf-powershell.md) | Creates an Application Gateway that restricts traffic using OWASP rules.|
19-
|[WAF custom rules](scripts/waf-custom-rules-powershell.md)|Creates an Application Gateway Web Application Firewall with custom rules.
19+
|[WAF v2 custom rules](scripts/waf-custom-rules-powershell.md)|Creates an Application Gateway Web Application Firewall v2 with custom rules.
2020
| | |

0 commit comments

Comments
 (0)