Skip to content

Commit 2d4ddb7

Browse files
Update application-gateway-waf-request-size-limits.md
1 parent 523b74a commit 2d4ddb7

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/web-application-firewall/ag/application-gateway-waf-request-size-limits.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Web Application Firewall allows you to configure request size limits within a lo
1515

1616

1717
> [!IMPORTANT]
18-
> We are in the process of deploying a new feature for Application Gateway v2 Web Application Firewalls running Core Rule Set 3.2 or later that allows for greater control of your request body size, file upload size, and request body inspection. If you are running Application Gateway v2 Web Application Firewall with Core Rule Set 3.2 or later, and you notice requests getting rejected (or not getting rejected) for a size limit please refer to the troubleshooting steps at the bottom of this page.
18+
> We are in the process of deploying a new feature for Application Gateway v2 Web Application Firewalls running Core Rule Set 3.2 or later that allows for greater control of your request body size, file upload size, and request body inspection. If you're running Application Gateway v2 Web Application Firewall with Core Rule Set 3.2 or later, and you notice requests getting rejected (or not getting rejected) for a size limit please refer to the troubleshooting steps at the bottom of this page.
1919
2020

2121
## Limits
@@ -28,7 +28,7 @@ Only requests with Content-Type of *multipart/form-data* are considered for file
2828

2929

3030
>[!NOTE]
31-
>If you are running Core Rule Set 3.2 or later, and you have a high priority custom rule that takes action based on the content of a request's headers, cookies, or URI, this will take precedence over any max request size, or max file upload size, limits. This optimization let's the Web Application Firewall run high priority custom rules that don't require reading and/or measuring the full Web Application Firewall request (or file upload) first before performing the full request inspection.
31+
>If you're running Core Rule Set 3.2 or later, and you have a high priority custom rule that takes action based on the content of a request's headers, cookies, or URI, this will take precedence over any max request size, or max file upload size, limits. This optimization let's the Web Application Firewall run high priority custom rules that don't require reading and/or measuring the full Web Application Firewall request (or file upload) first before performing the full request inspection.
3232
>
3333
>Example: If you have a custom rule with priority 0 (the highest priority) set to approve a request with the header xyz, even if the request's size is larger than your maximum request size limit, it will get approved. This is because the Web Application Firewall will attempt to run all high priority custom rules that don't require reading the request body before enforcing any rules or size constraints that require reading the full request body.
3434
@@ -47,7 +47,7 @@ When your Web Application Firewall receives a request that's over the size limit
4747

4848
## Trouble Shooting
4949

50-
If you are an Application Gateway v2 Web Application Firewall customer running Core Rule Set 3.2 or later and you have issues with requests, or file uploads, getting rejected incorrectly for maximum size, or if you see requests not getting inspected fully, you may need to verify that all values are set correctly. Using PowerShell or the Azure Command Line Interface you can verify what each value is set to, and update any values as needed.
50+
If you're an Application Gateway v2 Web Application Firewall customer running Core Rule Set 3.2 or later and you have issues with requests, or file uploads, getting rejected incorrectly for maximum size, or if you see requests not getting inspected fully, you may need to verify that all values are set correctly. Using PowerShell or the Azure Command Line Interface you can verify what each value is set to, and update any values as needed.
5151

5252
**Enforce request body inspection**
5353
- PS: "RequestBodyCheck"
@@ -69,7 +69,7 @@ If you are an Application Gateway v2 Web Application Firewall customer running C
6969
- CLI: "max_request_body_size_in_kb"
7070
- Controls how large a request body can be before the Web Application Firewall rejects it for exceeding the max size setting.
7171

72-
**Enforce maxium file upload limit**
72+
**Enforce maximum file upload limit**
7373
- PS: "FileUploadEnforcement"
7474
- CLI: "file_upload_enforcement"
7575
- Controls if your Web Application Firewall will enforce a max size limit on file uploads; when turned off it will not reject any file uploads for being too large.
@@ -91,7 +91,7 @@ $plcy = Get-AzApplicationGatewayFirewallPolicy -Name <policy-name> -ResourceGrou
9191
$plcy.PolicySettings
9292
```
9393

94-
You can use these commands to update the policy settings to the desired values for inspection limit and max size limitation related fields. You can swap out RequestBodyEnforcement in the example below for one of the other values that you want to update.
94+
You can use these commands to update the policy settings to the desired values for inspection limit and max size limitation related fields. You can swap out 'RequestBodyEnforcement' in the example below for one of the other values that you want to update.
9595

9696
```azurepowershell-interactive
9797
$plcy = Get-AzApplicationGatewayFirewallPolicy -Name <policy-name> -ResourceGroupName <resourcegroup-name>

0 commit comments

Comments
 (0)