You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/migrate-policy.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Migrate WAF policies for Azure Application Gateway
3
-
description: Learn how to migrate Azure Web Application Firewall policies using Azure PowerShell.
2
+
title: Upgrade WAF policies for Azure Application Gateway
3
+
description: Learn how to upgrade Azure Web Application Firewall policies using Azure PowerShell.
4
4
services: web-application-firewall
5
5
ms.topic: how-to
6
6
author: vhorne
@@ -10,13 +10,13 @@ ms.author: victorh
10
10
ms.custom: devx-track-azurepowershell
11
11
---
12
12
13
-
# Migrate Web Application Firewall policies using Azure PowerShell
13
+
# Upgrade Web Application Firewall policies using Azure PowerShell
14
14
15
-
This script makes it easy to transition from a WAF config or a custom rules-only WAF policy to a full WAF policy. You may see a warning in the portal that says *migrate to WAF policy*, or you may want the new WAF features such as Geomatch custom rules, per-site WAF policy, and per-URI WAF policy (preview), or the bot mitigation ruleset. To use any of these features, you need a full WAF policy associated to your application gateway.
15
+
This script makes it easy to transition from a WAF config or a custom rules-only WAF policy to a full WAF policy. You may see a warning in the portal that says *upgrade to WAF policy*, or you may want the new WAF features such as Geomatch custom rules, per-site WAF policy, and per-URI WAF policy (preview), or the bot mitigation ruleset. To use any of these features, you need a full WAF policy associated to your application gateway.
16
16
17
-
For more information about creating a new WAF policy, see [Create Web Application Firewall policies for Application Gateway](create-waf-policy-ag.md). For information about migrating, see [Migrate to WAF policy](create-waf-policy-ag.md#migrate-to-waf-policy).
17
+
For more information about creating a new WAF policy, see [Create Web Application Firewall policies for Application Gateway](create-waf-policy-ag.md). For information about migrating, see [upgrade to WAF policy](create-waf-policy-ag.md#upgrade-to-waf-policy).
18
18
19
-
## To migrate to WAF policy using the migration script
19
+
## To upgrade to WAF policy using the migration script
20
20
21
21
Use the following steps to run the migration script:
22
22
@@ -35,7 +35,7 @@ Use the following steps to run the migration script:
35
35
```azurepowershell-interactive
36
36
<#PSScriptInfo
37
37
.DESCRIPTION
38
-
Will be used to migrate to the application-gateway to a top level waf policy experience.
38
+
Will be used to upgrade to the application-gateway to a top level waf policy experience.
39
39
40
40
.VERSION 1.0
41
41
@@ -90,7 +90,7 @@ function ValidateInput ($appgwName, $resourceGroupName) {
90
90
foreach ($disabled in $appgw.WebApplicationFirewallConfiguration.DisabledRuleGroups) {
91
91
if ($disabled.Rules.Count -eq 0) {
92
92
$ruleGroupName = $disabled.RuleGroupName
93
-
Write-Error "The ruleGroup '$ruleGroupName' is disabled. Currently we can't migrate to a firewall policy when an entire ruleGroup is disabled. This feature will be delivered shortly. To continue, kindly ensure the entire rulegroups are not disabled. "
93
+
Write-Error "The ruleGroup '$ruleGroupName' is disabled. Currently we can't upgrade to a firewall policy when an entire ruleGroup is disabled. This feature will be delivered shortly. To continue, kindly ensure the entire rulegroups are not disabled. "
94
94
return $false
95
95
}
96
96
}
@@ -100,7 +100,7 @@ function ValidateInput ($appgwName, $resourceGroupName) {
100
100
if ($appgw.WebApplicationFirewallConfiguration.Exclusions) {
101
101
foreach ($excl in $appgw.WebApplicationFirewallConfiguration.Exclusions) {
Write-Error " You have an exclusion entry(s) with the 'Equals any' operator. Currently we can't migrate to a firewall policy with 'Equals Any' operator. This feature will be delivered shortly. To continue, kindly ensure exclusion entries with 'Equals Any' operator is not present. "
103
+
Write-Error " You have an exclusion entry(s) with the 'Equals any' operator. Currently we can't upgrade to a firewall policy with 'Equals Any' operator. This feature will be delivered shortly. To continue, kindly ensure exclusion entries with 'Equals Any' operator is not present. "
Azure Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. Web Application Firewall Policies contain all the WAF settings and configurations. This includes exclusions, custom rules, managed rules, and so on. These policies are then associated with an application gateway (global), a listener (per-site), or a path-based rule (per-URI) for them to take effect.
16
16
17
-
Azure Application Gateway WAF v2 natively supports WAF policy. You should migrate your legacy WAF configuration to WAF policies.
17
+
Azure Application Gateway WAF v2 natively supports WAF policy. You should upgrade your legacy WAF configuration to WAF policies.
18
18
19
19
- Policies offer a richer set of advanced features like newer managed rule sets, custom rules, per rule exclusions, bot protection, and the next generation of WAF engine available to you at no additional cost.
20
20
- Unlike legacy WAF configuration, WAF policies can be defined once and shared across multiple gateways, listeners, and URL paths. This simplifies the management and deployment experience.
21
21
- The latest features and future enhancements will only be available via WAF policies.
22
22
23
23
> [!IMPORTANT]
24
-
> No further investments will be made for legacy WAF configuration. You are strongly encouraged to migrate from legacy WAF configuration to WAF Policy for easier management and a richer feature set at no additional cost. Legacy WAF configuration is on the path to retirement and Legacy WAF configuration on v2 gateways will not be supported starting January 1, 2024.
24
+
> No further investments will be made for legacy WAF configuration. You are strongly encouraged to upgrade from legacy WAF configuration to WAF Policy for easier management and a richer feature set at no additional cost. Legacy WAF configuration is on the path to retirement and Legacy WAF configuration on v2 gateways will not be supported starting January 1, 2024.
25
25
26
26
## Upgrade Application Gateway Standard v2 to Application Gateway WAF v2
27
27
28
28
1. Locate the Application Gateway in the Azure portal. Select the Application Gateway and the select **Configuration** from the **Settings** menu on the left side.
29
29
1. Under **Tier**, select **WAF**.
30
30
1. Select **Save** to complete the upgrade from Application Gateway Standard to Application Gateway WAF.
31
31
32
-
## Migrate WAF v2 with legacy WAF configuration to WAF policy
32
+
## Upgrade WAF v2 with legacy WAF configuration to WAF policy
33
33
34
-
You can migrate existing Application Gateways with WAF v2 from WAF legacy configuration to WAF policy directly without any downtime. You can migrate using either using the portal, Firewall Manager, or Azure PowerShell.
34
+
You can upgrade existing Application Gateways with WAF v2 from WAF legacy configuration to WAF policy directly without any downtime. You can upgrade using either using the portal, Firewall Manager, or Azure PowerShell.
35
35
36
36
# [Portal](#tab/portal)
37
37
38
38
1. Logon to the Azure portal and select the Application Gateway WAF v2 that has a legacy WAF configuration.
39
39
1. Select **Web Application Firewall** from the left menu, then select **Upgrade from WAF configuration**.
40
40
1. Provide a name for the new WAF Policy and then select **Upgrade**. This creates a new WAF Policy based on the WAF configuration. You can also choose to associate a pre-existing WAF Policy instead of creating a new one.
41
-
1. When the migration finishes, a new WAF Policy incorporating the previous WAF configuration and rules is created.
41
+
1. When the upgrade finishes, a new WAF Policy incorporating the previous WAF configuration and rules is created.
42
42
43
43
# [Firewall Manager](#tab/fwm)
44
44
45
45
See [Configure WAF policies using Azure Firewall Manager](../shared/manage-policies.md).
46
46
47
47
# [PowerShell](#tab/powershell)
48
48
49
-
See [Migrate Web Application Firewall policies using Azure PowerShell](migrate-policy.md).
49
+
See [Upgrade Web Application Firewall policies using Azure PowerShell](migrate-policy.md).
50
50
51
51
---
52
52
53
53
## Upgrade Application Gateway v1 to WAF v2 with WAF policy
54
54
55
55
Application Gateway v1 does not support WAF policy. Upgrading to WAF policy is a two step process:
56
56
57
-
-Migrate Application Gateway v1 to v2 version.
57
+
-Upgrade Application Gateway v1 to v2 version.
58
58
- Upgrade legacy WAF configuration to WAF policy.
59
59
60
-
1.Migrate from v1 to v2 Application Gateway.
60
+
1.Upgrade from v1 to v2 Application Gateway.
61
61
62
-
For more information, see [Migrate Azure Application Gateway and Web Application Firewall from v1 to v2](../../application-gateway/migrate-v1-v2.md).
62
+
For more information, see [Upgrade Azure Application Gateway and Web Application Firewall from v1 to v2](../../application-gateway/migrate-v1-v2.md).
63
63
64
-
When you complete the migration of v1 to v2, the Application Gateway v2 has a legacy WAF configuration.
64
+
When you complete the upgrade of v1 to v2, the Application Gateway v2 has a legacy WAF configuration.
65
65
2. Upgrade to Application Gateway WAF v2 with WAF Policy.
66
66
67
-
- If in Step 1 you migrated from Application Gateway Standard v1 to v2, see the previous section [Upgrade Application Gateway Standard v2 to Application Gateway WAF v2](#upgrade-application-gateway-standard-v2-to-application-gateway-waf-v2).
68
-
- If in Step 1, you migrated from Application Gateway WAF v1 to Application Gateway WAF v2 with legacy configuration, see the previous section [Migrate WAF v2 with legacy WAF configuration to WAF policy](#migrate-waf-v2-with-legacy-waf-configuration-to-waf-policy) to migrate to Application Gateway WAF v2 SKU with WAF policy.
67
+
- If in Step 1 you upgraded from Application Gateway Standard v1 to v2, see the previous section [Upgrade Application Gateway Standard v2 to Application Gateway WAF v2](#upgrade-application-gateway-standard-v2-to-application-gateway-waf-v2).
68
+
- If in Step 1, you upgraded from Application Gateway WAF v1 to Application Gateway WAF v2 with legacy configuration, see the previous section [Upgrade WAF v2 with legacy WAF configuration to WAF policy](#upgrade-waf-v2-with-legacy-waf-configuration-to-waf-policy) to migrate to Application Gateway WAF v2 SKU with WAF policy.
0 commit comments