You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -20,9 +20,11 @@ There are two types of match variables in an IP address match: `RemoteAddr` and
20
20
21
21
By default, your web application is accessible from the internet. If you want to limit access to clients from a list of known IP addresses or IP address ranges, you can create an IP matching rule that contains the list of IP addresses as matching values and sets the operator to `Not` (negate is true) and the action to `Block`. After an IP restriction rule is applied, requests that originate from addresses outside this allowed list receive a 403 Forbidden response.
22
22
23
-
## Configure a WAF policy with the Azure portal
23
+
## Configure a WAF policy
24
24
25
-
Follow these steps to configure a WAF policy by using the Azure portal.
25
+
#### [Portal](#tab/browser)
26
+
27
+
Follow these steps to configure a WAF policy using the Azure portal.
26
28
27
29
### Prerequisites
28
30
@@ -41,8 +43,8 @@ Create an Azure Front Door profile by following the instructions described in [Q
41
43
|Subscription |Select your subscription.|
42
44
|Resource group |Select the resource group where your Azure Front Door instance is located.|
43
45
|Policy name |Enter a name for your policy.|
44
-
|Policy state |Selected.|
45
-
|Policy mode|Prevention.|
46
+
|Policy state |Selected|
47
+
|Policy mode|Prevention|
46
48
47
49
1. Select **Next: Managed rules**.
48
50
@@ -86,9 +88,9 @@ Create an Azure Front Door profile by following the instructions described in [Q
86
88
> [!NOTE]
87
89
> A private IP address was intentionally used in the custom rule to guarantee the rule would trigger. In an actual deployment, create *allow* and *deny* rules by using IP addresses for your particular situation.
88
90
89
-
##Configure a WAF policy with the Azure CLI
91
+
#### [CLI](#tab/azure-devops-cli)
90
92
91
-
Follow these steps to configure a WAF policy by using the Azure CLI.
93
+
Follow these steps to configure a WAF policy using the Azure CLI.
92
94
93
95
### Prerequisites
94
96
Before you begin to configure an IP restriction policy, set up your CLI environment and create an Azure Front Door profile.
@@ -173,17 +175,18 @@ In this example, the WAF policy is applied to `FrontendEndpoints[0]`. You can li
173
175
> [!Note]
174
176
> You need to set the `WebApplicationFirewallPolicyLink` property only once to link a WAF policy to an Azure Front Door front end. Subsequent policy updates are automatically applied to the front end.
175
177
176
-
## Configure a WAF policy with Azure PowerShell
178
+
#### [Azure PowerShell](#tab/powershell)
179
+
177
180
178
-
Follow these steps to configure a WAF policy by using Azure PowerShell.
181
+
Follow these steps to configure a WAF policy using Azure PowerShell.
179
182
180
183
### Prerequisites
181
184
Before you begin to configure an IP restriction policy, set up your PowerShell environment and create an Azure Front Door profile.
182
185
183
186
#### Set up your PowerShell environment
184
187
Azure PowerShell provides a set of cmdlets that use the [Azure Resource Manager](../../azure-resource-manager/management/overview.md) model for managing Azure resources.
185
188
186
-
You can install [Azure PowerShell](/powershell/azure/) on your local machine and use it in any PowerShell session. Follow the instructions on the page to sign in to PowerShell by using your Azure credentials and then install the Az module.
189
+
You can install [Azure PowerShell](/powershell/azure/) on your local machine and use it in any PowerShell session. Follow the instructions on the page to sign in to PowerShell by using your Azure credentials and then install the Az PowerShell module module.
187
190
188
191
1. Connect to Azure by using the following command and then use an interactive dialog to sign in.
189
192
```
@@ -257,8 +260,11 @@ Link a WAF policy object to an existing front-end host and update Azure Front Do
257
260
> [!NOTE]
258
261
> In this example, the WAF policy is applied to `FrontendEndpoints[0]`. You can link a WAF policy to any of your front ends. You need to set the `WebApplicationFirewallPolicyLink` property only once to link a WAF policy to an Azure Front Door front end. Subsequent policy updates are automatically applied to the front end.
259
262
260
-
## Configure a WAF policy with a Resource Manager template
261
-
To view the template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
263
+
#### [Template](#tab/yaml)
264
+
265
+
To view the Resource Manager template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
0 commit comments