Skip to content

Commit 7cf69ec

Browse files
authored
Merge pull request #299140 from halkazwini/waf-appgw-custom
Freshness
2 parents dc57856 + 4961ac7 commit 7cf69ec

File tree

2 files changed

+11
-15
lines changed

2 files changed

+11
-15
lines changed

articles/web-application-firewall/ag/create-custom-waf-rules.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Create and use v2 custom rules
2+
title: Create and use WAF v2 custom rules on Application Gateway
33
titleSuffix: Azure Web Application Firewall
44
description: This article provides information on how to create Web Application Firewall (WAF) v2 custom rules in Azure Application Gateway.
55
author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-web-application-firewall
88
ms.topic: how-to
9-
ms.date: 04/06/2023
9+
ms.date: 04/30/2025
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

@@ -19,9 +19,7 @@ This article shows you some example custom rules that you can create and use wit
1919
The JSON snippets shown in this article are derived from a [ApplicationGatewayWebApplicationFirewallPolicies](/azure/templates/microsoft.network/applicationgatewaywebapplicationfirewallpolicies) resource.
2020

2121
>[!NOTE]
22-
> If your application gateway is not using the WAF tier, the option to upgrade the application gateway to the WAF tier appears in the right pane.
23-
24-
![Enable WAF][fig1]
22+
> If your application gateway isn't using the WAF tier, the option to upgrade the application gateway to the WAF tier appears in the right pane.
2523
2624
## Example 1
2725

@@ -50,7 +48,7 @@ $rule = New-AzApplicationGatewayFirewallCustomRule `
5048
-State Enabled
5149
```
5250

53-
And here's the corresponding JSON:
51+
Corresponding JSON:
5452

5553
```json
5654
{
@@ -111,7 +109,7 @@ $rule = New-AzApplicationGatewayFirewallCustomRule `
111109
-State Enabled
112110
```
113111

114-
And the corresponding JSON:
112+
Corresponding JSON:
115113

116114
```json
117115
{
@@ -169,7 +167,7 @@ $rule = New-AzApplicationGatewayFirewallCustomRule `
169167
-State Enabled
170168
```
171169

172-
And the corresponding JSON:
170+
Corresponding JSON:
173171

174172
```json
175173
{
@@ -229,7 +227,7 @@ $rule = New-AzApplicationGatewayFirewallCustomRule `
229227
-State Enabled
230228
```
231229

232-
Here's the corresponding JSON:
230+
Corresponding JSON:
233231

234232
```json
235233
{
@@ -299,7 +297,7 @@ $condition2 = New-AzApplicationGatewayFirewallCondition `
299297
-State Enabled
300298
```
301299

302-
Here's the corresponding JSON:
300+
Corresponding JSON:
303301

304302
```json
305303
{
@@ -390,7 +388,7 @@ $rule2 = New-AzApplicationGatewayFirewallCustomRule `
390388
-State Enabled
391389
```
392390

393-
And the corresponding JSON:
391+
Corresponding JSON:
394392

395393
```json
396394
{
@@ -534,7 +532,7 @@ $rule = New-AzApplicationGatewayFirewallCustomRule `
534532
-State Enabled
535533
```
536534

537-
And here's the corresponding JSON:
535+
Corresponding JSON:
538536

539537
```json
540538
{
@@ -568,8 +566,6 @@ And here's the corresponding JSON:
568566
}
569567
```
570568

571-
## Next steps
569+
## Next step
572570

573571
After you create your custom rules, you can learn how to view your WAF logs. For more information, see [Application Gateway diagnostics](../../application-gateway/application-gateway-diagnostics.md#diagnostic-logging).
574-
575-
[fig1]: ../media/create-custom-waf-rules/1.png
Binary file not shown.

0 commit comments

Comments
 (0)