Skip to content

Commit cb793bd

Browse files
committed
Updates from PR review
1 parent 903f7fe commit cb793bd

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ For example, a single *Critical* rule match is enough for the WAF to block a req
5656

5757
When your WAF uses older version of the default rule set (before DRS 2.0), your WAF runs in the traditional mode. Traffic that matches any rule is considered independently of any other rule matches. In traditional mode, you don't have visiblity into the complete set of rules that a specific request matched.
5858

59+
The version of the DRS that you use also determines which content types are supported for request body inspection. For more information, see [What content types does WAF support?](waf-faq.yml#what-content-types-does-waf-support-) in the FAQ.
60+
5961
### DRS 2.0
6062

6163
DRS 2.0 includes 17 rule groups, as shown in the following table. Each group contains multiple rules, which can be disabled.

0 commit comments

Comments
 (0)