Skip to content

Commit d1a79be

Browse files
Update create-custom-waf-rules.md
1 parent 973e98c commit d1a79be

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/web-application-firewall/ag/create-custom-waf-rules.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ And the corresponding JSON:
148148

149149
## Example 2
150150

151-
You want to allow traffic only from the US using the GeoMatch operator and still have the managed rules apply:
151+
You want to allow traffic only from the United States using the GeoMatch operator and still have the managed rules apply:
152152

153153
```azurepowershell
154154
$variable = New-AzApplicationGatewayFirewallMatchVariable `
@@ -207,7 +207,7 @@ And the corresponding JSON:
207207

208208
You want to block all requests from IP addresses in the range 198.168.5.0/24.
209209

210-
In this example, you'll block all traffic that comes from an IP addresses range. The name of the rule is *myrule1* and the priority is set to 10.
210+
In this example, you block all traffic that comes from an IP addresses range. The name of the rule is *myrule1* and the priority is set to 10.
211211

212212
Logic: p
213213

@@ -266,7 +266,7 @@ Corresponding CRS rule:
266266

267267
## Example 4
268268

269-
For this example, you want to block User-Agent *evilbot*, and traffic in the range 192.168.5.0/24. To accomplish this, you can create two separate match conditions, and put them both in the same rule. This ensures that if both *evilbot* in the User-Agent header **and** IP addresses from the range 192.168.5.0/24 are matched, then the request is blocked.
269+
For this example, you want to block User-Agent *evilbot*, and traffic in the range 192.168.5.0/24. To accomplish this, you can create two separate match conditions, and put them both in the same rule. This configuration ensures that if both *evilbot* in the User-Agent header **and** IP addresses from the range 192.168.5.0/24 are matched, then the request is blocked.
270270

271271
Logic: p **and** q
272272

@@ -509,7 +509,7 @@ Corresponding JSON:
509509

510510
## Example 7
511511

512-
It is not uncommon to see Azure Front Door deployed in front of Application Gateway. In order to make sure the traffic received by Application Gateway comes from the Front Door deployment, the best practice is to check if the `X-Azure-FDID` header contains the expected unique value. For more information on this, please see [How to lock down the access to my backend to only Azure Front Door](../../frontdoor/front-door-faq.yml#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-)
512+
It isn't uncommon to see Azure Front Door deployed in front of Application Gateway. In order to make sure the traffic received by Application Gateway comes from the Front Door deployment, the best practice is to check if the `X-Azure-FDID` header contains the expected unique value. For more information on securing access to your application using Azure Front Door, see [How to lock down the access to my backend to only Azure Front Door](../../frontdoor/front-door-faq.yml#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-)
513513

514514
Logic: **not** p
515515

0 commit comments

Comments
 (0)