You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/web-application-firewall/afds/waf-front-door-configure-ip-restriction.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,11 @@ There are two types of match variables in an IP address match: `RemoteAddr` and
20
20
21
21
By default, your web application is accessible from the internet. If you want to limit access to clients from a list of known IP addresses or IP address ranges, you can create an IP matching rule that contains the list of IP addresses as matching values and sets the operator to `Not` (negate is true) and the action to `Block`. After an IP restriction rule is applied, requests that originate from addresses outside this allowed list receive a 403 Forbidden response.
22
22
23
-
## Configure a WAF policy with the Azure portal
23
+
## Configure a WAF policy
24
24
25
25
#### [Portal](#tab/browser)
26
26
27
-
Follow these steps to configure a WAF policy by using the Azure portal.
27
+
Follow these steps to configure a WAF policy using the Azure portal.
28
28
29
29
### Prerequisites
30
30
@@ -90,9 +90,7 @@ Create an Azure Front Door profile by following the instructions described in [Q
90
90
91
91
#### [CLI](#tab/azure-devops-cli)
92
92
93
-
## Configure a WAF policy with the Azure CLI
94
-
95
-
Follow these steps to configure a WAF policy by using the Azure CLI.
93
+
Follow these steps to configure a WAF policy using the Azure CLI.
96
94
97
95
### Prerequisites
98
96
Before you begin to configure an IP restriction policy, set up your CLI environment and create an Azure Front Door profile.
@@ -179,9 +177,8 @@ In this example, the WAF policy is applied to `FrontendEndpoints[0]`. You can li
179
177
180
178
#### [Azure PowerShell](#tab/powershell)
181
179
182
-
## Configure a WAF policy with Azure PowerShell
183
180
184
-
Follow these steps to configure a WAF policy by using Azure PowerShell.
181
+
Follow these steps to configure a WAF policy using Azure PowerShell.
185
182
186
183
### Prerequisites
187
184
Before you begin to configure an IP restriction policy, set up your PowerShell environment and create an Azure Front Door profile.
@@ -265,8 +262,7 @@ Link a WAF policy object to an existing front-end host and update Azure Front Do
265
262
266
263
#### [Template](#tab/yaml)
267
264
268
-
## Configure a WAF policy with a Resource Manager template
269
-
To view the template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
265
+
To view the Resource Manager template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
0 commit comments