Skip to content

Commit d938026

Browse files
committed
adjust headings
1 parent 500e107 commit d938026

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

articles/web-application-firewall/afds/waf-front-door-configure-ip-restriction.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ There are two types of match variables in an IP address match: `RemoteAddr` and
2020

2121
By default, your web application is accessible from the internet. If you want to limit access to clients from a list of known IP addresses or IP address ranges, you can create an IP matching rule that contains the list of IP addresses as matching values and sets the operator to `Not` (negate is true) and the action to `Block`. After an IP restriction rule is applied, requests that originate from addresses outside this allowed list receive a 403 Forbidden response.
2222

23-
## Configure a WAF policy with the Azure portal
23+
## Configure a WAF policy
2424

2525
#### [Portal](#tab/browser)
2626

27-
Follow these steps to configure a WAF policy by using the Azure portal.
27+
Follow these steps to configure a WAF policy using the Azure portal.
2828

2929
### Prerequisites
3030

@@ -90,9 +90,7 @@ Create an Azure Front Door profile by following the instructions described in [Q
9090
9191
#### [CLI](#tab/azure-devops-cli)
9292

93-
## Configure a WAF policy with the Azure CLI
94-
95-
Follow these steps to configure a WAF policy by using the Azure CLI.
93+
Follow these steps to configure a WAF policy using the Azure CLI.
9694

9795
### Prerequisites
9896
Before you begin to configure an IP restriction policy, set up your CLI environment and create an Azure Front Door profile.
@@ -179,9 +177,8 @@ In this example, the WAF policy is applied to `FrontendEndpoints[0]`. You can li
179177
180178
#### [Azure PowerShell](#tab/powershell)
181179

182-
## Configure a WAF policy with Azure PowerShell
183180

184-
Follow these steps to configure a WAF policy by using Azure PowerShell.
181+
Follow these steps to configure a WAF policy using Azure PowerShell.
185182

186183
### Prerequisites
187184
Before you begin to configure an IP restriction policy, set up your PowerShell environment and create an Azure Front Door profile.
@@ -265,8 +262,7 @@ Link a WAF policy object to an existing front-end host and update Azure Front Do
265262
266263
#### [Template](#tab/yaml)
267264

268-
## Configure a WAF policy with a Resource Manager template
269-
To view the template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
265+
To view the Resource Manager template that creates an Azure Front Door policy and a WAF policy with custom IP restriction rules, go to [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.network/front-door-waf-clientip).
270266

271267
---
272268

0 commit comments

Comments
 (0)