Skip to content

Commit ea600c7

Browse files
Merge pull request #218658 from vhorne/waf-afd-ip-restrict
update portal procedure to match current UI
2 parents 190eadb + 045f918 commit ea600c7

File tree

1 file changed

+16
-11
lines changed

1 file changed

+16
-11
lines changed

articles/web-application-firewall/afds/waf-front-door-configure-ip-restriction.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: web-application-firewall
55
author: vhorne
66
ms.service: web-application-firewall
77
ms.topic: article
8-
ms.date: 12/22/2020
8+
ms.date: 11/16/2022
99
ms.author: victorh
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1111
---
@@ -26,22 +26,25 @@ Create an Azure Front Door profile by following the instructions described in [Q
2626

2727
### Create a WAF policy
2828

29-
1. On the Azure portal, select **Create a resource**, type **Web application firewall** in the search box, and then select **Web Application Firewall (WAF)**.
29+
1. On the Azure portal, select **Create a resource**, type **Web application firewall** in the **Search services and marketplace** search box, press *Enter*, and then select **Web Application Firewall (WAF)**.
3030
2. Select **Create**.
3131
3. On the **Create a WAF policy** page, use the following values to complete the **Basics** tab:
3232

3333
|Setting |Value |
3434
|---------|---------|
3535
|Policy for |Global WAF (Front Door)|
36+
|Front door tier| Select Premium or Standard to match you Front Door tier|
3637
|Subscription |Select your subscription|
37-
|Resource group |Select the resource group where your Front Door is.|
38+
|Resource group |Select the resource group where your Front Door is located.|
3839
|Policy name |Type a name for your policy|
39-
|Policy state |Enabled|
40+
|Policy state |selected|
41+
|Policy mode|Prevention|
4042

41-
Select **Next: Policy settings**
43+
1. Select **Next:Managed rules**.
4244

43-
1. On the **Policy settings** tab, select **Prevention**. For the **Block response body**, type *You've been blocked!* so you can see that your custom rule is in effect.
44-
2. Select **Next: Managed rules**.
45+
1. Select **Next: Policy settings**
46+
47+
1. On the **Policy settings** tab, type *You've been blocked!* for the **Block response body**, so you can see that your custom rule is in effect.
4548
3. Select **Next: Custom rules**.
4649
4. Select **Add custom rule**.
4750
5. On the **Add custom rule** page, use the following test values to create a custom rule:
@@ -62,10 +65,12 @@ Create an Azure Front Door profile by following the instructions described in [Q
6265

6366
Select **Add**.
6467
6. Select **Next: Association**.
65-
7. Select **Add frontend host**.
66-
8. For **Frontend host**, select your frontend host and select **Add**.
67-
9. Select **Review + create**.
68-
10. After your policy validation passes, select **Create**.
68+
7. Select **Associate a Front door profile**.
69+
8. For **Frontend profile**, select your frontend profile.
70+
1. For **Domain**, select the domain.
71+
1. Select **Add**.
72+
1. Select **Review + create**.
73+
1. After your policy validation passes, select **Create**.
6974

7075
### Test your WAF policy
7176

0 commit comments

Comments
 (0)