Skip to content

Commit fa1e473

Browse files
committed
Updates
1 parent 51f1e6f commit fa1e473

File tree

4 files changed

+23
-5
lines changed

4 files changed

+23
-5
lines changed

articles/web-application-firewall/ag/application-gateway-waf-configuration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,18 @@ ms.custom: devx-track-azurepowershell
1414

1515
The Azure Application Gateway Web Application Firewall (WAF) provides protection for web applications. This article describes WAF request size limits and exclusion lists configuration. These settings are located in the WAF Policy associated to your Application Gateway. To learn more about WAF Policies, see [Azure Web Application Firewall on Azure Application Gateway](ag-overview.md) and [Create Web Application Firewall policies for Application Gateway](create-waf-policy-ag.md)
1616

17-
![Request size limits](../media/application-gateway-waf-configuration/waf-policy.png)
18-
1917
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. The rest of the request is evaluated as normal.
2018

2119
For example, Active Directory inserts tokens that are used for authentication. When used in a request header, these tokens can contain special characters that may trigger a false positive from the WAF rules. By adding the header to an exclusion list, you can configure WAF to ignore the header, but WAF still evaluates the rest of the request.
2220

2321
Exclusion lists are global in scope.
2422

23+
To set exclusion lists in the Azure portal, configure **Exclusions** in the WAF policy resource's **Policy settings** page:
24+
25+
![Screenshot of the Azure portal that shows the exclusions configuration for the W A F policy.](../media/application-gateway-waf-configuration/waf-policy-exclusions.png)
26+
27+
## Attributes
28+
2529
The following attributes can be added to exclusion lists by name. The values of the chosen field aren't evaluated against WAF rules, but their names still are (see Example 1 below, the value of the User-Agent header is excluded from WAF evaluation). The exclusion lists remove inspection of the field's value.
2630

2731
* Request Headers

articles/web-application-firewall/ag/application-gateway-waf-request-size-limits.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,13 @@ ms.custom: devx-track-azurepowershell
1212

1313
# Web Application Firewall request size limits
1414

15-
Web Application Firewall allows you to configure request size limits within lower and upper bounds. The following two size limits configurations are available:
15+
Web Application Firewall allows you to configure request size limits within lower and upper bounds.
16+
17+
Request size limits are global in scope.
18+
19+
## Limits
20+
21+
The following two size limits configurations are available:
1622

1723
- The maximum request body size field is specified in kilobytes and controls overall request size limit excluding any file uploads. This field has a minimum value of 8 KB and a maximum value of 128 KB. The default value for request body size is 128 KB.
1824
- The file upload limit field is specified in MB and it governs the maximum allowed file upload size. This field can have a minimum value of 1 MB and the following maximums:
@@ -23,12 +29,20 @@ Web Application Firewall allows you to configure request size limits within lowe
2329

2430
The default value for file upload limit is 100 MB.
2531

26-
For CRS 3.2 (on the WAF_v2 SKU) and newer, these limits are as follows when using a WAF Policy for Appplication Gateway:
32+
For CRS 3.2 (on the WAF_v2 SKU) and newer, these limits are as follows when using a WAF policy for Appplication Gateway:
2733

2834
- 2MB request body size limit
2935
- 4GB file upload limit
3036

31-
WAF also offers a configurable knob to turn the request body inspection on or off. By default, the request body inspection is enabled. If the request body inspection is turned off, WAF doesn't evaluate the contents of HTTP message body. In such cases, WAF continues to enforce WAF rules on headers, cookies, and URI. If the request body inspection is turned off, then maximum request body size field isn't applicable and can't be set. Turning off the request body inspection allows for messages larger than 128 KB to be sent to WAF, but the message body isn't inspected for vulnerabilities.
37+
To set request size limits in the Azure portal, configure **Global parameters** in the WAF policy resource's **Policy settings** page:
38+
39+
![Screenshot of the Azure portal that shows the request size limits configuration for the W A F policy.](../media/application-gateway-waf-request-size-limits/waf-policy-limits.png)
40+
41+
## Request body inspection
42+
43+
WAF also offers a configurable knob to turn the request body inspection on or off. By default, the request body inspection is enabled. If the request body inspection is turned off, WAF doesn't evaluate the contents of HTTP message body. In such cases, WAF continues to enforce WAF rules on headers, cookies, and URI. If the request body inspection is turned off, then maximum request body size field isn't applicable and can't be set.
44+
45+
Turning off the request body inspection allows for messages larger than 128 KB to be sent to WAF, but the message body isn't inspected for vulnerabilities.
3246

3347
## Next steps
3448

110 KB
Loading
110 KB
Loading

0 commit comments

Comments
 (0)