You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for Nginx App Protect to work and must match 127.0.0.1:50000{{< /call-out >}}
30
+
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for F5 WAF for NGINX to work and must match 127.0.0.1:50000{{< /call-out >}}
31
31
32
32
33
33
3. Enable F5 WAF for NGINX with the `app_protect_enable` directives in the appropriate scope. The `app_protect_enable` directive may be set in the `http`, `server`, and `location` contexts.
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in NGINX App Protect. These policies are supported in both the blocking and transparent enforcement modes.
89
-
For more information on these policies refer the NGINX App Protect[configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
88
+
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in F5 WAF for NGINX. These policies are supported in both the blocking and transparent enforcement modes.
89
+
For more information on these policies refer the F5 WAF for NGINX[configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
90
90
91
91
The following table shows the path to the precompiled policy file that needs to be used with the `app_protect_policy_file` directive:
92
92
@@ -99,11 +99,11 @@ The following table shows the path to the precompiled policy file that needs to
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the App Protect section.
102
+
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the F5 WAF for NGINX section.
103
103
104
104
## Custom policies
105
105
106
-
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to NGINX App Protect Instances using the API or Azure Portal.
106
+
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to F5 WAF for NGINX Instances using the API or Azure Portal.
107
107
108
108
### Manage custom policies
109
109
@@ -121,7 +121,7 @@ In the policy editor:
121
121
- The **File path** must start with the prefix "/etc/app_protect/conf/".
122
122
- The **File path** extension must be ".json".
123
123
124
-
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the NGINX App Protect[configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
124
+
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the F5 WAF for NGINX[configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
125
125
126
126
{{< call-out "note" >}}The **name** field within the security policy must be unique among the policies referenced in your NGINX configuration.{{< /call-out >}}
Copy file name to clipboardExpand all lines: content/nginxaas-azure/app-protect/enable-logging.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,11 +9,11 @@ type:
9
9
10
10
## Overview
11
11
12
-
F5 NGINXaaS for Azure (NGINXaaS) supports exporting NGINX App Protect logs to an Azure Storage account or to a Log Analytics workspace.
12
+
F5 NGINXaaS for Azure (NGINXaaS) supports exporting F5 WAF for NGINX logs to an Azure Storage account or to a Log Analytics workspace.
13
13
14
14
## Setting up operational logs
15
15
16
-
NGINX App Protect operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
16
+
F5 WAF for NGINX operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
17
17
18
18
## Setting up security logs
19
19
@@ -93,7 +93,7 @@ The following table shows the path to the log configuration file that needs to b
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the App Protect section.
96
+
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the F5 WAF for NGINX section.
Copy file name to clipboardExpand all lines: content/nginxaas-azure/app-protect/enable-waf.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ This guide explains how to enable F5 WAF for NGINX on a F5 NGINX as a Service fo
14
14
## Before you start
15
15
- F5 WAF for NGINX can only be enabled on NGINXaaS for Azure deployments with the **Standard v2**[plan]({{< ref "/nginxaas-azure/billing/overview.md" >}})
16
16
17
-
## Enable NGINX App Protect
17
+
## Enable F5 WAF for NGINX
18
18
19
-
NGINX App Protect is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
19
+
F5 WAF for NGINX is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
20
20
21
21
### Using the Microsoft Azure Portal
22
22
@@ -26,7 +26,7 @@ Access the [Microsoft Azure portal](https://portal.azure.com)
Copy file name to clipboardExpand all lines: content/nginxaas-azure/changelog/changelog.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ NGINXaaS now supports downloading certificate from Azure Key Vault via Private E
39
39
40
40
- {{% icon-feature %}} **Support for both precompiled and custom WAF policies in the same NGINX config**
41
41
42
-
NGINXaaS now allows both precompiled and custom policies for F5 NGINX App Protect WAF to be referenced within the same NGINX config. This removes a previous restriction.
42
+
NGINXaaS now allows both precompiled and custom policies for F5 WAF for NGINX to be referenced within the same NGINX config. This removes a previous restriction.
Copy file name to clipboardExpand all lines: content/nginxaas-azure/loadbalancer-kubernetes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The NLK controller monitors [Kubernetes Services](https://kubernetes.io/docs/con
46
46
47
47
### Example use cases
48
48
49
-
- You can use NGINXaaS for Azure to enforce rate limiting and application security with NGINX App Protect, then forward all accepted traffic to your Kubernetes applications.
49
+
- You can use NGINXaaS for Azure to enforce rate limiting and application security with F5 WAF for NGINX, then forward all accepted traffic to your Kubernetes applications.
50
50
- You can use NGINXaaS for Azure to receive traffic on `api.example.com` and route requests by URL path - for example, forwarding `/login` to a Kubernetes-based login service, `/graph` to a Kubernetes-hosted graph service, and `/process` to an application server on a standalone VM.
0 commit comments