Skip to content

Commit 17fa924

Browse files
authored
Replaced old name for F5 WAF for NGINX (#1369)
Replaced "NGINX App Protect WAF" (and the variations of it) with F5 WAF for NGINX
1 parent 503f036 commit 17fa924

File tree

6 files changed

+17
-17
lines changed

6 files changed

+17
-17
lines changed

content/nginxaas-azure/app-protect/configure-waf.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This guide explains how to configure the F5 WAF for NGINX security features.
1313

1414
## Configure
1515

16-
To use NGINX App Protect apply the following changes to the NGINX config file.
16+
To use F5 WAF for NGINX apply the following changes to the NGINX config file.
1717

1818
1. Load the F5 WAF for NGINX module on the main context:
1919

@@ -27,7 +27,7 @@ load_module modules/ngx_http_app_protect_module.so;
2727
app_protect_enforcer_address 127.0.0.1:50000;
2828
```
2929

30-
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for Nginx App Protect to work and must match 127.0.0.1:50000{{< /call-out >}}
30+
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for F5 WAF for NGINX to work and must match 127.0.0.1:50000{{< /call-out >}}
3131

3232

3333
3. Enable F5 WAF for NGINX with the `app_protect_enable` directives in the appropriate scope. The `app_protect_enable` directive may be set in the `http`, `server`, and `location` contexts.
@@ -44,7 +44,7 @@ app_protect_enable on;
4444
app_protect_policy_file /etc/app_protect/conf/NginxDefaultPolicy.json;
4545
```
4646

47-
Sample Config with App Protect configured:
47+
Sample Config with F5 WAF for NGINX configured:
4848

4949
```nginx
5050
user nginx;
@@ -85,8 +85,8 @@ http {
8585

8686
## Precompiled Policies
8787

88-
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in NGINX App Protect. These policies are supported in both the blocking and transparent enforcement modes.
89-
For more information on these policies refer the NGINX App Protect [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
88+
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in F5 WAF for NGINX. These policies are supported in both the blocking and transparent enforcement modes.
89+
For more information on these policies refer the F5 WAF for NGINX [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
9090

9191
The following table shows the path to the precompiled policy file that needs to be used with the `app_protect_policy_file` directive:
9292

@@ -99,11 +99,11 @@ The following table shows the path to the precompiled policy file that needs to
9999
| Strict | Transparent | /etc/app_protect/conf/NginxStrictPolicy_transparent.json |
100100
{{< /table >}}
101101

102-
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the App Protect section.
102+
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the F5 WAF for NGINX section.
103103

104104
## Custom policies
105105

106-
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to NGINX App Protect Instances using the API or Azure Portal.
106+
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to F5 WAF for NGINX Instances using the API or Azure Portal.
107107

108108
### Manage custom policies
109109

@@ -121,7 +121,7 @@ In the policy editor:
121121
- The **File path** must start with the prefix "/etc/app_protect/conf/".
122122
- The **File path** extension must be ".json".
123123

124-
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the NGINX App Protect [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
124+
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the F5 WAF for NGINX [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
125125

126126
{{< call-out "note" >}}The **name** field within the security policy must be unique among the policies referenced in your NGINX configuration.{{< /call-out >}}
127127

content/nginxaas-azure/app-protect/enable-logging.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ type:
99

1010
## Overview
1111

12-
F5 NGINXaaS for Azure (NGINXaaS) supports exporting NGINX App Protect logs to an Azure Storage account or to a Log Analytics workspace.
12+
F5 NGINXaaS for Azure (NGINXaaS) supports exporting F5 WAF for NGINX logs to an Azure Storage account or to a Log Analytics workspace.
1313

1414
## Setting up operational logs
1515

16-
NGINX App Protect operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
16+
F5 WAF for NGINX operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
1717

1818
## Setting up security logs
1919

@@ -93,7 +93,7 @@ The following table shows the path to the log configuration file that needs to b
9393
| log_grpc_blocked | /etc/app_protect/conf/log_grpc_blocked.json |
9494
{{< /table >}}
9595

96-
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the App Protect section.
96+
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the F5 WAF for NGINX section.
9797

9898
### Logging Destinations
9999

content/nginxaas-azure/app-protect/enable-waf.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ This guide explains how to enable F5 WAF for NGINX on a F5 NGINX as a Service fo
1414
## Before you start
1515
- F5 WAF for NGINX can only be enabled on NGINXaaS for Azure deployments with the **Standard v2** [plan]({{< ref "/nginxaas-azure/billing/overview.md" >}})
1616

17-
## Enable NGINX App Protect
17+
## Enable F5 WAF for NGINX
1818

19-
NGINX App Protect is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
19+
F5 WAF for NGINX is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
2020

2121
### Using the Microsoft Azure Portal
2222

@@ -26,7 +26,7 @@ Access the [Microsoft Azure portal](https://portal.azure.com)
2626

2727
2. Select NGINX app protect in the left menu.
2828

29-
3. Select **Enable App Protect**.
29+
3. Select **Enable F5 WAF for NGINX**.
3030

3131
## What's next
3232

content/nginxaas-azure/changelog/changelog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ NGINXaaS now supports downloading certificate from Azure Key Vault via Private E
3939

4040
- {{% icon-feature %}} **Support for both precompiled and custom WAF policies in the same NGINX config**
4141

42-
NGINXaaS now allows both precompiled and custom policies for F5 NGINX App Protect WAF to be referenced within the same NGINX config. This removes a previous restriction.
42+
NGINXaaS now allows both precompiled and custom policies for F5 WAF for NGINX to be referenced within the same NGINX config. This removes a previous restriction.
4343

4444
## September 18, 2025
4545

content/nginxaas-azure/loadbalancer-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The NLK controller monitors [Kubernetes Services](https://kubernetes.io/docs/con
4646

4747
### Example use cases
4848

49-
- You can use NGINXaaS for Azure to enforce rate limiting and application security with NGINX App Protect, then forward all accepted traffic to your Kubernetes applications.
49+
- You can use NGINXaaS for Azure to enforce rate limiting and application security with F5 WAF for NGINX, then forward all accepted traffic to your Kubernetes applications.
5050
- You can use NGINXaaS for Azure to receive traffic on `api.example.com` and route requests by URL path - for example, forwarding `/login` to a Kubernetes-based login service, `/graph` to a Kubernetes-hosted graph service, and `/process` to an application server on a standalone VM.
5151

5252
## Getting Started

content/nginxaas-azure/overview/feature-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Below is a feature breakdown with notes on support and limitations.
6161

6262
**Limitations:**
6363

64-
- Internal redirect and App Protect DoS are not available
64+
- Internal redirect and F5 WAF for NGINX DoS are not available
6565

6666
---
6767

0 commit comments

Comments
 (0)