You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload">}}) command to make changes take effect
232
238
233
239
---
@@ -356,11 +362,14 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
365
+
Verify the client is populating the database:
366
+
360
367
```shell
361
-
service nginx restart
368
+
tail -f iprepd.log
362
369
```
363
370
371
+
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload">}}) command to make changes take effect
372
+
364
373
## Debian Installation
365
374
366
375
1. If you already have NGINX packages in your system, back up your configs and logs:
@@ -512,12 +521,14 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
516
-
524
+
Verify the client is populating the database:
525
+
517
526
```shell
518
-
service nginx restart
527
+
tail -f iprepd.log
519
528
```
520
529
530
+
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload" >}}) command to make changes take effect
531
+
521
532
{{< warning >}} Debian enables **AppArmor** by default, but NGINX App Protect WAF will run in unconfined mode after being installed as it is shipped with no AppArmor profile. To benefit from AppArmor access control capabilities for NGINX App Protect WAF, you will have to write your own AppArmor profile for NGINX App Protect WAF executables found in `/opt/app_protect/bin` such that it best suits your environment.
522
533
{{< /warning >}}
523
534
@@ -651,12 +662,14 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
655
-
665
+
Verify the client is populating the database:
666
+
656
667
```shell
657
-
service nginx restart
668
+
tail -f iprepd.log
658
669
```
659
670
671
+
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload">}}) command to make changes take effect
672
+
660
673
---
661
674
662
675
## RHEL 9+ Installation
@@ -777,7 +790,7 @@ If a user other than **nginx** is to be used, note the following:
777
790
sudo systemctl start nginx
778
791
```
779
792
780
-
1. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
793
+
1. (Optional) A new feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
781
794
782
795
```shell
783
796
sudo dnf install -y app-protect-ip-intelligence
@@ -789,11 +802,14 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
805
+
Verify the client is populating the database:
806
+
793
807
```shell
794
-
service nginx restart
808
+
tail -f iprepd.log
795
809
```
796
810
811
+
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload">}}) command to make changes take effect
812
+
797
813
---
798
814
799
815
## Ubuntu Installation
@@ -947,7 +963,7 @@ If a user other than **nginx** is to be used, note the following:
947
963
tail -f iprepd.log
948
964
```
949
965
950
-
Update your policy to include the new configuration for IP Intelligence, then reload the policy or restart the nginx service.
966
+
Update your policy to include the new configuration, then run [apreload]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#apreload" >}}) command to make changes take effect
951
967
952
968
{{< note >}} Ubuntu 20.04 / Ubuntu 22.04 / Ubuntu 24.04 activates **AppArmor** by default, but NGINX App Protect WAF will run in unconfined mode after being installed as it is shipped with no AppArmor profile. To benefit from AppArmor access control capabilities for NGINX App Protect WAF, you will have to write your own AppArmor profile for NGINX App Protect WAF executables found in `/opt/app_protect/bin` such that it best suits your environment.
0 commit comments