Skip to content

Commit 5a766a4

Browse files
authored
Merge branch 'main' into agent/add-missing-doc
2 parents a0750dc + 0fd8670 commit 5a766a4

File tree

13 files changed

+20
-20
lines changed

13 files changed

+20
-20
lines changed

content/includes/waf/policy.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -378,7 +378,7 @@ <h1 id="policy">policy</h1>
378378
<td><a href="#policy/signature-sets">signature-sets</a></td>
379379
<td>Yes</td>
380380
<td>array of objects</td>
381-
<td>Defines behavior when signatures found within a signature-set are detected in a request. Settings are culmulative, so if a signature is found in any set with block enabled, that signature will have block enabled.</td>
381+
<td>Defines behavior when signatures found within a signature-set are detected in a request. Settings are cumulative, so if a signature is found in any set with block enabled, that signature will have block enabled.</td>
382382
<td></td>
383383
</tr>
384384
<tr class="even">
@@ -3847,7 +3847,7 @@ <h2 id="policy/parameters">parameters</h2>
38473847
<li><strong>pipe</strong>: pipe-separated values. Array color=["blue","black"] -&gt; color=blue|black.</li>
38483848
<li><strong>form</strong>: ampersand-separated values. Array color=["blue","black"] -&gt; color=blue,black.</li>
38493849
<li><strong>matrix</strong>: semicolon-prefixed values. Array color=["blue","black"] -&gt; ;color=blue,black.</li>
3850-
<li><strong>tsv</strong>: tab-separated values. Array color=["blue","black"] -&gt; color=bluetblack.</li>
3850+
<li><strong>tsv</strong>: tab-separated values. Array color=["blue","black"] -&gt; color=blue black.</li>
38513851
<li><strong>csv</strong>: comma-separated values. Array color=["blue","black"] -&gt; color=blue,black.</li>
38523852
<li><strong>label</strong>: dot-prefixed values. Array color=["blue","black"] -&gt; .blue.black.</li>
38533853
<li><strong>multi</strong>: multiple parameter instances rather than multiple values. Array color=["blue","black"] -&gt; color=blue&amp;color=black.</li>

content/waf/configure/nginx-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Certain features do not work well with NGINX, such as modules requiring _subrequ
2020

2121
Modules requiring the _Range_ header (Such as _Slice_) are also unsupported in a scope which enables F5 WAF for NGINX.
2222

23-
The examples below show work arounds for the limitations of these features.
23+
The examples below show workarounds for the limitations of these features.
2424

2525
For information on configuring NGINX, you should view the [NGINX documentation]({{< ref "/nginx/" >}}).
2626

content/waf/configure/secure-mtls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ stream {
8282
}
8383
```
8484

85-
- _upstream enforcer_ specifices the server, which listens on port 4431 by default
85+
- _upstream enforcer_ specifies the server, which listens on port 4431 by default
8686
- _proxy_pass_ indicates that requests should be routed through the enforcer upstream
8787
- _proxy_ssl_certificate_ and _proxy_ssl_certificate_key_ are for the client (NGINX) credentials
8888
- _proxy_ssl_trusted_certificate_ enables the server (enforcer) verification

content/waf/install/disconnected-environment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ To complete this guide, you will need the following prerequisites:
3030

3131
These instructions outline the broad, conceptual steps involved with working with a disconnected environment. You will need to make adjustments based on your specific security requirements.
3232

33-
Some users may be able to use a USB stick to transfer necessary set-up artefacts, whereas other users may be able to use tools such as SSH or SCP.
33+
Some users may be able to use a USB stick to transfer necessary set-up artifacts, whereas other users may be able to use tools such as SSH or SCP.
3434

35-
In the following sections, the term _connected environment_ refers to the environment with access to the internet you will use to download set-up artefacts.
35+
In the following sections, the term _connected environment_ refers to the environment with access to the internet you will use to download set-up artifacts.
3636

37-
The term _disconnected environment_ refers to the final environment the F5 WAF for NGINX installation is intended to run in, and is the target to transfer set-up artefacts from the connected environment.
37+
The term _disconnected environment_ refers to the final environment the F5 WAF for NGINX installation is intended to run in, and is the target to transfer set-up artifacts from the connected environment.
3838

3939
## Download and run the documentation website locally
4040

content/waf/install/docker.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ There are three kinds of Docker deployments available:
3535
- Hybrid configuration
3636
- Single container configuration
3737

38-
The multi-container configuration is recommended if you are building a new system, and deploys the F5 for WAF module and its components in seperate images, allowing for nuanced version management.
38+
The multi-container configuration is recommended if you are building a new system, and deploys the F5 for WAF module and its components in separate images, allowing for nuanced version management.
3939

4040
The hybrid configuration is suitable if you want to add F5 WAF for NGINX to an existing virtual environment and wish to use Docker for the F5 WAF components instead of installing and configuring WAF packages as explained in the [Virtual machine or bare metal]({{< ref "/waf/install/virtual-environment.md" >}}) instructions.
4141

@@ -486,7 +486,7 @@ sudo apk add openssl ca-certificates app-protect-module-plus
486486

487487
Create a file for the F5 WAF for NGINX repository:
488488

489-
**/etc/yum.repos.d/app-protect-x-oss.repoo**
489+
**/etc/yum.repos.d/app-protect-x-oss.repo**
490490

491491
```shell
492492
[app-protect-x-oss]

content/waf/install/kubernetes-plm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ There are two new features available for Kubernetes through early access:
2424

2525
<!-- Policy lifecycle management (PLM) is a system for managing, compiling and deploying security policies in Kubernetes environments. -->
2626

27-
They extends the WAF compiler capabilities by providing a native Kubernetes operater-based approach for policy orchestration.
27+
They extends the WAF compiler capabilities by providing a native Kubernetes operator-based approach for policy orchestration.
2828

2929
These feature revolve around a _Policy Controller_ which uses the Kubernetes operator pattern to manage the lifecycle of WAF security artifacts.
3030

content/waf/logging/security-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Content is mandatory. If the entire content field or any of its attributes are n
9898

9999
#### Default logging content
100100

101-
This is the content of `log_default.json`. It is pre-compield (built-in) and is used by default when `app_protect_security_log_enabled on` is set, but `app_protect_security_log` is not:
101+
This is the content of `log_default.json`. It is pre-compiled (built-in) and is used by default when `app_protect_security_log_enabled on` is set, but `app_protect_security_log` is not:
102102

103103
```json
104104
{
@@ -228,7 +228,7 @@ The table below lists attributes that are generated in the security logs. When u
228228
| bot_anomalies | Comma-separated list of anomalies that were detected. | default, grpc |
229229
| bot_category | The category of the detected bot. | default, grpc |
230230
| bot_signature_name | The name of the detected bot. | default, grpc |
231-
| client_class | The classification of the client. It can have one of the following values: `N/A`, `Suspicious Browser`, `Malicous Bot`, `Trusted Bot`, `Untrusted Bot`. If the client is classified as standard browser, then the value is `N/A`. | default, grpc |
231+
| client_class | The classification of the client. It can have one of the following values: `N/A`, `Suspicious Browser`, `Malicious Bot`, `Trusted Bot`, `Untrusted Bot`. If the client is classified as standard browser, then the value is `N/A`. | default, grpc |
232232
| date_time | The date and time the request was received by App Protect. | default, grpc |
233233
| dest_port | The port assigned to listen to incoming requests. | default, grpc |
234234
| enforced_bot_anomalies | Comma-separated list of anomalies that caused the request to be blocked. | default, grpc |

content/waf/policies/attack-signatures.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Since the "All Signatures" set is not included in the default policy, turning OF
8181

8282
The only way to remove signature sets is to remove or disable sets that are part of the [default policy]({{< ref "/waf/policies/configuration.md#default-policy" >}}).
8383

84-
For example, in the below default policy, even though all signature alarm and block settings are set to false, attack signatures enforcement cannot be ignoredas some of the signature sets will be enabled in their strict policy.
84+
For example, in the below default policy, even though all signature alarm and block settings are set to false, attack signatures enforcement cannot be ignored as some of the signature sets will be enabled in their strict policy.
8585

8686
If you want to remove a specific signature set, you must explicitly mention it under the [strict policy]({{< ref "/waf/policies/configuration.md#strict-policy" >}}).
8787

content/waf/policies/configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The [Build and use the compiler tool]({{< ref "/waf/configure/compiler.md" >}})
2929
| Feature | Description |
3030
| -------------- | ----------- |
3131
| Blocking pages | The user can customize all blocking pages. By default the AJAX response pages are disabled, but the user can enable them. |
32-
| Enforcement by violation rating | By default block requests that are declared as threats, which are ated 4 or 5. It is possible to change this behavior: either disable enforcement by Violation Rating or block also request with Violation Rating 3 - needs examination. |
32+
| Enforcement by violation rating | By default block requests that are declared as threats, which are rated 4 or 5. It is possible to change this behavior: either disable enforcement by Violation Rating or block also request with Violation Rating 3 - needs examination. |
3333
| Large request blocking | To increase the protection of resources at both the NGINX Plus and upstream application tiers, all requests that are larger than 10 MB in size are blocked. When these requests are blocked, a `VIOL_REQUEST_MAX_LENGTH` violation will be logged.|
3434
| Malformed cookie | Requests with cookies that are not RFC compliant are blocked by default. This can be disabled. |
3535
| Parameter parsing | Support only auto-detect parameter value type and acts according to the result: plain alphanumeric string, XML or JSON. |

content/waf/policies/data-guard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Examples include credit card numbers (CCN), Social Security numbers (SSN) or cus
2020

2121
Sensitive data is either blocked or masked based on configuration.
2222

23-
Thes following example enables _blocking mode_:
23+
The following example enables _blocking mode_:
2424

2525
```json
2626
{
@@ -90,7 +90,7 @@ Data masking allows a page to load while masking all sensitive data.
9090

9191
This final example shows partial masking using a custom pattern.
9292

93-
Custom patterns are defined in _customPatternsList_, with the numbers of unmaked leading and trailing characters defined by _firstCustomCharactersToExpose_ and _lastCustomCharactersToExpose_, respectively.
93+
Custom patterns are defined in _customPatternsList_, with the numbers of unmasked leading and trailing characters defined by _firstCustomCharactersToExpose_ and _lastCustomCharactersToExpose_, respectively.
9494

9595
```json
9696
{

0 commit comments

Comments
 (0)