Skip to content

Commit 7fd62c0

Browse files
committed
address feedback
1 parent 7768199 commit 7fd62c0

File tree

5 files changed

+66
-68
lines changed

5 files changed

+66
-68
lines changed
File renamed without changes.

content/nginx-one/nap-integration/add-cookies.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
66
nd-product: NGINX One Console
77
---
88

9-
# Managing Cookies in NAP Policy
9+
# Managing Cookies in F5 WAF Policy
1010
Cookies can be configured and managed directly within the policy editor by selecting the **Cookies** option.
1111

1212
## Cookie Properties and Types
1313
Each cookie configuration includes:
14-
- `Cookie Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section.
14+
- `Cookie Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section.
1515
- `Cookie Name`: The name of the cookie to be monitored or protected
1616
- `Enforcement Type`:
1717
- **Allow**: Permits the cookie with optional attack signature checks
@@ -44,18 +44,17 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
4444
1. Choose Cookie Type:
4545
- Select either `Explicit` for exact cookie matching or `Wildcard` for pattern-based matching
4646

47-
2. Configure Basic Properties:
47+
1. Configure Basic Properties:
4848
- Enter the `Cookie Name`
4949
- Choose whether to mask the cookie value in logs
5050

51-
3. Set Enforcement:
51+
1. Set Enforcement:
5252
- Choose whether to allow or disallow the cookie
5353
- If `Allow Cookie` is selected, you can optionally enable attack signatures
54+
- **⚠️ Important:** Attack signatures cannot be enabled for disallowed cookies.
5455

55-
**⚠️ Important:** Attack signatures cannot be enabled for disallowed cookies.
56-
57-
4. Optional: Configure Attack Signatures
56+
1. Optional: Configure Attack Signatures
5857
- If enabled, you can overwrite attack signatures for this specific cookie
5958
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
6059

61-
5. Click **Add Cookie** to save your configuration
60+
1. Click **Add Cookie** to save your configuration

content/nginx-one/nap-integration/add-parameters.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
66
nd-product: NGINX One Console
77
---
88

9-
# Managing Parameters in NAP Policy
9+
# Managing Parameters in F5 WAF Policy
1010
Parameters can be configured and managed directly within the policy editor by selecting the **Parameters** option.
1111

1212
## Parameter Properties and Types
1313
Each parameter configuration includes:
14-
- `Parameter Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section.
14+
- `Parameter Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section.
1515
- `Name`: The name of the parameter
1616
- `Location`: Where the parameter is expected (URL query string, POST data, etc.)
1717
- `Value Type`: The expected type of the parameter value (e.g., alpha-numeric, integer, email)
@@ -50,18 +50,18 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
5050
1. Choose Parameter Type:
5151
- Select either `Explicit` for exact parameter matching or `Wildcard` for pattern-based matching
5252

53-
2. Configure Basic Properties:
53+
1. Configure Basic Properties:
5454
- Enter the parameter `Name`
5555
- Select the `Location` where the parameter is expected
5656
- Choose the `Value Type` (alpha-numeric, integer, email, etc.)
5757
- Set the `Data Type` if applicable
5858

59-
3. Set Security Options:
59+
1. Set Security Options:
6060
- Choose whether to enable attack signatures
6161
- Decide if parameter value should be masked in logs which sets `sensitiveParameter` in [Parameter Configuration Reference]({{< ref "/waf/policies/parameter-reference.md" >}})
6262

63-
4. Optional: Configure Attack Signatures
63+
1. Optional: Configure Attack Signatures
6464
- If enabled, you can overwrite attack signatures for this specific parameter
6565
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
6666

67-
5. Click **Add Parameter** to save your configuration
67+
1. Click **Add Parameter** to save your configuration

content/nginx-one/nap-integration/add-signature-sets.md

Lines changed: 46 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ A **signature exception** allows you to explicitly enable or disable individual
2929
From NGINX One Console, select **App Protect > Policies**. In the screen that appears, select **Add Policy**. That action opens a screen where you can:
3030

3131
1. In **General Settings**, name and describe the policy.
32-
2. Navigate to the **Web Protection** tab and select **Attack Signature Sets**. Here, you can:
32+
1. Navigate to the **Web Protection** tab and select **Attack Signature Sets**. Here, you can:
3333
- View all enabled attack signature sets, including the default ones
3434
- Add new signature sets
3535
- Modify existing signature sets
@@ -64,58 +64,58 @@ To remove a signature set from your policy, you have two options:
6464

6565
1. Disable the set by setting both `alarm` and `block` to `false`:
6666

67-
```json
68-
{
69-
"policy": {
70-
"name": "no_xpath_policy",
71-
"template": { "name": "POLICY_TEMPLATE_NGINX_BASE" },
72-
"signature-sets": [
73-
{
74-
"name": "XPath Injection Signatures",
75-
"block": false,
76-
"alarm": false
77-
}
78-
]
67+
```json
68+
{
69+
"policy": {
70+
"name": "no_xpath_policy",
71+
"template": { "name": "POLICY_TEMPLATE_NGINX_BASE" },
72+
"signature-sets": [
73+
{
74+
"name": "XPath Injection Signatures",
75+
"block": false,
76+
"alarm": false
77+
}
78+
]
79+
}
7980
}
80-
}
81-
```
82-
83-
2. Use the `$action` meta-property to delete the set (preferred for better performance):
84-
85-
```json
86-
{
87-
"policy": {
88-
"name": "no_xpath_policy",
89-
"template": { "name": "POLICY_TEMPLATE_NGINX_BASE" },
90-
"signature-sets": [
91-
{
92-
"name": "XPath Injection Signatures",
93-
"$action": "delete"
94-
}
95-
]
81+
```
82+
83+
1. Use the `$action` meta-property to delete the set (preferred for better performance):
84+
85+
```json
86+
{
87+
"policy": {
88+
"name": "no_xpath_policy",
89+
"template": { "name": "POLICY_TEMPLATE_NGINX_BASE" },
90+
"signature-sets": [
91+
{
92+
"name": "XPath Injection Signatures",
93+
"$action": "delete"
94+
}
95+
]
96+
}
9697
}
97-
}
98-
```
98+
```
9999

100100
## Add signature exceptions
101101

102102
From the **Web Protection** tab, select **Attack Signature Exceptions**. This section allows you to override settings for individual signatures.
103103

104104
1. Click **Add Item** to create a new exception.
105-
2. Select the signature(s) you want to modify.
106-
3. Configure the exception. For example, to disable a specific signature:
105+
1. Select the signature(s) you want to modify.
106+
1. Configure the exception. For example, to disable a specific signature:
107107

108-
```json
109-
{
110-
"signatures": [
111-
{
112-
"name": "_mem_bin access",
113-
"enabled": false,
114-
"signatureId": 200100022
115-
}
116-
]
117-
}
118-
```
108+
```json
109+
{
110+
"signatures": [
111+
{
112+
"name": "_mem_bin access",
113+
"enabled": false,
114+
"signatureId": 200100022
115+
}
116+
]
117+
}
118+
```
119119

120120
### Advanced exception configuration
121121

@@ -172,8 +172,8 @@ To exclude multiple signatures, add each as a separate entity:
172172
After configuring signature sets and exceptions:
173173

174174
1. Select **Save Policy**. The policy JSON will be updated with your changes.
175-
2. Your policy will appear in the list under the name you provided.
176-
3. You can then [deploy]({{< ref "/nginx-one/nap-integration/deploy-policy.md/" >}}) the policy to either:
175+
1. Your policy will appear in the list under the name you provided.
176+
1. You can then [deploy]({{< ref "/nginx-one/nap-integration/deploy-policy.md/" >}}) the policy to either:
177177
- An instance
178178
- A Config Sync Group
179179

content/nginx-one/nap-integration/add-urls.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
66
nd-product: NGINX One Console
77
---
88

9-
# Managing URLs in NAP Policy
9+
# Managing URLs in F5 WAF Policy
1010
URLs can be configured and managed directly within the policy editor by selecting the **URLs** option.
1111

1212
## URL Properties and Types
1313
Each URL configuration includes:
14-
- `URL Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section
14+
- `URL Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section
1515
- `Method`: Specifies which HTTP methods are allowed (`GET`, `POST`, `PUT`, etc.)
1616
- `Protocol`: The protocol for the URL (`HTTP`/`HTTPS`)
1717
- `Enforcement Type`:
@@ -44,19 +44,18 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
4444
1. Choose URL Type:
4545
- Select either `Explicit` for exact URL matching or `Wildcard` for pattern-based matching
4646

47-
2. Configure Basic Properties:
47+
1. Configure Basic Properties:
4848
- Enter the `URL` path
4949
- Select allowed `Method(s)` (e.g., `GET`, `POST`, *)
5050
- Choose the `Protocol` (`HTTP`/`HTTPS`)
5151

52-
3. Set Enforcement:
52+
1. Set Enforcement:
5353
- Choose whether to allow or disallow the URL
5454
- If `Allow URL` is selected, you can optionally enable attack signatures
55+
- **⚠️ Important:** Attack signatures cannot be enabled for disallowed URLs.
5556

56-
**⚠️ Important:** Attack signatures cannot be enabled for disallowed URLs.
57-
58-
4. **Optional**: Configure Attack Signatures
57+
1. **Optional**: Configure Attack Signatures
5958
- If enabled, you can overwrite attack signatures for this specific URL
6059
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
6160

62-
5. Click **Add URL** to save your configuration
61+
1. Click **Add URL** to save your configuration

0 commit comments

Comments
 (0)