You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/nginx-one/nap-integration/add-cookies.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
6
6
nd-product: NGINX One Console
7
7
---
8
8
9
-
# Managing Cookies in NAP Policy
9
+
# Managing Cookies in F5 WAF Policy
10
10
Cookies can be configured and managed directly within the policy editor by selecting the **Cookies** option.
11
11
12
12
## Cookie Properties and Types
13
13
Each cookie configuration includes:
14
-
-`Cookie Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section.
14
+
-`Cookie Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section.
15
15
-`Cookie Name`: The name of the cookie to be monitored or protected
16
16
-`Enforcement Type`:
17
17
-**Allow**: Permits the cookie with optional attack signature checks
@@ -44,18 +44,17 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
44
44
1. Choose Cookie Type:
45
45
- Select either `Explicit` for exact cookie matching or `Wildcard` for pattern-based matching
46
46
47
-
2. Configure Basic Properties:
47
+
1. Configure Basic Properties:
48
48
- Enter the `Cookie Name`
49
49
- Choose whether to mask the cookie value in logs
50
50
51
-
3. Set Enforcement:
51
+
1. Set Enforcement:
52
52
- Choose whether to allow or disallow the cookie
53
53
- If `Allow Cookie` is selected, you can optionally enable attack signatures
54
+
-**⚠️ Important:** Attack signatures cannot be enabled for disallowed cookies.
54
55
55
-
**⚠️ Important:** Attack signatures cannot be enabled for disallowed cookies.
56
-
57
-
4. Optional: Configure Attack Signatures
56
+
1. Optional: Configure Attack Signatures
58
57
- If enabled, you can overwrite attack signatures for this specific cookie
59
58
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
60
59
61
-
5. Click **Add Cookie** to save your configuration
60
+
1. Click **Add Cookie** to save your configuration
Copy file name to clipboardExpand all lines: content/nginx-one/nap-integration/add-parameters.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
6
6
nd-product: NGINX One Console
7
7
---
8
8
9
-
# Managing Parameters in NAP Policy
9
+
# Managing Parameters in F5 WAF Policy
10
10
Parameters can be configured and managed directly within the policy editor by selecting the **Parameters** option.
11
11
12
12
## Parameter Properties and Types
13
13
Each parameter configuration includes:
14
-
-`Parameter Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section.
14
+
-`Parameter Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section.
15
15
-`Name`: The name of the parameter
16
16
-`Location`: Where the parameter is expected (URL query string, POST data, etc.)
17
17
-`Value Type`: The expected type of the parameter value (e.g., alpha-numeric, integer, email)
@@ -50,18 +50,18 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
50
50
1. Choose Parameter Type:
51
51
- Select either `Explicit` for exact parameter matching or `Wildcard` for pattern-based matching
52
52
53
-
2. Configure Basic Properties:
53
+
1. Configure Basic Properties:
54
54
- Enter the parameter `Name`
55
55
- Select the `Location` where the parameter is expected
56
56
- Choose the `Value Type` (alpha-numeric, integer, email, etc.)
57
57
- Set the `Data Type` if applicable
58
58
59
-
3. Set Security Options:
59
+
1. Set Security Options:
60
60
- Choose whether to enable attack signatures
61
61
- Decide if parameter value should be masked in logs which sets `sensitiveParameter` in [Parameter Configuration Reference]({{< ref "/waf/policies/parameter-reference.md" >}})
62
62
63
-
4. Optional: Configure Attack Signatures
63
+
1. Optional: Configure Attack Signatures
64
64
- If enabled, you can overwrite attack signatures for this specific parameter
65
65
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
66
66
67
-
5. Click **Add Parameter** to save your configuration
67
+
1. Click **Add Parameter** to save your configuration
Copy file name to clipboardExpand all lines: content/nginx-one/nap-integration/add-signature-sets.md
+46-46Lines changed: 46 additions & 46 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ A **signature exception** allows you to explicitly enable or disable individual
29
29
From NGINX One Console, select **App Protect > Policies**. In the screen that appears, select **Add Policy**. That action opens a screen where you can:
30
30
31
31
1. In **General Settings**, name and describe the policy.
32
-
2. Navigate to the **Web Protection** tab and select **Attack Signature Sets**. Here, you can:
32
+
1. Navigate to the **Web Protection** tab and select **Attack Signature Sets**. Here, you can:
33
33
- View all enabled attack signature sets, including the default ones
34
34
- Add new signature sets
35
35
- Modify existing signature sets
@@ -64,58 +64,58 @@ To remove a signature set from your policy, you have two options:
64
64
65
65
1. Disable the set by setting both `alarm` and `block` to `false`:
Copy file name to clipboardExpand all lines: content/nginx-one/nap-integration/add-urls.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ nd-content-type: how-to
6
6
nd-product: NGINX One Console
7
7
---
8
8
9
-
# Managing URLs in NAP Policy
9
+
# Managing URLs in F5 WAF Policy
10
10
URLs can be configured and managed directly within the policy editor by selecting the **URLs** option.
11
11
12
12
## URL Properties and Types
13
13
Each URL configuration includes:
14
-
-`URL Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/nap-policy-matching-types.md" >}}) section
14
+
-`URL Type`: `Explicit` or `Wildcard`. For details on explicit and wildcard matching, see the [Matching Types: Explicit vs Wildcard]({{< ref "/nginx-one/waf-policy-matching-types.md" >}}) section
15
15
-`Method`: Specifies which HTTP methods are allowed (`GET`, `POST`, `PUT`, etc.)
16
16
-`Protocol`: The protocol for the URL (`HTTP`/`HTTPS`)
17
17
-`Enforcement Type`:
@@ -44,19 +44,18 @@ See the [Supported Violations]({{< ref "/waf/policies/violations.md#supported-vi
44
44
1. Choose URL Type:
45
45
- Select either `Explicit` for exact URL matching or `Wildcard` for pattern-based matching
- If `Allow URL` is selected, you can optionally enable attack signatures
55
+
-**⚠️ Important:** Attack signatures cannot be enabled for disallowed URLs.
55
56
56
-
**⚠️ Important:** Attack signatures cannot be enabled for disallowed URLs.
57
-
58
-
4.**Optional**: Configure Attack Signatures
57
+
1.**Optional**: Configure Attack Signatures
59
58
- If enabled, you can overwrite attack signatures for this specific URL
60
59
- For details on signature configuration, refer to the documentation on [Add Signature Sets]({{< ref "/nginx-one/nap-integration/add-signature-sets.md/" >}})
0 commit comments