Skip to content

Commit 839a514

Browse files
authored
feat: Minor WAF fixes (#1230)
Closes #1199, #1210, #1214, #125, #1218, #1219
1 parent 7666fd8 commit 839a514

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

content/includes/waf/table-policy-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@
1313
| [Deny and Allow IP lists]({{< ref "/waf/policies/deny-allow-ip.md" >}}) | Manually define denied & allowed IP addresses as well as IP addresses to never log. |
1414
| [Disallowed file type extensions]({{< ref "/waf/policies/disallowed-extensions.md" >}}) | Support any file type, and includes a predefined list of file types by default |
1515
| [Evasion techniques]({{< ref "/waf/policies/evasion-techniques.md" >}}) | All evasion techniques are enabled by default, and can be disabled individually. These include directory traversal, bad escaped characters and more. |
16-
| [Geolocation]({{< ref "/waf/policies/geolocation.md" >}}) | |
17-
| [GraphQL protection]({{< ref "/waf/policies/graphql-protection.md" >}}) | |
16+
| [Geolocation]({{< ref "/waf/policies/geolocation.md" >}}) | The geolocation feature allows you to configure enforcement based on the location of an object using the two-letter ISO code representing a country. |
17+
| [GraphQL protection]({{< ref "/waf/policies/graphql-protection.md" >}}) | GraphQL protection allows you to configure enforcement for GraphQL, an API query language. |
1818
| [gRPC protection]({{< ref "/waf/policies/evasion-techniques.md" >}}) | gRPC protection detects malformed content, parses well-formed content, and extracts the text fields for detecting attack signatures and disallowed meta-characters. In addition, it enforces size restrictions and prohibition of unknown fields. The Interface Definition Language (IDL) files for the gRPC API must be attached to the profile. gRPC protection is available for unary or bidirectional traffic. |
1919
| [HTTP compliance]({{< ref "/waf/policies/http-compliance.md" >}}) | All HTTP protocol compliance checks are enabled by default except for GET with body and POST without body. It is possible to enable any of these two. Some of the checks enabled by default can be disabled, but others, such as bad HTTP version and null in request are performed by the NGINX parser and NGINX App Protect WAF only reports them. These checks cannot be disabled. |
2020
| [IP address lists]({{< ref "/waf/policies/ip-address-lists.md" >}}) | Organize lists of allowed and forbidden IP addresses across several lists with common attributes. |
2121
| [IP intelligence]({{< ref "/waf/policies/ip-intelligence.md" >}}) | Configure the IP Intelligence feature to customize enforcement based on the source IP of the request, limiting access from IP addresses with questionable reputation. |
22-
| [JWT protection]({{< ref "/waf/policies/jwt-protection.md" >}}) | |
22+
| [JWT protection]({{< ref "/waf/policies/jwt-protection.md" >}}) | JWT protection allows you to configure policies based on properties of JSON web tokens, such as their header and signature properties. |
2323
| [Server technology signatures]({{< ref "/waf/policies/server-technology-signatures.md" >}}) | Support adding signatures per added server technology. |
2424
| [Time-based signature staging]({{< ref "/waf/policies/time-based-signature-staging.md" >}}) | Time-based signature staging allows you to stage signatures for a specific period of time. During the staging period, violations of staged signatures are logged but not enforced. After the staging period ends, violations of staged signatures are enforced according to the policy's enforcement mode. |
2525
| [Threat campaigns]({{< ref "/waf/policies/threat-campaigns.md" >}}) | These are patterns that detect all the known attack campaigns. They are very accurate and have almost no false positives, but are very specific and do not detect malicious traffic that is not part of those campaigns. The default policy enables threat campaigns but it is possible to disable it through the respective violation. |

content/waf/fundamentals/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ It is platform-agnostic and supports a range of deployment options:
2828
1. [Virtual machine or bare metal]({{< ref "/waf/install/virtual-environment.md" >}})
2929
- NGINX and WAF components operate on the host system
3030
- Ideal for existing NGINX virtual environments
31-
1. [Kubernetes]({{< ref "/waf/install/kubernetes.md" >}})
32-
- Integrates NGINX and WAF components in a single pod
33-
- Ideal for scalable, cloud-native environments
3431
1. [Docker]({{< ref "/waf/install/docker.md" >}})
3532
- NGINX and WAF components are deployed as containers
3633
- Ideal for environments with multiple deployment stages
34+
1. [Kubernetes]({{< ref "/waf/install/kubernetes.md" >}})
35+
- Integrates NGINX and WAF components in a single pod
36+
- Ideal for scalable, cloud-native environments
3737

3838
For more details, see the [Technical specifications]({{< ref "/waf/fundamentals/technical-specifications.md" >}}).
3939

content/waf/fundamentals/technical-specifications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ You can deploy F5 WAF for NGINX in the following environments:
3030
| Amazon Linux | 2023 |
3131
| Debian | 11, 12 |
3232
| Oracle Linux | 8.1 |
33-
| Ubuntu | 22.04, 24.04 |
3433
| RHEL / Rocky Linux | 8, 9 |
34+
| Ubuntu | 22.04, 24.04 |
3535

3636
For release-specific packages, view the [Changelog]({{< ref "/waf/changelog.md" >}}).
3737

content/waf/policies/geolocation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ In the "_override-rules_" section there is one override rule named "_myFirstRule
6666

6767
```json
6868
{
69-
"policy": {T
69+
"policy": {
7070
"name": "override_rule_example",
7171
"template": { "name": "POLICY_TEMPLATE_NGINX_BASE" },
7272
"enforcementMode": "blocking",

0 commit comments

Comments
 (0)