You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The NGINX App Protect WAF package has the following dependencies:
39
39
@@ -216,7 +216,7 @@ If a user other than **nginx** is to be used, note the following:
216
216
sudo service nginx start
217
217
```
218
218
219
-
14. As of version 4.15.0, a new feature feature `IP Intelligence` is available. The feature requires the installation of an additional package to functionproperly:
219
+
14. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
220
220
221
221
```shell
222
222
sudo apk add app-protect-ip-intelligence
@@ -228,6 +228,11 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
232
+
```shell
233
+
service nginx restart
234
+
```
235
+
231
236
---
232
237
233
238
## Amazon Linux Installation
@@ -342,17 +347,22 @@ If a user other than **nginx** is to be used, note the following:
342
347
sudo systemctl start nginx
343
348
```
344
349
345
-
1. As of version 4.15.0, a new feature feature `IP Intelligence` is available. The feature requires the installation of an additional package to functionproperly:
350
+
1. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
Update your policy to include the new configuration, then restart the nginx service:
363
+
```shell
364
+
service nginx restart
365
+
```
356
366
357
367
## Debian Installation
358
368
@@ -493,17 +503,23 @@ If a user other than **nginx** is to be used, note the following:
493
503
sudo systemctl start nginx
494
504
```
495
505
496
-
16. As of version 4.15.0, a new feature feature `IP Intelligence` is available. The feature requires the installation of an additional package to function properly:
506
+
16. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to function properly:
Update your policy to include the new configuration, then restart the nginx service:
519
+
520
+
```shell
521
+
service nginx restart
522
+
```
507
523
508
524
{{< warning >}} Debian enables **AppArmor** by default, but NGINX App Protect WAF will run in unconfined mode after being installed as it is shipped with no AppArmor profile. To benefit from AppArmor access control capabilities for NGINX App Protect WAF, you will have to write your own AppArmor profile for NGINX App Protect WAF executables found in `/opt/app_protect/bin` such that it best suits your environment.
509
525
{{< /warning >}}
@@ -626,21 +642,27 @@ If a user other than **nginx** is to be used, note the following:
626
642
sudo systemctl start nginx
627
643
```
628
644
629
-
17. As of version 4.15.0, a new feature feature `IP Intelligence` is available. The feature requires the installation of an additional package to functionproperly:
645
+
17. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
@@ -765,10 +780,10 @@ If a user other than **nginx** is to be used, note the following:
765
780
sudo systemctl start nginx
766
781
```
767
782
768
-
1. As of version 4.15.0, a new feature feature `IP Intelligence` is available. The feature requires the installation of an additional package to functionproperly:
783
+
1. (Optional) A new feature feature `IP Intelligence` is available (version 4.15.0 and above). The feature requires the installation of an additional package to functionproperly:
769
784
770
785
```shell
771
-
sudo dnf install app-protect-ip-intelligence
786
+
sudo dnf install -y app-protect-ip-intelligence
772
787
```
773
788
774
789
After installing the package, run the client:
@@ -777,6 +792,11 @@ If a user other than **nginx** is to be used, note the following:
Update your policy to include the new configuration, then restart the nginx service:
796
+
```shell
797
+
service nginx restart
798
+
```
799
+
780
800
---
781
801
782
802
## Ubuntu Installation
@@ -877,7 +897,7 @@ If a user other than **nginx** is to be used, note the following:
877
897
app-protect=23+3.263.0-1~[OS_CODENAME]
878
898
```
879
899
880
-
Replace the [OS_CODENAME] in above the example with **jammy** for Ubuntu 22.04 and **noble** for Ubuntu 24.04.
900
+
Replace the [OS_CODENAME] in above the example with **focal** for Ubuntu 20.04, **jammy** for Ubuntu 22.04 and **noble** for Ubuntu 24.04.
881
901
<br>
882
902
<br>
883
903
@@ -912,10 +932,10 @@ If a user other than **nginx** is to be used, note the following:
912
932
sudo systemctl start nginx
913
933
```
914
934
915
-
16. As of version 4.15.0 (not avaiable for the deprecated Ubuntu 20.04), a new feature `IP Intelligence` is available. The feature requires the installation of an additional package to function properly:
935
+
16. (Optional), a new feature `IP Intelligence` is supported (Check the release notes for the App Protect versions that support IP Intelligence). The feature requires the installation of an additional package to function properly:
{{< note >}} Ubuntu 22.04 / Ubuntu 24.04 activates **AppArmor** by default, but NGINX App Protect WAF will run in unconfined mode after being installed as it is shipped with no AppArmor profile. To benefit from AppArmor access control capabilities for NGINX App Protect WAF, you will have to write your own AppArmor profile for NGINX App Protect WAF executables found in `/opt/app_protect/bin` such that it best suits your environment.
947
+
Verify the client is populating the database:
948
+
949
+
```shell
950
+
tail -f iprepd.log
951
+
```
952
+
953
+
Update your policy to include the new configuration for IP Intelligence, then reload the policy or restart the nginx service.
954
+
955
+
{{< note >}} Ubuntu 20.04 / Ubuntu 22.04 / Ubuntu 24.04 activates **AppArmor** by default, but NGINX App Protect WAF will run in unconfined mode after being installed as it is shipped with no AppArmor profile. To benefit from AppArmor access control capabilities for NGINX App Protect WAF, you will have to write your own AppArmor profile for NGINX App Protect WAF executables found in `/opt/app_protect/bin` such that it best suits your environment.
1. If not already configured, add NGINX App Protect WAF Security Updates repository by downloading the file `app-protect-9.repo` to `/etc/yum.repos.d`:
1. If not already configured, add NGINX App Protect WAF Security Updates repository by downloading the file `app-protect-9.repo` to `/etc/yum.repos.d`:
2392
2425
@@ -2501,7 +2534,7 @@ The App Protect Bot Signatures is named: app-protect-bot-signatures and it is a
2501
2534
```
2502
2535
2503
2536
2504
-
### Ubuntu 22.04
2537
+
### Ubuntu 20.04 / Ubuntu 22.04
2505
2538
2506
2539
1. If not already configured, add the NGINX App Protect WAF Security Updates repository:
2507
2540
@@ -2573,13 +2606,29 @@ In case of using the prebuilt SELinux policy module for NGINX App Protect WAF (a
2573
2606
2574
2607
You can uninstall the App Protect in below Operating Systems by using the following commands:
2575
2608
2576
-
### RHEL 8.1+ / Oracle Linux 8.1+ / RHEL 9+ / Rocky Linux 9
2609
+
### RHEL 8.1+ / Oracle Linux 8.1+ / RHEL 9+
2610
+
2611
+
If you have previously installed `app-protect-ip-intelligence` package, please make sure to uninstall it first:
2612
+
2613
+
```shell
2614
+
sudo dnf remove app-protect-ip-intelligence
2615
+
```
2616
+
2617
+
Then proceed with uninstalling App Protect packages:
0 commit comments