Skip to content

Commit b5d167d

Browse files
authored
Update ip-intelligence-conf.md
fixing product comments
1 parent 9f474b6 commit b5d167d

File tree

1 file changed

+4
-8
lines changed

1 file changed

+4
-8
lines changed

content/includes/nap-waf/config/common/ip-intelligence-conf.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,13 @@
11

22

3-
4-
NGINX App Protect WAF supports IP Intelligence feature which allows customizing the enforcement based on the source IP of the request to limit access from IP addresses with questionable reputation. Please note that:
5-
- The IP intelligence feature is **disabled** by default and needs to be explicitly enabled and configured in the policy.
6-
- The package `app-protect-ip-intelligence` must be installed (for NAP V4 deployments), or the IP Intelligence image deployed (for NAP V5 deployments), before configuring and using the feature. This package installs the client that downloads and updates the database required for enforcing IP Intelligence.
7-
8-
{{< note >}} Please refer to the installation steps relevant to NAP V4 or NAP V5, and check the optional steps for installing `app-protect-ip-intelligence` package per operating system, .
9-
{{< /note >}}
3+
NGINX App Protect WAF supports IP Intelligence feature, which allows customizing the enforcement based on the source IP of the request to limit access from IP addresses with questionable reputation. Please note that:
4+
- The IP intelligence feature is **disabled** by default and needs to be installed, enabled and configured within the policy.
5+
- To review the installation steps, please refer to the administration guide([V4]({{< ref "/nap-waf/v4/admin-guide/install.md#Prerequisites" >}})[V5]({{< ref "/nap-waf/v5/admin-guide/install.md#Prerequisites" >}})
106

117
After installing the package or image, enable the feature in the following two places in the policy:
128
1. By enabling the corresponding violation in the violation list: `"name": "VIOL_MALICIOUS_IP"` and assigning the appropriate `block` and `alarm` values to the violation.
139

14-
2. By enabling the featue in the corresponding IP Intelligence JSON section: `"ip-intelligence": {"enabled": true}` and define actions for the IP Intelligence categories listed below.
10+
2. By enabling the feature in the corresponding IP Intelligence JSON section: `"ip-intelligence": {"enabled": true}` and defining actions for the IP Intelligence categories listed below.
1511

1612
An example policy where both elements are enabled, and all the IP intelligence categories are configured to `block` and `alarm` can be found here:
1713

0 commit comments

Comments
 (0)