You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/nap-waf/v4/configuration-guide/configuration.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,8 +38,8 @@ When configuring NGINX App Protect WAF, `app_protect_enable` should always be en
38
38
|[Deny and Allow IP lists](#deny-and-allow-ip-lists)| Manually define denied & allowed IP addresses as well as IP addresses to never log. |
39
39
|[XFF headers & trust](#xff-headers-and-trust)| Disabled by default. User can enable it and optionally add a list of custom XFF headers. |
40
40
|[gRPC Protection](#grpc-protection-for-unary-traffic)| gRPC content profile detects malformed content, parses well-formed content, and extracts the text fields for detecting attack signatures and disallowed meta-characters. In addition, it enforces size restrictions and prohibition of unknown fields. The Interface Definition Language (IDL) files for the gRPC API must be attached to the profile. gRPC protection can be on [unary](#grpc-protection-for-unary-traffic) or [bidirectional](#grpc-protection-for-bidirectional-streaming) traffic.|
41
-
|[Brute Force Attack Preventions](#brute-force-attack-preventions) | Configure brute-force-attack-preventions parameters to secured areas of a web application from brute force attacks.|}
42
-
|[IP Groups](#ip-address-lists) | Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|}
41
+
|[Brute Force Attack Preventions](#brute-force-attack-preventions)| Configure brute-force-attack-preventions parameters to secured areas of a web application from brute force attacks.|
42
+
|[IP Groups](#ip-address-lists)| Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|
43
43
44
44
### Disallowed File Types
45
45
{{< include "nap-waf/config/common/disallowed-file-types.md" >}}
@@ -760,7 +760,6 @@ Example2: Different brute force configurations can be defined for individual log
760
760
}
761
761
],
762
762
```
763
-
{{< note >}} For further configuration details, see NGINX App Protect WAF Declarative Policy Guide [Declarative Policy guide]({{< ref "/nap-waf/v4/declarative-policy/policy/#policy/brute-force-attack-preventions" >}}). {{< /note >}}
764
763
765
764
The following example adds all three of the pieces for a complete example policy.
766
765
@@ -823,6 +822,8 @@ The following example adds all three of the pieces for a complete example policy
823
822
}
824
823
```
825
824
825
+
{{< note >}} For further configuration details, see NGINX App Protect WAF Declarative Policy Guide [Declarative Policy guide]({{< ref "/nap-waf/v4/declarative-policy/policy/#policy/brute-force-attack-preventions" >}}). {{< /note >}}
0 commit comments