Skip to content

Commit e4626d8

Browse files
authored
Remove restriction on combination of WAF policies (#1181)
Removes restriction on the combination of both precompiled and custom policies in an NGINX config.
1 parent 1b6095b commit e4626d8

File tree

3 files changed

+5
-11
lines changed

3 files changed

+5
-11
lines changed

content/nginxaas-azure/app-protect/configure-waf.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -125,14 +125,10 @@ After your policy has been saved, you can then reference it in your NGINX config
125125

126126
{{< call-out "note" >}}The **name** field within the security policy must be unique among the policies referenced in your NGINX configuration.{{< /call-out >}}
127127

128-
{{< call-out "warning" >}}Referencing both custom and precompiled policies in your NGINX configuration is not supported at this time.
129-
As a workaround, make a copy of the default policy you want to use, then add it as a custom policy with a different name.
130-
{{< /call-out >}}
131-
132128
The **Custom Policies** tab shows the status of your custom policies (Compilation and Application Status). Custom policies are automatically compiled when created or modified. Policies that are applied to the NGINX configuration cannot be deleted until they are first removed from the configuration.
133129

134130
It is highly recommended to use logging to monitor the performance of F5 WAF for NGINX and to help diagnose problems. See [Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}}) for directions to configure security and operational logs.
135131

136132
## What's next
137133

138-
[Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}})
134+
[Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}})

content/nginxaas-azure/changelog.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,10 @@ Users can now test the availability of specific IP addresses from their deployme
2323

2424
NGINXaaS now supports downloading certificate from Azure Key Vault via Private Endpoints. This will allow users to increase network security by disabling public access on their Key Vault. For more information, please visit [Integrate with Private Endpoint]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#integrate-with-private-endpoint" >}})
2525

26+
- {{% icon-feature %}} **Support for both precompiled and custom WAF policies in the same NGINX config**
27+
28+
NGINXaaS now allows both precompiled and custom policies for F5 NGINX App Protect WAF to be referenced within the same NGINX config. This removes a previous restriction.
29+
2630
## September 18, 2025
2731

2832
- {{% icon-feature %}} **Notification on update to deployments using the Stable Upgrade Channel**

content/nginxaas-azure/known-issues.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,6 @@ Updating managed identities on an NGINXaaS deployment after creation may result
1717

1818
**Workaround**: To avoid this issue, when you create an NGINXaaS deployment, make sure that the managed identity with access to AKV is assigned during initial creation. If managed identities need to be updated after creation, enable public access to AKV or [configure Network Security Perimeter]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#configure-network-security-perimeter-nsp" >}})
1919

20-
### {{% icon-bug %}} Custom and precompiled security policies cannot both be referenced in an NGINX configuration
21-
22-
When using F5 WAF for NGINX, you can only reference default or custom security policies in your NGINX configuration, not both.
23-
24-
**Workaround**: Make a copy of the default policy you want to use, then add it as a custom policy with a different name.
25-
2620
### {{% icon-bug %}} Terraform fails to apply due to validation errors, but creates "Failed" resources in Azure (ID-4424)
2721

2822
Some validation errors are caught later in the creation process, and can leave behind "Failed" resources in Azure. An example initial failure might look like:

0 commit comments

Comments
 (0)