You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is the example code used in the [Deploy an Access Control policy](https://docs.nginx.com/nginx-ingress-controller/configuration/access-control/) documentation.
3
+
This is the example code used in the [Deploy a Policy for access control](https://docs.nginx.com/nginx-ingress-controller/configuration/access-control/) documentation.
Copy file name to clipboardExpand all lines: site/content/configuration/access-control.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,11 @@
1
1
---
2
-
title: Deploy an Access Control policy
2
+
title: Deploy a Policy for access control
3
3
weight: 900
4
4
toc: true
5
5
docs: DOCS-000
6
6
---
7
7
8
-
This topic describes how to apply and update an Access Control policy with F5 NGINX Ingress Controller.
9
-
10
-
It demonstrates this using an example application and a [VirtualServer custom resource]({{< ref "/configuration/virtualserver-and-virtualserverroute-resources.md" >}})
8
+
This topic describes how to use F5 NGINX Ingress Controller to apply and update a Policy for access control. It demonstrates it using an example application and a [VirtualServer custom resource]({{< ref "/configuration/virtualserver-and-virtualserverroute-resources.md" >}}).
11
9
12
10
---
13
11
@@ -45,7 +43,7 @@ kubectl apply -f webapp.yaml
45
43
46
44
---
47
45
48
-
## Deploy an Access Control policy
46
+
## Deploy a Policy to create a deny rule
49
47
50
48
Create a file named _access-control-policy-deny.yaml_. The highlighted _deny_ field will be used by the example application, and should be changed to the subnet of your machine.
51
49
@@ -93,21 +91,21 @@ The *403* response is expected, successfully blocking your machine.
93
91
94
92
---
95
93
96
-
## Update the policy
94
+
## Update the Policy to create an allow rule
97
95
98
-
Create a new policy with the file _access-control-policy-allow.yaml_, updating the _allow_ field to the subnet of your machine.
96
+
Update the Policy with the file _access-control-policy-allow.yaml_, setting the _allow_ field to the subnet of your machine.
0 commit comments