You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/waf/changelog/2023.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,8 @@
1
1
---
2
2
title: "2023 archive"
3
-
# Weights are assigned in increments of 100: determines sorting order
4
3
weight: 200
5
-
# Creates a table of contents and sidebar, useful for large documents
6
4
toc: true
7
-
# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
8
5
nd-content-type: reference
9
-
# Intended for internal catalogue and search, case sensitive:
10
6
nd-product: F5WAFN
11
7
---
12
8
@@ -151,7 +147,7 @@ This release includes new signatures for Anti Automation (bot defense):
151
147
152
148
### **Important Notes**
153
149
154
-
- Starting with this release, the `app_protect_compressed_requests_action` directive has been deprecated from the nginx configuration. Now by default the enforcer will decompress all the HTTP compressed payload request and will apply the enforcement.
150
+
- Starting with this release, the `app_protect_compressed_requests_action` directive has been deprecated from the nginx configuration. Now by default the enforcer will decompress all the HTTP compressed payload request and will apply the enforcement.
155
151
156
152
- The F5 NGINX App Protect WAF has been enhanced to include response signature checks within the "filetypes" section. You have an option to enable the signature verification in the response by setting the `responseCheck` parameter to true. By default, this parameter is set to false. See [Restrict Response Signatures]({{< ref "/waf/policies/response-signatures.md" >}}) for more details.
This document describes how to use `apreload`, a tool for updating F5 WAF for NGINX configuration without reloading NGINX.
@@ -61,7 +55,7 @@ When calling _apreload_ directly, it is possible to run it while the previous ex
61
55
62
56
The new execution will will apply a new configuration, and the most recent configuration will only apply during during the execution period.
63
57
64
-
In a scenario where an execution from an NGINX reload is followed by a direct _ap_reload_ call, the NGINX workers with the new NGINX configuration will be loaded as soon as the Enforcer finishes processing the existing configuration.
58
+
In a scenario where an execution from an NGINX reload is followed by a direct _ap_reload_ call, the NGINX workers with the new NGINX configuration will be loaded as soon as the Enforcer finishes processing the existing configuration.
65
59
66
60
Once complete, the most recent F5 WAF for NGINX configuration will be loaded using with the same NGINX worker instances.
67
61
@@ -77,10 +71,10 @@ If you want to apply either of the two, reload NGINX instead of using _apreload_
77
71
78
72
## apreload events
79
73
80
-
_apreload_ events use the same format as operation log events written in the NGINX error log, reporting `configuration_load_success` or `configuration_load_failure` with JSON formatted details.
74
+
_apreload_ events use the same format as operation log events written in the NGINX error log, reporting `configuration_load_success` or `configuration_load_failure` with JSON formatted details.
81
75
82
-
If any of the configuration files are invalid, _apreload_ will discover that and return the proper error message in the `configuration_load_failure event`.
76
+
If any of the configuration files are invalid, _apreload_ will discover that and return the proper error message in the `configuration_load_failure event`.
83
77
84
-
The enforcer will continue to run with the previous working configuration.
78
+
The enforcer will continue to run with the previous working configuration.
85
79
86
80
For more information, see the [Operation logs]({{< ref "/waf/logging/operation-logs.md">}}) topic.
Copy file name to clipboardExpand all lines: content/waf/configure/compiler.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,14 @@
1
1
---
2
-
# We use sentence case and present imperative tone
3
2
title: "Build and use the compiler tool"
4
-
# Weights are assigned in increments of 100: determines sorting order
5
3
weight: 200
6
-
# Creates a table of contents and sidebar, useful for large documents
7
4
toc: true
8
-
# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
9
5
nd-content-type: how-to
10
6
nd-product: F5WAFN
11
7
---
12
8
13
9
This document describes how to use the F5 WAF for NGINX compiler, a tool for converting security policies and logging profiles from JSON to a bundle file that F5 WAF can process and apply.
14
10
15
-
You can use it to get the latest security updates for [Attack signatures]({{< ref "/waf/policies/attack-signatures.md" >}}), Threat campaigns and Bot signatures.
11
+
You can use it to get the latest security updates for [Attack signatures]({{< ref "/waf/policies/attack-signatures.md" >}}), Threat campaigns and Bot signatures.
16
12
17
13
The compiler is packaged as a Docker image and can executed using the Docker CLI or as part of a continuous integration/continuous delivery (CI/CD) pipeline.
18
14
@@ -106,7 +102,7 @@ You can can upgrade or downgrade one of the Signatures by specifying a specific
106
102
107
103
You can use the Docker registry API to list the available image tags.
108
104
109
-
Replace `<path-to-your-nginx-repo.key>` with the location of your client key and `<path-to-your-nginx-repo.crt>` with the location of your client certificate.
105
+
Replace `<path-to-your-nginx-repo.key>` with the location of your client key and `<path-to-your-nginx-repo.crt>` with the location of your client certificate.
This will transform any configuration that relies on external references into an inline configuration within the bundled source.
183
+
This will transform any configuration that relies on external references into an inline configuration within the bundled source.
188
184
189
185
Additionally, when `-include-source` is combined with `-full-export`, the policy.json within the bundle will contain the entire source policy, including any default settings from the base template.
This document describes the tools F5 WAF for NGINX has to convert existing resources or configuration files from a BIG-IP environment for use with F5 WAF for NGINX.
9
+
This document describes the tools F5 WAF for NGINX has to convert existing resources or configuration files from a BIG-IP environment for use with F5 WAF for NGINX.
16
10
17
11
{{< call-out "important" >}}
18
12
@@ -158,10 +152,10 @@ docker run -it --rm \
158
152
waf-compiler-<version-tag>:custom \
159
153
-i /tmp/convert/policy.xml \
160
154
-o /tmp/convert/policy.json \
161
-
--full-export
155
+
--full-export
162
156
```
163
157
164
-
### Keep full configuration (retain elements that may be invalid or irrelevant):
158
+
### Keep full configuration (retain elements that may be invalid or irrelevant)
0 commit comments