Skip to content

Commit f8fedc0

Browse files
committed
feat: Update IP feature links
1 parent f4660b8 commit f8fedc0

File tree

2 files changed

+4
-5
lines changed

2 files changed

+4
-5
lines changed

content/nap-waf/v4/configuration-guide/configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ When configuring NGINX App Protect WAF, `app_protect_enable` should always be en
3939
|[XFF headers & trust](#xff-headers-and-trust) | Disabled by default. User can enable it and optionally add a list of custom XFF headers. |
4040
|[gRPC Protection](#grpc-protection-for-unary-traffic) | gRPC content profile detects malformed content, parses well-formed content, and extracts the text fields for detecting attack signatures and disallowed meta-characters. In addition, it enforces size restrictions and prohibition of unknown fields. The Interface Definition Language (IDL) files for the gRPC API must be attached to the profile. gRPC protection can be on [unary](#grpc-protection-for-unary-traffic) or [bidirectional](#grpc-protection-for-bidirectional-streaming) traffic.|
4141
|[Brute Force Attack Preventions](#brute-force-attack-preventions) | Configure brute-force-attack-preventions parameters to secured areas of a web application from brute force attacks.|
42-
|[IP Groups](#ip-address-lists) | Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|
43-
|[IP Intelligence](#ip-Intelligence) | Configure the IP Intelligence feature to customize enforcement based on the source IP of the request, limiting access from IP addresses with questionable reputation.|
42+
|[IP Groups](#ip-groups) | Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|
43+
|[IP Intelligence](#ip-intelligence-configuration) | Configure the IP Intelligence feature to customize enforcement based on the source IP of the request, limiting access from IP addresses with questionable reputation.|
4444

4545
### Disallowed File Types
4646
{{< include "nap-waf/config/common/disallowed-file-types.md" >}}

content/nap-waf/v5/configuration-guide/configuration.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ This guide explains the F5 NGINX App Protect WAF security features and how to us
1515

1616
For more information on the NGINX App Protect WAF security features, see [NGINX App Protect WAF Terminology](#nginx-app-protect-waf-terminology).
1717

18-
1918
## Supported Security Policy Features
2019

2120
|Protection Mechanism | Description |
@@ -38,8 +37,8 @@ For more information on the NGINX App Protect WAF security features, see [NGINX
3837
|[gRPC Protection](#grpc-protection-for-unary-traffic) | gRPC content profile detects malformed content, parses well-formed content, and extracts the text fields for detecting attack signatures and disallowed meta-characters. In addition, it enforces size restrictions and prohibition of unknown fields. The Interface Definition Language (IDL) files for the gRPC API must be attached to the profile. gRPC protection can be on [unary](#grpc-protection-for-unary-traffic) or [bidirectional](#grpc-protection-for-bidirectional-streaming) traffic.|
3938
|[Secure Traffic Between NGINX and App Protect Enforcer using mTLS](#secure-traffic-between-nginx-and-app-protect-enforcer-using-mtls) | Disabled by default. You can manually configure mTLS to secure the traffic between NGINX and App Protect Enforcer.|
4039
|[Brute Force Attack Preventions](#brute-force-attack-preventions) | Configure brute-force-attack-preventions parameters to secured areas of a web application from brute force attacks.|
41-
|[IP Groups](#ip-address-lists) | Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|
42-
|[IP Intelligence](#ip-Intelligence) | Configure the IP Intelligence feature to customize enforcement based on the source IP of the request, limiting access from IP addresses with questionable reputation.|
40+
|[IP Groups](#ip-groups) | Configure IP Groups feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes.|
41+
|[IP Intelligence](#ip-intelligence-configuration) | Configure the IP Intelligence feature to customize enforcement based on the source IP of the request, limiting access from IP addresses with questionable reputation.|
4342

4443
### Disallowed File Types
4544

0 commit comments

Comments
 (0)