You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This document shows example of how to modify your NGINX configuration to enable F5 WAF for NGINX features.
14
+
This document shows examples of how to modify your NGINX configuration to enable F5 WAF for NGINX features.
16
15
17
16
It is intended as a reference for small, self-contained examples of how F5 WAF for NGINX can be configured.
18
17
19
-
Modules requiring the _Range_ header (Such as _Slice_) are unsupported in a scope which enables F5 WAF for NGINX. The examples below work around the contraints of these modules.
18
+
Important constraints when F5 WAF for NGINX is enabled:
19
+
20
+
- Subrequest-based modules (NGINX modules that create internal HTTP subrequests) are not inspected in any scope block where __app_protect_enable on__ is set. F5 WAF for NGINX inspects only direct, client-facing HTTP requests.
21
+
- Modules that require the HTTP Range header are not supported in the same configuration scope as __app_protect_enable on__. Place Range-dependent configuration in a server or location block without F5 WAF for NGINX enabled.
20
22
21
23
For additional information on configuring NGINX, you should view the [NGINX documentation]({{< ref "/nginx/" >}}).
22
24
23
-
## Internal subrequests
25
+
## Subrequest-based modules
24
26
25
-
F5 WAF for NGINX will secure and inspect direct client-facing requests, but will not inspect internal subrequests triggered by modules.
27
+
F5 WAF for NGINX inspects direct client-facing requests, but does not inspect internal subrequests generated by subrequest-based modules.
26
28
27
-
This applies to:
29
+
Examples of subrequest-based modules:
28
30
29
31
* njs (r.subrequest)
30
32
* Client authorization (auth_request)
31
33
* Mirror (mirror)
32
34
* SSI (virtual include)
33
35
34
-
The following example demonstrates the general rule:
36
+
### Example
35
37
36
38
{{< tabs name="subrequest-example" >}}
37
39
@@ -41,6 +43,10 @@ The following example demonstrates the general rule:
Features that add or depend on the HTTP Range header are unsupported in the same scope as __app_protect_enable__ on. Place Range-dependent logic in a separate scope that does not enable F5 WAF for NGINX, and have the F5 WAF for NGINX enable frontend proxy to that backend.
0 commit comments