Skip to content

Commit 89e57ea

Browse files
committedOct 24, 2018
add images
1 parent 58088b0 commit 89e57ea

File tree

3 files changed

+6
-1
lines changed

3 files changed

+6
-1
lines changed
 

‎articles/application-gateway/application-gateway-waf-configuration.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.workload: infrastructure-services
8-
ms.date: 10/11/2018
8+
ms.date: 10/25/2018
99
ms.author: victorh
1010

1111
---
@@ -18,6 +18,9 @@ The Azure Application Gateway web application firewall (WAF) provides protection
1818
> Configuration of WAF request size limits and exclusion lists is currently in public preview. This preview is provided without a service level agreement and isn't recommended for production workloads. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
1919
2020
## WAF request size limits
21+
22+
![Request size limits](media/application-gateway-waf-configuration/waf-requestsizelimit.png)
23+
2124
Web Application Firewall allows users to configure request size limits within lower and upper bounds. The following two size limits configurations are available:
2225

2326
- The maximum request body size field is specified in KBs and controls overall request size limit excluding any file uploads. This field can range from 1-KB minimum to 128-KB maximum value. The default value for request body size is 128 KB.
@@ -27,6 +30,8 @@ WAF also offers a configurable knob to turn the request body inspection on or of
2730

2831
## WAF exclusion lists
2932

33+
![waf-exclusion.png](media/application-gateway-waf-configuration/waf-exclusion.png)
34+
3035
WAF exclusion lists allow users to omit certain request attributes from a WAF evaluation. A common example is Active Directory inserted tokens that are used for authentication or password fields. Such attributes are prone to contain special characters that may trigger a false positive from the WAF rules. Once an attribute is added to the WAF exclusion list, it isn't taken into consideration by any configured and active WAF rule. Exclusion lists are global in scope.
3136
You can add request headers, request body, request cookies, or request query string arguments to WAF exclusion lists. If the body has form data or XML/JSON (key value pairs) then request attribute exclusion type can be used.
3237

Loading

0 commit comments

Comments
 (0)
Please sign in to comment.