Skip to content

Commit

Permalink
feat: Brute force doc fixes (#181)
Browse files Browse the repository at this point in the history
  • Loading branch information
ohad-perets authored Feb 10, 2025
1 parent 96d8185 commit 1c6176c
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 4 deletions.
6 changes: 4 additions & 2 deletions content/nap-waf/v4/configuration-guide/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -660,7 +660,8 @@ systematic, username/password combinations to discover legitimate authentication
To prevent brute force attacks, NGINX App Protect WAF monitors IP addresses, usernames, and the number of failed login attempts beyond a maximum threshold.
When brute force patterns are detected, the NGINX App Protect WAF policy either trigger an alarm or block the attack if the failed
login attempts reached a maximum threshold for a specific username or coming from a specific IP address.
To enable brute force protection, at least one login page must be created.
To enable brute force protection, at least one login page must be created.
The login page entity is created separately and is not included in the brute force configuration block.

---

Expand Down Expand Up @@ -722,7 +723,8 @@ Example1: A single brute force configuration is applied universally to all login
}
```

Example2: Different brute force configurations can be defined for individual login pages.
Example2: Different brute force configurations can be defined for individual login pages.
With each configuration referencing a specific login page.
```json
{
"policy": {
Expand Down
6 changes: 4 additions & 2 deletions content/nap-waf/v5/configuration-guide/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -798,7 +798,8 @@ systematic, username/password combinations to discover legitimate authentication
To prevent brute force attacks, NGINX App Protect WAF monitors IP addresses, usernames, and the number of failed login attempts beyond a maximum threshold.
When brute force patterns are detected, the NGINX App Protect WAF policy either trigger an alarm or block the attack if the failed
login attempts reached a maximum threshold for a specific username or coming from a specific IP address.
To enable brute force protection, at least one login page must be created.
To enable brute force protection, at least one login page must be created.
The login page entity is created separately and is not included in the brute force configuration block

---

Expand Down Expand Up @@ -861,7 +862,8 @@ Example1: A single brute force configuration is applied universally to all login
}
```

Example2: Different brute force configurations can be defined for individual login pages.
Example2: Different brute force configurations can be defined for individual login pages.
With each configuration referencing a specific login page.
```json
{
"policy": {
Expand Down

0 comments on commit 1c6176c

Please sign in to comment.