Skip to content

[Bug]: F5 WAF for NGINX's IP intelligence doesn't work with example Docker compose file. #1316

@0jsong

Description

@0jsong

Describe the bug you have identified

Hi.
I followed the IP Intelligence documentation using the provided Docker Compose file.
I can see that the container is running correctly and the WAF policy with IP Intelligence is applied, but requests from known malicious IPs(Tor browser) are not being blocked.

When I added /var/IpRep volumes on waf-enforcer container, request with Tor browser was blocked.

services:
  waf-enforcer:
    container_name: waf-enforcer
    image: waf-enforcer:5.9.0
    environment:
      - ENFORCER_PORT=50000
    ports:
      - "50000:50000"
    volumes:
      - /opt/app_protect/bd_config:/opt/app_protect/bd_config
      - /var/IpRep:/var/IpRep  # added IpRep volume

......

I found this by checking the Modify Manifest configuration files section in the documentation, which shows that the /var/IpRep directory should be shared with the waf-enforcer container.
It seems that this step is missing from the Docker Compose example.

Which product or products does this request relate to?

F5 WAF for NGINX

Steps to reproduce the bug

Deploy IP intelligence container with guide(https://docs.nginx.com/waf/policies/ip-intelligence/#modify-docker-compose-file).

What is the expected or desired behaviour?

IP intelligence blocks request from malicious IP.

What environments or versions does this bug affect?

  • NGINX Plus R35
  • F5 WAF for NGINX 5.9.0

Any additional information

No response

Metadata

Metadata

Assignees

Labels

🌋 p1Priority 1: Urgent issue impacts production environmentcommunityIssues or pull requests started by community membersproduct/wafIssues related to F5 WAF for NGINX

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions