Add the path to the file with the dynamic module Nemesida WAF and bring the parameters below in the configuration file
to the form:
# Nemesida WAF
## Request body is too large fix
nginx: [emerg] module "/etc/nginx/modules/ngx_http_waf_module.so" version 1017010 instead of 1022000 in /etc/nginx/nginx.conf:1
The error occurs when the versions of the installed dynamic module Nemesida WAF and Nginx do not match. In this case,
1017010 is the version of Nginx 1.17.10, for which the nwaf-dyn module was compiled, and
1022000 is Nginx 1.22.0 installed on the server. The dynamic module package nwaf-dyn-1.22 is designed to work with Nginx version 1.22, and nwaf-dyn-plus-r22 is designed to work with NGINX Plus R22.
Make the necessary changes to the configuration file
Restart the server and test:
# systemctl restart nginx.service nwaf_update.service
# systemctl status nginx.service nwaf_update.service
nwaf_update is responsible for obtaining signatures of the Nemesida WAF software. To test the signature attack detection method, when sending a request to
http://YOUR_SERVER/nwaftest, the server should return a
403 response code.
After Nemesida WAF installation you can install Nemesida WAF API and Nemesida WAF Cabinet, which is intended to visualise and classify the information about attacks and identified vulnerabilities.