Not receiving X-Forwarded-For header in WAF

0

One of our client is trying to reach our application but they are not able to reach with 403 error. We have enabled WAF for this application with a custom rule looking for X-Forwarded-For header matching with an IP-set.However we notice that the X-Forwarded-For header is not present in the request from client. Since client IP is dynamic and they appeared to be behind a proxy server we couldnt use their source IP to whitelist in WAF and no changes can be made on proxy server. Any help on getting the X-Forwareded-For header in request or any other way to whitelist with any unique parameters.

Rahul
已提问 2 个月前367 查看次数
2 回答
0

If your application supports it, using API keys or tokens for authentication can bypass the need for IP whitelisting. This method can authenticate the request based on the provided token, regardless of the IP address. Shift the focus from IP-based whitelisting to application-level authentication, such as OAuth tokens, JWT tokens, or other mechanisms that validate the user or the client application rather than the IP address.

profile picture
专家
已回答 2 个月前
0

Are you using CloudFront, or another CDN in front of WAF? If so, make sure that the CDN is not stripping the header. If you do have a CDN in front of WAF, try accessing the resource (ALB, EIP, etc) directly, and see if you are still not seeing the X-Forwarded-For header.

If you are using CloudFront, this can be fixed by enabling the All Viewer origin request policy, which will ensure that all request headers (and cookies, and query params) are forwarded to the app.

profile pictureAWS
已回答 1 个月前
profile pictureAWS
专家
已审核 1 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则

相关内容