: X-Forwarded-For on Cloud NGFW for AWS
Focus
Focus

X-Forwarded-For on Cloud NGFW for AWS

Table of Contents

X-Forwarded-For on Cloud NGFW for AWS

The ingress traffic to your applications might pass through AWS load balancers or proxy servers before it reaches the NGFW. Because these devices intercept traffic between the source and destination, the NGFW sees the IP address of the load balancer or proxy server instead of the IP address of the source. These devices add the X-Forwarded-For (XFF) header to HTTP requests and add the actual IPv4 or IPv6 address of the client accessing your application.
Traffic to your applications might have passed more than one proxy server before it reaches the NGFW. The XFF request header might contain multiple IP addresses that are separated by commas. NGFW always uses the most recently added address in the XFF header to enforce policy.
When configuring your rulestack, you can enable Cloud NGFW to use the source IP address in an XFF HTTP header field to enforce security policy.