Forum Discussion
pkingi_72523
Nimbostratus
Apr 19, 2010Can irules be used to match source address infromation before and after SNAT?
We are using an F5 as an SSL-offload and then again as a reverse proxy. In both cases, the source address is natted.
We have an IPS after the SSL-offload and before the reverse proxy that does detect attacks but attacks appear to come from the SSL_offload address.
We need to determine what the original source of attacks are so are looking to see if irules can provide some information to trace back to the original source.
Anyone else deal with this type of issue? Keen to hear how to get around this....
cheers
Patrick
1 Reply
- hoolio
Cirrostratus
Hi Patrick,
LTM can insert a custom HTTP header named X-Forwarded-For (or any arbitrary name) with the original client IP address. To configure this you can create a custom HTTP profile and enable the 'insert X-Forwarded-For' option. If you want to insert a custom named header, you can do this with the HTTP profile options. Set the 'request header to remove' to MY_CUSTOM_HEADER and set the 'request header to insert' to MY_CUSTOM_HEADER: [IP::client_addr].
The IPS would need to be able to read the custom HTTP header instead of the IP header.
Aaron
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects