Search:     Advanced search
Browse by category:
Glossary | Ask question

How to enable X-Forwarded-For option on ASF?
Add comment
Views: 455
Votes: 0
Comments: 2

ArrayOS ASF supports the function of inserting the client IP address into HTTP requests for the specified HTTP profile. After this function is enabled for an HTTP profile that is applied to a security service, client IP addresses that hit the security service will be forwarded to real services associated with the security service.

Why we require X-Forwarded-For option:

The X-Forwarded-For (XFF) header is a de-facto standard header for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or a load balancer. When traffic is intercepted between clients and servers, server access logs contain the IP address of the proxy or load balancer only. To see the original IP address of the client, the X-Forwarded-For request header is used.

Please follow below instructions to enable X-Forwarded-For option through webui:

  • Login into ASF webui.
  • Expand “Application Defense” option under security Defense.


  • Click on “HTTP Profile” and click on “Request Security” option.
  • Click on “Request Header” under “Request Security” options
  •  Enable the “X-Forwarded-For” option in section “Transferring Client IP to Backend Server”
  • Selection value as “Header” in Transfer Mode.
  • Click on Apply Changes and save configuration globally.



  • We can also define custom header name by mentioning the require header name in “Custom Entity Name” option.




Please follow below instructions to enable X-Forwarded-For option through CLI:


  • Login into ASF CLI
  • Switch to enable mode with command “enable” and enter into confirm mode with command “conf terminal”
  • Execute the below command to enable the x-forwarded-for option

#http profile insert request xforwardedfor on "Http_profile_Name" header "X-Forwarded-For"

Note: Please mention the exact http profile name on highlighted section on above command.


Example for enabling the xforwardedfor :

#http profile insert request xforwardedfor on "CLP" header "X-Forwarded-For"


Example for enabling the xforwardedfor  with custom header name:

#http profile insert request xforwardedfor on "CLP" header "Client_ip"


How to verify that ASF is forwarding the client ip to Backend server :

To confirm this, we need to take the debug trace log from ASF. If you are using HTTPS real service then you need to decrypt the debug trace for backend real service communication.

In debug trace, click on http request from ASF to real service and check for header name "X-Forwarded-For". The http request should have the header "X-Forwarded-For" with client ip.




Showing: 1-2 of 2  
  • 19 Sep, 2022   |   Lieriafer

  • There are multiple benefits to ordering from an online pharmacy like eDrugstore <a href=>viagra and cialis online</a>

  • 28 Jun, 2022   |   acardassy

  • - Cialis Cyzhhi <a href=>brand cialis online</a> Gvsvge - best place to buy cialis online About to percent of patients who occupy general hospital beds have alcohol Lecture an apple a DayBehavior and Disease Prevention problems.

    Add comment
    Comment: *
    (Use BBcode - No HTML)

    Other questions in this category
    How to enable HTTP to HTTPS redirection in ASF?
    What are the steps for password recovery of APV/AG/ASF Appliance?
    How to Decrypt Packet capture with Session keys?
    Array Signature Library (ASL) Update
    How to Mitigate the Log4j2 Vulnerabilities Using ASF
    How to create a mail alert for WAF attack events