<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to enable &amp;quot;X-Forwarded-For&amp;quot; for traffics forwarded from Imperva Cloud WAF on Check in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-enable-quot-X-Forwarded-For-quot-for-traffics-forwarded/m-p/200660#M37690</link>
    <description>&lt;P&gt;In order for the gateway to even see the XFF header, you'll need to have App Control and HTTPS Inspection enabled.&lt;BR /&gt;The rule the traffic matches might need to include actions that require App Control (including the use of "Detailed" or "Extended" logging).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Dec 2023 20:54:45 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-12-14T20:54:45Z</dc:date>
    <item>
      <title>How to enable "X-Forwarded-For" for traffics forwarded from Imperva Cloud WAF on CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-enable-quot-X-Forwarded-For-quot-for-traffics-forwarded/m-p/199954#M37689</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I'm looking for help to guide the customer configuring Checkpoint firewall to properly handle "X-Forwarded-For" headers for traffic forwarded from Imperva Cloud WAF. My goal is to ensure accurate client IP logging and visibility into the origin of incoming requests.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Firewall:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Checkpoint Firewall&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WAF:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Imperva Cloud WAF&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Desired Outcome:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;"X-Forwarded-For" header containing the original client IP is correctly forwarded by Imperva WAF and received by the Checkpoint firewall.&lt;/LI&gt;&lt;LI&gt;Client IP information is accurately logged in the Checkpoint firewall logs for analysis.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;What specific configuration changes are needed on the Checkpoint firewall to enable "X-Forwarded-For" for Imperva Cloud WAF traffic?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any guidance or insights from experienced users would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 10:49:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-enable-quot-X-Forwarded-For-quot-for-traffics-forwarded/m-p/199954#M37689</guid>
      <dc:creator>Thammarit</dc:creator>
      <dc:date>2023-12-07T10:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable "X-Forwarded-For" for traffics forwarded from Imperva Cloud WAF on Check</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-enable-quot-X-Forwarded-For-quot-for-traffics-forwarded/m-p/200660#M37690</link>
      <description>&lt;P&gt;In order for the gateway to even see the XFF header, you'll need to have App Control and HTTPS Inspection enabled.&lt;BR /&gt;The rule the traffic matches might need to include actions that require App Control (including the use of "Detailed" or "Extended" logging).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 20:54:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-enable-quot-X-Forwarded-For-quot-for-traffics-forwarded/m-p/200660#M37690</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-14T20:54:45Z</dc:date>
    </item>
  </channel>
</rss>

