All Products
Search
Document Center

Anti-DDoS:Configure traffic marks

Last Updated:Mar 31, 2026

When Anti-DDoS Proxy forwards website traffic to your origin server, it can inject HTTP headers carrying client metadata — originating IP address, originating port, and TLS fingerprints. Configure traffic marks so your backend services can identify and track the source of forwarded requests.

Prerequisites

Before you begin, ensure that you have:

Enable traffic marking

  1. Log on to the Anti-DDoS Proxy console.

  2. In the top navigation bar, select the region of your instance.

    Instance typeRegion
    Anti-DDoS Proxy (Chinese Mainland)Chinese Mainland
    Anti-DDoS Proxy (Outside Chinese Mainland)Outside Chinese Mainland
  3. In the left-side navigation pane, choose Provisioning > Website Config.

  4. Find the website configuration you want to modify, then click Edit in the Actions column.

  5. In the forwarding configuration, enable traffic marking. Two types of marks are available:

    • Default marks — predefined headers that Anti-DDoS Proxy injects automatically

    • Custom Header — additional headers you define to carry a custom value

  6. Click Next and follow the prompts to save the configuration.

Default marks

Anti-DDoS Proxy supports two categories of default marks: request header forwarding options and traffic mark fields.

Request Header Forwarding Configuration

Enable these options to pass specific client connection details to your origin server:

OptionHeader addedDescription
Insert X-Client-IP to Get Originating IP AddressX-Client-IPClient's original IP address
Insert X-True-IP to Forward Client IPX-True-IPIP address the client used to establish the connection
Insert Web-Server-Type to Get Service TypeWeb-Server-TypeIdentifies which frontend web server or proxy handled the request (typically set by the first proxy)
Insert WL-Proxy-Client-IP to Get Connection IPWL-Proxy-Client-IPSame function as X-Client-IP; specific to Oracle WebLogic Server
X-Forwarded-Proto (Listener Protocol)X-Forwarded-ProtoProtocol used between the client and the first proxy

Traffic marks

These fields carry client metadata in the HTTP header. Anti-DDoS Proxy populates them automatically once enabled:

MarkHTTP header fieldDescriptionRequirements
Originating PortX-Forwarded-ClientSrcPortClient's originating port
Originating IP AddressX-Forwarded-ForClient's originating IP address
JA3 Fingerprintssl_client_ja3_fingerprint_md5MD5 hash of the client JA3 fingerprintContact your account manager to enable
JA4 Fingerprintssl_client_ja4_fingerprint_md5MD5 hash of the client JA4 fingerprintContact your account manager to enable
Client TLS Fingerprintssl_client_tls_fingerprint_md5MD5 hash of the client TLS fingerprintContact your account manager to enable
HTTP/2 Fingerprinthttp2_client_fingerprint_md5MD5 hash of the client HTTP/2.0 fingerprintContact your account manager to enable

Custom Header

Add a custom HTTP header to mark requests passing through Anti-DDoS Proxy. Anti-DDoS Proxy injects the configured field and value into each request forwarded to your origin server.

Quantity limit: Up to 5 custom headers.

Naming restrictions

To avoid overwriting headers that Anti-DDoS Proxy or upstream proxies already set, do not use the following field names:

Anti-DDoS Proxy default fields:

Field namePurpose
X-Forwarded-ClientSrcPortClient port for Layer 7 access
X-Forwarded-ProxyPortListening port for Layer 7 access
X-Forwarded-ForClient IP address for Layer 7 access
ssl_client_ja3_fingerprint_md5Client JA3 fingerprint MD5 hash
ssl_client_ja4_fingerprint_md5Client JA4 fingerprint MD5 hash
ssl_client_tls_fingerprint_md5Client TLS fingerprint MD5 hash
http2_client_fingerprint_md5Client HTTP/2.0 fingerprint MD5 hash

Standard HTTP fields: host, user-agent, connection, upgrade

Common proxy fields: x-real-ip, x-true-ip, x-client-ip, web-server-type, wl-proxy-client-ip, eagleeye-rpcid, eagleeye-traceid, x-forwarded-cluster, x-forwarded-proto

Configuration tips

  • Start with default marks. Use a Custom Header only when your service requires non-standard field names.

  • Test header configuration in a staging environment before applying to production.

  • Keep field values to 100 characters or fewer to avoid degrading forwarding performance.

Read traffic marks on your origin server

After configuring traffic marks, parse the injected headers on your origin server to retrieve the client's true source IP address. For parsing examples across different web servers, see Get the true source IP address after configuring Anti-DDoS Proxy.