All Products
Search
Document Center

Web Application Firewall:Allow access from back-to-origin CIDR blocks of WAF

Last Updated:May 17, 2024

In CNAME record mode, Web Application Firewall (WAF) uses specific back-to-origin CIDR blocks to forward normal traffic back to an origin server. After you add a website to WAF in CNAME record mode, you must configure security software or access control policies for the origin server to allow inbound traffic from the back-to-origin CIDR blocks of WAF.

Scenarios

In CNAME record mode, if you use security software such as SafeDog or Yunsuo for your origin server, you must add the back-to-origin CIDR blocks of WAF to the IP address whitelist of the security software. This way, the security software does not block the normal traffic forwarded by WAF to the origin server.

FAQ

  • What is a back-to-origin CIDR block of WAF?

    A back-to-origin CIDR block of WAF is a CIDR block that is used by WAF to forward requests that are sent from clients to the origin server. After a website is added to WAF, the origin server considers that all requests originate from the back-to-origin CIDR blocks of WAF. The originating IP addresses of clients are added to the X-Forwarded-For (XFF) fields in the HTTP headers of requests.

    image
  • Why do I need to add the back-to-origin CIDR blocks of WAF to the IP address whitelist of the security software on the origin server?

    After a website is added to WAF, the origin server receives requests from the back-to-origin CIDR blocks of WAF at a high rate. In this case, the firewall or security software on the origin server may consider the CIDR blocks as attack IP addresses and block them. If the IP addresses are blocked, WAF cannot receive responses from the origin server as expected. After you add a website to WAF, make sure that the back-to-origin CIDR blocks of WAF are added to the IP address whitelist of the origin server. Otherwise, the website may be inaccessible or become slow.

Obtain the back-to-origin CIDR blocks of WAF

  1. Log on to the WAF 3.0 console. In the top navigation bar, select the resource group and the region in which the WAF instance is deployed. You can select Chinese Mainland or Outside Chinese Mainland for the region.

  2. In the left-side navigation pane, click Website Configuration.

  3. Click the CNAME Record tab.

  4. Click Back-to-origin CIDR Blocks above the domain name list.

    回源IP

  5. In the Back-to-origin CIDR Block message, click Copy to copy all back-to-origin CIDR blocks to the clipboard.

    Note

    The back-to-origin CIDR blocks that you copy are separated by commas (,).

    回源IP段

What to do next

After you obtain the back-to-origin CIDR blocks of WAF, you must add them to the IP address whitelist of the security software on the origin server. You can also configure access control policies for the origin server to allow inbound traffic only from the back-to-origin CIDR blocks of WAF.

Warning

If you do not add the back-to-origin CIDR blocks of WAF to the IP address whitelist of the security software on the origin server, normal requests forwarded by WAF may be blocked. This may cause service interruptions.

For security purposes, we recommend that you configure access control policies for the origin server to allow inbound traffic only from the back-to-origin CIDR blocks of WAF. This way, attackers cannot bypass WAF to attack the origin server.