Use the IP Address in the XFF Header to Troubleshoot Events
Focus
Focus

Use the IP Address in the XFF Header to Troubleshoot Events

Table of Contents
End-of-Life (EoL)

Use the IP Address in the XFF Header to Troubleshoot Events

By default, the firewall does not log the source address of a client behind a proxy server, even if you are using this address from the X-Forwarded-For (XFF) header for user mapping. Therefore, while you can identify the specific user associated with a log event, you will not be able to identify the source device that originated the log event easily. To simplify the debugging and troubleshooting of events for users behind a proxy server, enable the X-Forwarded-For option in the URL Filtering profile that you attach to Security policy rules that allow access to web-based applications. With this option enabled, the firewall logs the IP address from the XFF header as the Source address for all traffic that matches the rule.
URL Filtering logs do not display the X-Forwarded For IP field. To view X-Forwarded-For IP log events, you must export the logs to CSV format.
Enabling the firewall to use the XFF header as the Source address in URL Filtering logs does not enable user mapping of the source address. To populate the source user fields, see Use XFF Values for Policies and Logging Source Users.
  1. Enable the X-Forwarded-For option in the URL Filtering profile.
    1. Select
      Objects
      Security Profiles
      URL Filtering
      and select the URL Filtering profile you want to configure or add a new one.
      You can’t enable XFF logging in the default URL Filtering profile.
    2. Select the
      URL Filtering Settings
      tab and enable
      X-Forwarded-For
      .
    3. Click
      OK
      to save the profile.
  2. Attach the URL Filtering profile to the Security policy rule(s) that enable access to web applications.
    1. Select
      Policies
      Security
      and click the rule.
    2. Select the
      Actions
      tab, set the
      Profile Type
      to
      Profiles
      , and select the
      URL Filtering
      profile you just configured for X-Forwarded-For HTTP Header Logging.
    3. Click
      OK
      and
      Commit
      .
  3. Verify the firewall is logging XFF values.
    The XFF column is not visible in the URL Filtering logs on the firewall.
    1. Select
      Monitor
      Logs
      URL Filtering
      .
    2. View the XFF values in one of the following ways:
      • Click Export to CSV ( ) to export the URL Filtering log to a comma-separated value file. When the download is complete, click
        Download file
        to save a copy of the file to your local device.
      • Use the
        show log url csv-output equal yes
        CLI command.
  4. Use the XFF field in the URL Filtering log to troubleshoot a log event in another log type.
    If you notice an event associated with HTTP/HTTPS traffic but cannot identify the source IP address because it is that of the proxy server, you can use the X-Forwarded-For value in a correlated URL Filtering log to help you identify the source address associated with the log event. To do this:
    1. Find an event you want investigate in a Traffic, Threat, or WildFire Submissions log that shows the IP address of the proxy server as the source address.
    2. Click the spyglass icon for the log to display its details and look for an associated URL Filtering log at the bottom of the Detailed Log Viewer window.
    3. Export the associated URL Filtering log to a CSV file and look for the X-Forwarded For IP column. The IP address in this column represents the IP address of the source user behind the proxy server. Use this IP address to track down the device that triggered the event you are investigating.

Recommended For You