CloudFlare is a popular protection service against Distributed Denial of Service (DDoS) attacks and essentially acts as a proxy for your web servers. We will cover setting up your back end web server to use the special X-Forwarded-For HTTP header by using the example of CloudFlare. 1 Server ( Cloud Server or Dedicated Server) with installed Apache HTTP Web Server Tutorial.Note that if your landscape also uses GeoLocation systems behind your proxy or load balancer, your geolocation data will be also corrupt if you do not use the XFF headers. This guide will show you how you can configure your Apache web server to use the X-Forwarded-For header information so that you can avoid corrupt or incorrect logged data when behind a proxy or load balancer. Otherwise, your Apache server will by default log only the receiving IP from the connecting proxy or load balancer.
In order to be able to identify the client, you will need to configure your back end Apache HTTP Web Server to be able to use the XFF header and render the real customer IP in its log files. Such web hosting cases where the web server is behind a proxy or a load balancer are extremely common, and thus arises the necessity to be able to log the actual client’s IP address in your system instead of the proxy or load balancer IP. X-Forwarded-For, or XFF for short, is a special HTTP header field that is commonly used to identify the originating client IP address whether or not they are connecting to the server through an HTTP proxy or a load balancer.
VISUALSVN SERVER PORT FORWARDING HOW TO
How to get X-Forwarded-For IP addresses in Apache Web Server