Reference: Host name enforcement

Host name violations

The WAF security policy verifies host name compliance for all incoming requests. You can configure the policy to block requests, log an alarm, and learn for requests containing host name violations.

For more information about configuring host name protection, see Manage host names.

See Reference: Violation Protection for information about template default settings.

Host name mismatch

This violation occurs when the host name included in the request line is different from the host name in the header field.

Violation details

Type: Access Violation

Attack Type: SSRF

Severity: Critical

Risk: Specifying different host names can bypass host name restrictions and indicate an SSRF attack.

Illegal host name

The WAF policy verifies that the hostname is configured to the policy. If not, the request includes an illegal host name violation.

Violation Details

Type: Access Violation

Attack Type: SSRF

Severity: Error

Risk: Unauthorized host names can indicate SSRF attacks that attempt to access resources in the internal network.