Reference: Host name enforcement¶
Host name violations¶
The WAF security policy verifies host name compliance for all incoming requests. You can configure the policy to block requests, log an alarm, and learn for requests containing host name violations.
For more information about configuring host name protection, see Manage host names.
See Reference: Violation Protection for information about template default settings.
Host name mismatch¶
This violation occurs when the host name included in the request line is different from the host name in the header field.
Violation details¶
Type: Access Violation
Attack Type: SSRF
Severity: Critical
Risk: Specifying different host names can bypass host name restrictions and indicate an SSRF attack.
Illegal host name¶
The WAF policy verifies that the hostname is configured to the policy. If not, the request includes an illegal host name violation.
Violation Details¶
Type: Access Violation
Attack Type: SSRF
Severity: Error
Risk: Unauthorized host names can indicate SSRF attacks that attempt to access resources in the internal network.