Skip to main content

Origin Server Security

During setup, remember to authenticate the connection between the origin server and WAAP.

This can be done via IP address (allowing only the origin server's WAAP IP address or using a header).

Without this, an attacker can connect directly to the origin server and bypass WAAP protection.