Link11 WAAP
v5
v5
  • Link11 WAAP Documentation
  • Release Notes
  • Known Issues
  • User Guide
    • Introduction to Link11 WAAP
  • How Link11 WAAP Works
    • Traffic Filtering Process
    • Traffic Reporting and Analytics
    • Policy Mapping and Traffic Routing
    • Tagging
    • UI Overview and Common Elements
  • Console UI Walkthrough
    • Analytics
      • Dashboard
      • Events Log
    • Security
      • Global Filters
      • Flow Control Policies
      • Security Policies
      • Rate Limit Rules
      • ACL Profiles
      • Actions
      • Dynamic Rules
      • Quarantined
      • Content Filter
        • Content Filter Profiles
        • Content Filter Rules
    • Sites
      • Server Groups
      • Proxy Templates
      • Mobile Application Groups
      • Backend Services
      • Edge Functions
      • DNS Records
      • SSL
        • Load Balancers
        • Certificates
    • System
      • Interactive Challenge
      • SSO Configuration
      • Purge CDN Cache
      • Users Management
      • Security Alerts
      • Log Exporters
      • Version Control
      • System DB
      • Publish Changes
    • Account
  • Using the product
    • Best Practices
      • Saving and Publishing Your Changes
      • Enabling Passive Challenges
      • Understanding and Diagnosing Traffic Issues
    • How Do I...
      • Authenticate mobile app users
      • Ban, unban, and allowlist traffic sources
      • Bypass Link11 WAAP for loadtesting or other purposes
      • Configure a new path/section of a site
      • Control caching behavior
      • Customize responses to clients
      • Defer argument retrieval in the Events Log
      • Enable GraphQL traffic
      • Enable mTLS (mutual TLS)
      • Generate or renew my own SSL certificates
      • Protect sensitive information in logs and analytics
      • Quickly block an attacker
      • Redirect or block HTTP traffic
      • Run custom code
      • Set rate limits and exemptions
      • Stream event data to a SIEM solution or other destination
    • The Link11 WAAP API
      • Overview
      • Internal data structures
      • Using Swagger UI
      • Using curl
  • Reference Information
    • Acronyms
    • API
      • API access to traffic data
      • Types of namespaces
      • Namespace reference
        • ACL Profiles
        • Actions
        • Backend Services
        • Certificates
        • Configs
        • Content Filter Profiles
        • Content Filter Rules
        • Data queries
        • Dynamic Rules
        • Edge Functions
        • Flow Control Policies
        • Global Filters
        • Load Balancers
        • Log Exporters
        • Mobile Application Groups
        • Planets
        • Proxy Templates
        • Rate Limit Rules
        • Security Alerts
        • Security Policies
        • Server Groups
        • Tags
        • Tools
        • Users
    • Hostile Bot Detection / LWCSI
      • Environmental detection and browser verification
      • Client authentication
      • Biometric behavioral verification
    • HTTP Response Codes
    • Log Exporter Output
    • Pattern Matching Syntax
    • Query Filter Syntax and Best Practices
  • Support
Powered by GitBook
On this page
  • Overview
  • Usage
  • Administration
  • Parameters
  • Name
  • Challenge's cookie domain
  • Description
  • Match Host/Authority Headers
  • Security policy
  • Proxy template
  • Mobile Application Group
  • Server Certificate
  • CA Certificate
  • Mode

Was this helpful?

Export as PDF
  1. Console UI Walkthrough
  2. Sites

Server Groups

PreviousSitesNextProxy Templates

Last updated 18 days ago

Was this helpful?

Overview

This section defines Server Groups: the highest level of organization within Link11 WAAP. A Server Group is based on a , and contains at least one and a .

Usage

Typically, a Server Group represents a single domain.

Administration

The main window (shown above) lists all currently defined Server Groups.

Parameters

Name

A name for this Server Group, to be used within the interface.

Challenge's cookie domain

Description

Information about this Server Group, to be used within the interface.

Match Host/Authority Headers

Security policy

Proxy template

Mobile Application Group

Server Certificate

To avoid errors, the Server Certificate Generate button will be disabled if the Match host/authority headers field has been edited and the edits have not yet been saved.

CA Certificate

CA Certificate features will only be available if both of the following are true:

  • An AWS NLB (Network Load Balancer is being used. (When using a Link11 Load Balancer, contact support.)

Mode

Specifies how clients (i.e., end users) should present CA certificates for mTLS validation. Options are:

  • [Off] Client authentication is disabled. The system will not request CA certificates from clients.

  • [On] CA certificate is required for authentication. The system will request and validate CA certificates from clients.

  • [Optional] CA certificate is requested but not required for authentication. The system will not require clients to provide CA certificates. However, if a client does provide a certificate, it must be valid in order for its request to be accepted. If the client provides an invalid certificate (e.g., expired, revoked, or forged), the request will be blocked.

Sending CA data to the origin

When CA Certificates are enabled, Link11 WAAP will add headers to requests before passing them to the backend.

If a CA Certificate is provided, Link11 WAAP will add it to the request header, along with these additional headers:

Header

Description

Example Value

SSL_CLIENT_VERIFY

Client certificate verification status

SUCCESS (valid) / FAILED (invalid)

SSL_CLIENT_CERT

Full client certificate in URL encoded

-----BEGIN CERTIFICATE----- ...

SSL_CLIENT_S_DN

Client's Subject Distinguished Name (DN)

CN=John Doe, O=ExampleCorp, C=US

SSL_CLIENT_I_DN

Issuer (CA) Distinguished Name (DN)

CN=Example CA, O=ExampleCorp, C=US

SSL_CLIENT_SERIAL

Unique serial number of the client certificate

1234567890ABCDEF

SSL_CLIENT_FINGERPRINT

SHA-1 fingerprint of the client certificate

5F:7C:1E:2B:...

If no certificate is provided, the following headers will be passed:

Header

Description

Example Value

SSL_CLIENT_VERIFY

Indicates no client certificate was provided

NONE

SSL_CLIENT_CERT

Empty (not passed or -)

-

SSL_CLIENT_S_DN

Empty (no subject DN since no cert exists)

-

SSL_CLIENT_I_DN

Empty (no issuer DN since no cert exists)

-

SSL_CLIENT_SERIAL

Empty (no serial number since no cert exists)

-

SSL_CLIENT_FINGERPRINT

Empty (no fingerprint since no cert exists)

-

The usage of Server Groups is explained in detail here: .

The administration (addition/deletion/editing/versioning) of these Groups follows the conventions described .

The domain to use when are issued.

The scope for this Server Group (typically this is a list of domains), specified as a regex. If this list is edited, the edits must be saved before .

The for this Server Group, with its parameters displayed for convenience.

The that this Server Group is based upon.

The for this Server Group, if any.

The for this Server Group. The Generate button will generate a new certificate.

The CA Certificate to use when enforcing mTLS for the domain (). The available certificates are those defined in the CA Certificates tab of the page.

CA Certificates have been .

Policy Mapping and Traffic Routing
here
bot challenges
a new SSL Certificate can be generated
Security Policy
Proxy Template
Mobile Application Group
SSL certificate
read more about this
Certificates
enabled within the System DB
Proxy Template
SSL Certificate
Security Policy