Well if you have Suricata positioned after the tls termination happened and the connection is just seen between those two 127.x.y.z IPs without the initial SRC in the package, I see no way how Suricata would magically know the initial SRC IP.
I do send the original src and dst IP as part of the headers sent by the TLS termination. Currently XFF is limited to extract only one IP address. Is there a way to extract the additional headers that are sent for the src and dst and have them as part of the “alert” output in eve.json ?
This way I can recreate the original 5 tuple together with the signature output
Yes I can provide a header with the “original” src->dst but I want to be able to have Suricata output it as part of the alert payload, is that possible ?
This seem to be azure-firewall (azfw) so I doubt that it’s currently supported. I didn’t find any RFC for that. So this might be something that fits as a feature request although this seems to be vendor/Azure specific.
@shanyp I’m just curious, is this azfw-forwarded a header that was constructed for you? Or did you craft it via configuration? If this is something done by Azure, I’d be curious about the Azure products in use. Thanks.