Origin Server Security
During setup, remember to authenticate the connection between the origin server and WAAP.
This can be done via IP address (allowing only the origin server's WAAP IP address or using a header).
Without this, an attacker can connect directly to the origin server and bypass WAAP protection.