Overview
You can configure referer validation, IP address access control lists (ACLs), User-Agent access control lists (ACLs), and token authentication to identify and filter out unauthorized users and improve CDN security.
Function |
Description |
---|---|
This section describes how to configure a referer blacklist or whitelist. Users are identified and filtered according to the configured filter policies, in order to control access sources. |
|
This section describes how to configure a policy for filtering out requests from specific IP addresses to restrict access. |
|
This section describes how to configure User-Agent filtering to restrict access. |
|
This section describes how to configure token authentication to protect website resources from being downloaded by malicious users. |
|
This section describes how to configure remote authentication, so CDN can forward user requests to a specific server for authentication to prevent malicious resource download. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.