Overview
You can configure referer validation, IP address access control lists (ACLs), User-Agent access control lists (ACLs), and token authentication to identify and filter out unauthorized users and improve CDN security.
Function |
Description |
---|---|
This section describes how to configure a referer blacklist or whitelist. Users are identified and filtered according to the configured filter policies, in order to control access sources. |
|
This section describes how to configure a policy for filtering out requests from specific IP addresses to restrict access. |
|
This section describes how to configure User-Agent filtering to restrict access. |
|
This section describes how to configure token authentication to protect website resources from being downloaded by malicious users. |
|
This section describes how to configure remote authentication, so CDN can forward user requests to a specific server for authentication to prevent malicious resource download. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot