Updated on 2023-12-28 GMT+08:00

Overview

You can configure referer validation, IP address access control lists (ACLs), User-Agent access control lists (ACLs), and token authentication to identify and filter out unauthorized users and improve CDN security.

Function

Description

Referer Validation

This section describes how to configure a referer blacklist or whitelist. Users are identified and filtered according to the configured filter policies, in order to control access sources.

IP ACL

This section describes how to configure a policy for filtering out requests from specific IP addresses to restrict access.

User-Agent ACL

This section describes how to configure User-Agent filtering to restrict access.

Token Authentication

This section describes how to configure token authentication to protect website resources from being downloaded by malicious users.

Remote Authentication

This section describes how to configure remote authentication, so CDN can forward user requests to a specific server for authentication to prevent malicious resource download.