Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 235 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Knowledge Base

Loading...

Getting Started

Loading...

Loading...

Loading...

Products

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Concepts

Introduction

Medianova is a global provider of Content Delivery Network (CDN) and cloud security services designed to accelerate and secure digital experiences. With over 50 data centers across 21 countries, it helps businesses deliver fast, reliable websites, applications, and APIs while ensuring high performance and robust security.

Key Services and Concepts

1. CDN (Content Delivery Network) A CDN optimizes content delivery by distributing it across multiple servers around the world. Medianova's CDN service ensures that content such as images, stylesheets, and scripts are delivered efficiently by caching static assets at strategically located servers. This minimizes latency and improves page load times for users.

2. Static CDN The Static CDN service is specifically designed to optimize the delivery of static content. By caching assets globally, it ensures that users receive content from the nearest server, drastically reducing load times and enhancing performance. Integration is simple, with users needing only to update asset URLs and configure settings via the Medianova platform.

3. Dynamic Content Caching Dynamic content, generated per user request, can be resource-intensive. Medianova's microcaching system allows for caching dynamic content (e.g., API responses or web pages) for brief periods, thus reducing server load and improving page speeds. This helps reduce bandwidth costs while enhancing the user experience.

4. Live Streaming Medianova provides high-quality live streaming with adaptive streaming technology. This ensures optimal video quality across devices, from desktop to mobile, while maintaining seamless playback. The platform integrates with major social media platforms for broader reach. Security features, including encryption and access controls, ensure that content is protected and accessible only to authorized users.

5. Private CDN For organizations requiring greater control, the Private CDN offers flexible, secure, and high-performance content delivery. It provides businesses with tailored solutions that allow enhanced security and content distribution management.

6. Image Optimization Medianova offers real-time image optimization. This feature allows on-the-fly image transformations such as resizing, cropping, and watermarking through simple URL calls. It also supports responsive images, ensuring that content is tailored for different devices and screen sizes, contributing to faster load times and better user experiences.

7. Stook - Cloud Object Storage Stook is Medianova's cloud object storage solution that enables businesses to store, manage, and retrieve data quickly and reliably. It is S3-compatible and eliminates the traditional barriers of egress and transaction fees, making it a cost-effective choice for scalable storage needs.

8. SSL Encryption Secure Socket Layer (SSL) ensures encrypted communication between a server and a client. Websites with SSL certificates are considered secure, and this encryption is critical for e-commerce platforms, where security is a primary concern for users.

9. Medianova WAF (Web Application Firewall) Medianova's WAF actively monitors all incoming web traffic to detect and block malicious patterns before they can affect web assets. With predefined Managed Rules, enabling these rules offers immediate protection against various security threats.

10. DDoS Protection Medianova's DDoS protection system is always active, offering continuous defense against common attack types, such as DNS Query Floods, SlowLoris, and HTTP floods. It includes several mitigation strategies, including rate limiting, IP blocking, and geoblocking, ensuring minimal disruption to services during attacks.

Conclusion

Medianova combines advanced caching, acceleration, and security features to help businesses create fast, reliable, and secure digital solutions. With global infrastructure, robust security, and easy integration, Medianova empowers businesses to deliver superior user experiences while ensuring high performance and protection against a wide range of threats.

Security

Welcome to the Medianova Knowledge Base

Comprehensive CDN documentation and API references, with integration, troubleshooting, and developer guides across all Medianova services.

Learn how to integrate and optimize your workflows with our detailed API documentation.

Discover Our API Documentation
Cover

Security

Cover

Performance

Cover

Storage

DDoS Protection

Protect your applications and APIs from volumetric and protocol-based attacks with Medianova’s multi-layer, always-on DDoS mitigation system.

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic by overwhelming a target system or network with excessive requests. Medianova’s DDoS Protection automatically detects and mitigates these attacks without requiring any manual activation. From rate limiting to IP and Geo blocking, Medianova ensures uninterrupted availability even under heavy attack conditions.

How Medianova DDoS Protection Works

Medianova integrates several protection layers designed to stop attacks before they impact your services.

Medianova DDoS Protection Architecture

Always-On Defense

Your DDoS protection is active by default. There is no need for additional setup — your web assets are continuously monitored and protected against common attack types such as:

  • DNS Query Floods

  • Slowloris Attacks

  • HTTPS GET / POST Floods

Anycast DNS Infrastructure

Medianova’s global distributes thousands of requests across multiple servers. This prevents traffic overload on a single endpoint and mitigates large-scale network floods.

Anycast DNS not only improves security but also reduces latency by routing users to the nearest edge location.

IP and Origin Protection

You can reduce the risk of DDoS threats by concealing your origin IP before an attack begins. Medianova provides an extra layer of protection through Secure Cloud, limiting exposure of your origin infrastructure and filtering harmful traffic before it reaches your servers.

Warning: Exposing your origin IP directly allows attackers to bypass DDoS mitigation layers.

Rate Limiting and Geo Blocking

Edge-level rate limiting and Geo-based filtering restrict malicious or excessive traffic patterns. This ensures that legitimate users maintain access while harmful requests are dropped early in the network path.

WAF Integration

When combined with Medianova’s , DDoS Protection forms a complete multi-layer defense system. This integration protects not only against volumetric attacks but also against application-layer threats, such as bot floods or malicious payloads targeting web applications.

Best Practices

  • Conceal your origin IP using Secure Cloud or Origin Shield.

  • Combine DDoS Protection with WAF for enhanced multi-layer defense.

  • Keep critical DNS zones under to distribute load globally.

  • Regularly review threat and access logs to identify abnormal patterns.

Medianova DDoS Protection delivers continuous and intelligent protection against both volumetric and application-layer attacks. By combining global Anycast DNS distribution, adaptive rate limiting, and origin shielding, Medianova ensures your online services remain fast, secure, and always available.

Start your Free Trial

You can try Medianova for 1 month without needing a credit card or any commitments. Your account will be activated automatically. If you need more features or help, our sales team is ready to assist you.

The trial includes important features like Static CDN and Dynamic CDN, which make sure your website content loads faster by delivering it from the closest server. The Web Application Firewall (WAF) lets you create custom security rules to protect your site from harmful traffic. You also get Standard DDoS Protection to keep your website safe from attacks that try to overload it with too much traffic.

The Global Anycast DNS feature improves your site’s DNS performance by directing traffic to the nearest server, which helps reduce loading times. The Purge feature allows you to quickly remove outdated content from all servers so your website shows updates instantly. You can also use page rules to control how your content is cached, forwarded, and secured, giving you more control over how the CDN handles your site.

For more advanced features and support, you can explore our premium packages for better options suited to your needs.

How to Activate Your Free Trial:

  • Visit the .

  • Fill in the fields for your name, email address, and password.

  • Click the Next button.

  • Enter the verification code sent to your email.

Your Free Trial has now started successfully.

Key Features to Explore:

  • Static CDN

  • Dynamic CDN

  • Web Application Firewall

  • DDoS Protection

Need a Helping Hand?

For additional support, contact us at .

For your CDN resource, select Website. Make sure that the Origin URL and the Website URL are different.

  • The package will be displayed as Free Trial. Click the Proceed to Purchase button.

  • Finally, fill in your billing address and click the Complete Purchase button.

  • Global Anycast DNS
  • Purge

  • Cloud Panel
    [email protected]
    Web Application Firewall
    DDoS Protection
    Rate Limiting
    Geoblocking
    IP Restriction
    Static CDN
    Dynamic CDN
    Streaming
    Image Optimization & WebP
    API Caching
    Stook: Cloud Object Storage
    Getting Started
    Stook Integration
    Usage Guides
    Stook API
    Anycast DNS
    Web Application Firewall (WAF)
    Anycast DNS

    Origin Settings

    Website Framework Integrations

    Origin Settings

    Advanced Configuration

    Advanced Configuration

    Performance / CDN

    Caching

    Extract CRT and KEY Files from a PFX Certificate

    Learn how to extract .crt and .key files from a .pfx certificate using OpenSSL.

    A .pfx (PKCS#12) file contains your public certificate, private key, and intermediate certificates bundled together. This guide explains how to extract the certificate (.crt) and private key (.key) using a simple Bash script with OpenSSL.

    Prerequisites

    Before you begin:

    • A valid .pfx file provided by the customer.

    • The password for the .pfx file.

    • OpenSSL installed on your local machine.

    • (Optional) Rename the file for clarity using this format: domain.pfx — for example: medianova_com.pfx.

    1

    Create the Extraction Script

    Create a new Bash script file named extract-cert.sh and copy the following commands:

    Save and close the file.

    This procedure automates the extraction of certificate and key files from .pfx bundles. You can now use the generated .crt and .key files to upload your own SSL certificate in the Medianova Control Panel.

    SSL/TLS Encryption

    Secure your CDN traffic and applications with SSL/TLS encryption to ensure private, authenticated communication between clients and servers.

    Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide encrypted communication between clients and servers. They ensure data privacy, integrity, and authentication—protecting your website and CDN-delivered assets against interception or tampering.

    Over time, the traditional HTTP protocol evolved into HTTPS, which uses SSL/TLS encryption to secure all data exchanged between users and websites. Medianova CDN supports HTTPS by default and allows you to manage SSL certificates directly through the platform.

    TLS is the modern version of SSL. All Medianova services use TLS 1.2 and 1.3 for enhanced security and performance.

    Why SSL/TLS Matters

    • Confidentiality: Encrypts all client–server communications.

    • Integrity: Prevents data alteration or man-in-the-middle attacks.

    • Authentication: Confirms your site’s identity through trusted Certificate Authorities (CAs).

    • Trust & SEO: HTTPS improves user confidence and search engine ranking.

    Supported SSL Certificate Types

    Medianova CDN supports all common SSL/TLS certificates. Choose the one that fits your infrastructure and domain structure.

    Certificate Type
    Description
    Recommended For

    For setups serving multiple domains or subdomains, consider Wildcard or SAN-supported certificates to simplify management.

    How SSL/TLS Works on Medianova CDN

    1. A user requests your content via HTTPS.

    2. The CDN edge node presents a valid SSL/TLS certificate.

    3. Encrypted communication is established between the client and the edge server.

    4. The edge communicates securely with your origin server (if origin SSL is configured).

    Best Practices

    • Always use HTTPS for all CDN-enabled resources.

    • Prefer TLS 1.3 for stronger encryption and faster handshakes.

    • Keep certificates renewed before expiration to avoid service disruption.

    • Use Wildcard or SAN certificates to simplify certificate management.

    ‏‏‏‏‏‏‏‏

    HTTP Response Codes

    The HTTP protocol defines a standardized set of status codes to communicate the outcome of a client’s request. These codes indicate at which stage the request stands or why it may have failed. They fall into five primary categories:

    Category
    Description

    1xx Informational

    Indicates that the request was received and the process is continuing.

    2xx Success

    Indicates that the request was successfully received, understood, and accepted.

    3xx Redirection

    Instructs the client to perform additional actions to complete the request (typically follow a different URL).

    4xx Client Error

    1xx Informational

    These codes indicate that the request was received and the process is continuing. They do not finalize the HTTP transaction — the client must wait for or send more data.

    Code
    Meaning

    2xx Success

    These codes indicate that the client’s request was successfully received, understood, and accepted.

    Code
    Meaning

    3xx Redirection

    These codes indicate that further action needs to be taken by the client in order to complete the request. Usually involves following a different URI.

    Code
    Meaning

    4xx Client Error

    These codes indicate that the client seems to have made an error. The server understood the request, but it cannot or will not process it due to something that is perceived to be a client problem.

    Code
    Meaning

    5xx Server Error

    These codes indicate that the server failed to fulfill a valid request. The problem is on the server side, not the client's.

    Code
    Meaning

    References

    • RFC 7231: HTTP/1.1 Semantics and Content (core HTTP methods, standard status codes)

    • RFC 7235: HTTP/1.1 Authentication (401 Unauthorized, 407 Proxy Authentication Required and authentication mechanisms)

    • RFC 6585: Additional HTTP Status Codes (defines 429 Too Many Requests, 431 Request Header Fields Too Large

    Geoblocking

    Restrict or allow access to your CDN Resources based on geographic location by configuring country-based whitelists and blacklists.

    Geoblocking allows you to control which countries can access your content through the . By enabling this feature, you can restrict or allow requests based on the visitor’s geographic origin, helping you comply with regional policies and protect your digital assets.

    Geoblocking operates at the CDN edge, preventing unauthorized access before requests reach your origin server.

    Robots.txt File

    Define how the CDN serves the robots.txt file to control how search engines crawl and index your content.

    The Robots.txt File feature determines whether search engines receive a robots.txt file from the CDN and which source the file is taken from. This allows you to enable crawling for all files or defer crawling rules to your origin.

    You can manage Robots.txt File settings in the or via .

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    Configure Robots.txt File

    Choose how the CDN should provide the robots.txt file for the selected resource.

    Hotlink Protection

    Prevent unauthorized use of your media files by blocking external websites from embedding or linking directly to your CDN-hosted assets.

    Hotlink Protection restricts access to your CDN Resource by verifying the Referer header in each HTTP request. When enabled, it ensures that only requests originating from your allowed domains can retrieve content from your CDN. Requests coming from unauthorized sources — such as external websites directly embedding your files — are blocked or redirected automatically.

    Why Use Hotlink Protection?

    Hotlink Protection helps you:

    IP Restriction

    Control access to your CDN Resources by allowing or blocking specific IP addresses through whitelist or blacklist configurations.

    IP Restriction (Access Control List – ACL) allows you to manage which IP addresses can access your CDN Resource. You can choose between two modes: Whitelist or Blacklist, to define how access is granted or denied.

    • Whitelist Mode: Only the IP addresses you specify are allowed to access your resource. All other IPs are denied.

    • Blacklist Mode: The IP addresses you specify are denied access. All other IPs are allowed.

    Advanced Origin Settings

    The Advanced Origin Settings feature provides a flexible and efficient way to configure content routing for dynamic resources. It allows you to define specific rules for routing requests to your origin server based on criteria such as URIs, protocols, domains, ports, and more. This functionality is particularly valuable for delivering dynamic content where precision and adaptability are crucial.

    Key Benefits

    • Optimized Routing for Dynamic Content: Ensures requests for frequently changing or personalized content are routed efficiently to the origin server.

    Medianova IP Blocks

    Obtain Medianova’s CDN IP address ranges for firewall allowlisting.

    Medianova’s CDN uses specific IP address ranges to fetch content from your origin servers. If your origin server uses a firewall or IP-based access controls, you must allow all addresses listed below to ensure reliable access from Medianova edge servers. This allows the CDN to retrieve and deliver your content securely and efficiently.

    Available Formats

    Format
    URL
    Description

    Origin Response Timeout

    Learn how to configure Origin Response Timeout to control how long the CDN waits for your origin to respond.

    Origin Response Timeout defines the maximum time the CDN waits for an HTTP(S) response from your origin server. If the origin does not respond within the configured duration, the CDN returns a 504 Gateway Timeout.

    Adjusting this timeout helps maintain predictable performance and prevents long wait times caused by slow origin responses.

    You can manage Origin Response Timeout using the or .

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.

    Origin Host Header

    Learn how to configure a custom Host header for origin requests in the Medianova Control Panel.

    The Origin Host Header feature allows you to define a custom domain to be sent in the Host header of requests forwarded to your origin. Many origin servers rely on the Host header for routing, virtual hosting, or tenant identification. When this option is enabled and a domain is provided, the CDN replaces the default host value with the one you specify.

    The feature does not modify viewer-facing responses and does not affect caching behavior.

    How Origin Host Header Works

    You can configure X-CDN Header in the or via

    How to Configure Gzip and Brotli

    Step-by-step instructions for how to enable and configure Gzip compression and Brotli compression.

    We recommend to always turn on Gzip and Brotli compression for small object delivery and dynamic content acceleration. All modern browsers support these content encodings and clients not supporting compression will receive the uncompressed version. Learn more about .

    In the , select the appropriate CDN resource, navigate to the Optimization tab and select Text Optimization.

    The page shows two content blocks, one for Brotli Compression and one for Gzip Compression:

    The following steps apply to both Brotli Compression and Gzip Compression.

    Protect bandwidth – Prevent others from using your CDN capacity to serve their own content.
  • Secure digital assets – Stop unauthorized sharing or embedding of your hosted media.

  • Reduce server load – Block high-traffic external sites from consuming resources.

  • Maintain brand control – Ensure your content appears only on trusted domains.

  • Prevent abuse – Stop third-party sites from monetizing your media.

  • How Hotlink Protection Works

    Hotlink Protection checks the Referer field of every HTTP request. If the Referer does not match your whitelisted domain list, the CDN automatically denies or redirects the request.

    Action
    Description

    Allow

    Serves content when the Referer is from an authorized source.

    Block

    Rejects requests from unauthorized sites.

    Redirect

    Sends unauthorized users to a specified page or image.

    Add multiple allowed domains to the whitelist for multi-site deployments (e.g., www.medianova.com, cdn.medianova.com).

    Why Use Geoblocking?

    Use Geoblocking to manage access and enforce content distribution policies efficiently:

    • Compliance and licensing – Restrict access to regions where content rights do not apply.

    • Dynamic pricing models – Apply different pricing or service availability by country.

    • Security enhancement – Block known high-risk regions or malicious traffic.

    • Content optimization – Focus delivery to target markets, reducing unnecessary traffic.

    Combine Geoblocking with IP Restriction for granular, IP-based exceptions within approved countries.

    How to Configure Geoblocking

    1

    Log in to the Medianova Control Panel.

    2

    Go to CDN → CDN Resources and select the resource you want to manage.

    3

    Open the Security tab.

    4

    Enable the Geoblocking toggle.

    5

    From the country list:

    • Drag or select countries to the Whitelist (allowed).

    • Drag or select countries to the Blacklist (blocked).

    6

    Click Save Changes to apply your configuration.

    7

    (Optional) Add specific IP exceptions under IP Restriction for fine-tuned control.

    You cannot whitelist and blacklist the same country simultaneously.

    Medianova Control Panel
    1

    Toggle the Status to ON

    Click the Status toggle to turn on compression.

    Changing the toggle does not immediately change the CDN's behavior. You need to click Submit to push the updated config to the CDN

    2

    Update the content types (optional)

    The page now shows a list of content types (or: MIME types) that are served compressed by default. You can add content types by typing the content-type in the Add Content Type field and clicking the + button.

    Remove a content type by clicking the small x icon to the right of the content-type.

    3

    Submit the changes

    Click the Submit button to push the updated config to the CDN.

    compression at Medianova
    Medianova Panel

    Headers

    Shared Cache

    Define whether a CDN resource uses its own cache or shares a common cache structure across multiple accounts using the Domain Cache Key.

    Shared Cache allows multiple accounts or domains to use the same cache structure by applying a Domain Cache Key. When set to Share, identical content is cached only once and served across participating accounts, improving efficiency and reducing redundant origin requests. When set to Default, each account maintains its own isolated cache.

    You can manage Shared Cache in the Medianova Control Panel or via API.

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    Configure Shared Cache

    1

    Select the Cache Status

    Choose one of the following options:

    • Default — Each account maintains a separate cache structure.

    • Share — Cache is shared across accounts using the Domain Cache Key.

    2

    Submit the Configuration

    Click Submit to apply the selected cache status.

    Behaviour

    • When set to Share, CDN edge nodes use the same cache namespace for resources that match the Domain Cache Key.

    • Cache hits increase across accounts that serve identical content.

    • Changing the status does not purge existing cache; behavior changes apply to future caching operations.

    • When set to Default, each account's cache becomes isolated again.

    FAQ

    Does enabling Shared Cache expose content from one customer to another? No. Shared Cache only applies where explicit Domain Cache Key alignment exists and is intentionally configured.

    Does switching from Default to Share purge existing cache? No. Existing cached content expires naturally according to its TTL.

    When should Shared Cache be enabled? It is beneficial when multiple accounts deliver the same static assets (e.g., white-label platforms, partner domains).

    Caching

    SAN (Subject Alternative Name)

    Covers multiple domains under a single certificate.

    Multi-domain architectures

    Code Signing SSL

    Used by developers to verify the integrity of software or drivers.

    Application signing, APIs

    Data is delivered end-to-end through encrypted channels.

    Avoid mixed-content warnings by ensuring all assets (images, scripts) load over HTTPS.

    Domain Validation (DV)

    Validates domain ownership only. Simple and fast to issue.

    Blogs, small websites

    Organization Validation (OV)

    Confirms both domain and company identity.

    Corporate or business sites

    Extended Validation (EV)

    Highest validation level; displays organization name in browser UI.

    E-commerce, financial platforms

    Wildcard SSL

    Secures a domain and all its subdomains (e.g., *.yourdomain.net).

    Two-Layer Encryption Flow

    Multi-subdomain services

    The server is delivering only part of the resource due to a Range header sent by the client. Used for resumable downloads or streaming.

    207 Multi-Status

    (WebDAV) Conveys information about multiple resources, returning XML that contains multiple status codes.

    208 Already Reported

    (WebDAV) Used inside a DAV: propstat response element to avoid repeatedly enumerating the same internal members.

    The resource has been permanently moved to a new URI. The client should use the new URI and repeat the request with the same method. POST stays POST.

    The requested resource is capable of generating only content not acceptable according to the Accept headers sent by the client.

    407 Proxy Authentication Required

    The client must authenticate itself with the proxy before the request can be served.

    408 Request Timeout

    The client did not produce a request within the time that the server was prepared to wait.

    409 Conflict

    The request could not be completed due to a conflict with the current state of the resource. Typical in REST APIs when there is a version conflict.

    410 Gone

    The requested resource is no longer available and will not be available again. Typically used to indicate intentionally removed resources.

    411 Length Required

    The server refuses to accept the request without a defined Content-Length header.

    412 Precondition Failed

    One or more conditions given in the request header fields evaluated to false when tested on the server.

    413 Content Too Large

    The request entity is larger than limits defined by the server. (Previously called Payload Too Large).

    414 URI Too Long

    The URI provided was too long for the server to process. Often happens with overly large query strings.

    415 Unsupported Media Type

    The media format of the requested data is not supported by the server (e.g., sending XML where JSON is expected).

    416 Range Not Satisfiable

    The range specified by the Range header field in the request can't be fulfilled; the requested range is outside the size of the target resource.

    417 Expectation Failed

    The server cannot meet the requirements of the Expect request-header field.

    418 I'm a teapot

    Defined in RFC 2324, returned by teapots requested to brew coffee. Not actually used in production systems.

    421 Misdirected Request

    The request was directed at a server that is not able to produce a response (commonly seen in HTTP/2 multiplexed connections).

    422 Unprocessable Content

    The server understands the content type of the request and the syntax is correct but was unable to process the contained instructions. (Common in REST validation errors).

    423 Locked

    The resource that is being accessed is locked. (WebDAV).

    424 Failed Dependency

    The request failed due to failure of a previous request. (WebDAV).

    425 Too Early

    Indicates that the server is unwilling to risk processing a request that might be replayed. Used in early TLS handshake.

    426 Upgrade Required

    The server refuses to perform the request using the current protocol but might be willing if the client upgrades to a different protocol (e.g., switch to TLS/1.2).

    428 Precondition Required

    The server requires the request to be conditional. Intended to prevent the 'lost update' problem.

    429 Too Many Requests

    The user has sent too many requests in a given amount of time (rate limiting).

    431 Request Header Fields Too Large

    The server is unwilling to process the request because its header fields are too large.

    444 No Response

    The server closes the connection without sending any HTTP response to the client. Typically used to drop malicious or unwanted requests silently. Logged in access.log as 444.

    451 Unavailable For Legal Reasons

    The server is denying access to the resource as a consequence of a legal demand (for example, geo-blocking or copyright takedown).

    494 Request Header Too Large

    The client sent HTTP headers that exceed the server’s configured maximum (large_client_header_buffers). The server closes the connection.

    495 SSL Certificate Error

    The server failed to verify the client’s SSL certificate during the handshake (invalid or untrusted client cert).

    496 SSL Certificate Required

    The server expected a client SSL certificate (mutual TLS), but the client did not provide one.

    497 HTTP Request Sent to HTTPS Port

    The client sent a plain HTTP request to an HTTPS port (like port 443). The server detects this mismatch.

    499 Client Closed Request

    The client closed the connection before the server could send a response. This code appears in access.log; it is not sent back to the client.

    Transparent content negotiation for the request results in a circular reference. Very rare.

    507 Insufficient Storage

    The server is unable to store the representation needed to complete the request (typically in WebDAV scenarios).

    508 Loop Detected

    The server detected an infinite loop while processing a request (also seen in WebDAV collections).

    510 Not Extended

    Further extensions to the request are required for the server to fulfill it. Very uncommon.

    511 Network Authentication Required

    The client needs to authenticate to gain network access, often used by captive portals (Wi-Fi login pages).

    ,
    511 Network Authentication Required
    )
  • RFC 4918: HTTP Extensions for WebDAV (defines WebDAV-specific codes like 207 Multi-Status, 422 Unprocessable Entity, 423 Locked, 424 Failed Dependency, 507 Insufficient Storage, 508 Loop Detected)

  • RFC 8470: HTTP 103 Early Hints (specifies 103 Early Hints for resource preloading)

  • Indicates that the error is due to something the client sent (invalid request, missing auth, etc.).

    5xx Server Error

    Indicates that the server failed to fulfill a valid request.

    100 Continue

    The server has received the initial request headers and the client should proceed to send the request body (used with Expect: 100-continue).

    101 Switching Protocols

    The server agrees to switch protocols as requested by the client (for example upgrading from HTTP to WebSocket).

    102 Processing

    (WebDAV) The server has received and is processing the request, but no response is available yet. Prevents client timeouts on long operations.

    103 Early Hints

    Used to return some response headers before the final HTTP message, typically to allow the client to start preloading resources (via Link headers) while the server prepares the final response.

    200 OK

    The standard response for successful HTTP requests. The actual response depends on the request method (GET returns a resource, POST might return confirmation, etc).

    201 Created

    The request was successful and resulted in the creation of a new resource. Often includes a Location header pointing to the new resource.

    202 Accepted

    The request has been accepted for processing, but the processing is not complete. Typically used for async workflows.

    203 Non-Authoritative Information

    The server successfully processed the request but is returning information from another source (like a proxy or transformation) that might not be exactly the original.

    204 No Content

    The server successfully processed the request and is not returning any content. Useful for operations that do not need to change the current page (like clearing a form via JS).

    205 Reset Content

    The server processed the request successfully, but asks the client to reset the document view (like clearing form inputs).

    300 Multiple Choices

    Indicates multiple options for the resource that the client may follow (for example, different file formats). Rarely used in practice.

    301 Moved Permanently

    The resource has been permanently moved to a new URI. Clients should update their references. Future requests should use the new URL.

    302 Found

    The resource resides temporarily under a different URI. The client should continue to use the original URI for future requests. (Most common for standard redirects, but technically should use 303/307).

    303 See Other

    The server directs the client to get the requested resource at another URI using a GET request, typically after a POST.

    304 Not Modified

    Indicates that the resource has not been modified since the version specified by the If-Modified-Since or If-None-Match headers. Client can use cached version.

    307 Temporary Redirect

    The resource resides temporarily at a different URI, and the client should repeat the request using the same method. Unlike 302, it guarantees the same method (POST stays POST).

    400 Bad Request

    The server could not understand the request due to invalid syntax (malformed JSON, missing required parameters, invalid query strings, etc).

    401 Unauthorized

    Authentication is required and has failed or has not yet been provided. The client should provide valid authentication credentials.

    402 Payment Required

    Reserved for future use. Intended to be used for digital payment systems but rarely implemented.

    403 Forbidden

    The client does not have access rights to the content. Unlike 401, authentication will not help; it is an explicit refusal.

    404 Not Found

    The server can not find the requested resource. This is the most common client error.

    405 Method Not Allowed

    The method specified in the request (e.g. POST, GET, DELETE) is not allowed for the resource.

    500 Internal Server Error

    A generic error message indicating an unexpected condition was encountered and the server cannot fulfill the request. No more specific message is suitable.

    501 Not Implemented

    The server does not support the functionality required to fulfill the request (e.g. an unsupported HTTP method).

    502 Bad Gateway

    The server, while acting as a gateway or proxy, received an invalid response from the upstream server.

    503 Service Unavailable

    The server is currently unable to handle the request due to temporary overload or scheduled maintenance. Usually a temporary condition.

    504 Gateway Timeout

    The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server it needed to access.

    505 HTTP Version Not Supported

    The server does not support the HTTP protocol version used in the request (like HTTP/1.0 vs HTTP/2).

    206 Partial Content

    308 Permanent Redirect

    406 Not Acceptable

    506 Variant Also Negotiates

    Replace domain.pfx with your actual filename (e.g., medianova_com.pfx).

    2

    Make the Script Executable

    Run the following command to make the script executable:

    3

    Run the Script

    Execute the script using your .pfx password as an argument:

    Replace yourPFXpassword with the actual password for your .pfx file. The script automatically validates whether the .crt and .key match.

    4

    Files Generated

    After running the script, three files will be generated:

    File Name
    Description

    domain.crt

    5

    Verify the Output

    If extraction is successful, you’ll see one of the following messages in your terminal:

    If the certificate and private key do not match:

    If you see a mismatch error, verify the .pfx file and password before re-running the script.

    1

    Select the Robots.txt File Mode

    Choose Disabled, Enabled, or Origin from the dropdown.

    Mode Behaviors

    Disabled — No robots.txt file is served. Enabled — MN CDN serves its default robots.txt file, allowing crawlers to index all content. Origin — CDN fetches and serves the robots.txt file from your origin.

    2

    Save the Configuration

    Click Submit to apply the selected robots.txt behavior.

    • Enabled mode always serves MN CDN’s default robots.txt content. Customers cannot upload or configure a custom robots.txt file through the Panel.

    • Origin mode delegates full control to your origin server.

    • Changes propagate immediately but may take a short time to be reflected across all PoPs.

    FAQ

    Does Medianova allow uploading a custom robots.txt file? No. In Enabled mode, the CDN serves a predefined robots.txt file that allows all crawling. To use a custom file, select Origin mode and host the file on your origin.

    What happens if my origin has no robots.txt file but I choose Origin mode? The CDN will return 404 Not Found, and search engines will proceed as if no robots.txt file exists.

    Does robots.txt affect CDN caching? No. It only controls search engine bot behavior and does not interact with cache rules.

    Medianova Control Panel
    API

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    Why Use IP Restriction?

    Use IP Restriction to:

    • Protect internal or staging environments from unauthorized access.

    • Restrict API access to trusted partners or corporate networks.

    • Block known malicious IP ranges or suspicious activity.

    • Ensure compliance with internal security policies.

    Key Features

    • Whitelist Mode – Only the IP addresses you specify are allowed to access the resource. All other traffic is blocked.

    • Blacklist Mode – The IP addresses you specify are denied access, while all other IPs are permitted.

    • Edge-Level Enforcement – Filtering occurs at the CDN edge, ensuring zero impact on origin performance.

    • CIDR Range Support – Define large IP ranges using CIDR notation (e.g., 192.168.1.0/24).

    • Mutually Exclusive Modes – You can use either whitelist or blacklist mode, but not both simultaneously.

    Use Whitelist mode for restricted corporate APIs and Blacklist mode for public-facing applications that need selective blocking.

    Medianova’s IP Restriction system provides a simple yet powerful way to enforce access control at the CDN level. By validating requests before they reach your infrastructure, it prevents unauthorized access and improves overall performance stability. Combined with other Security features such as Rate Limiting, WAF, and Hotlink Protection, it forms a robust multi-layer defense mechanism.

    Flexible Matching Rules: Define custom routing rules based on URI patterns, protocols, or domain structures to align with complex backend logic.

  • Enhanced Performance: Reduces latency and improves response times for real-time content by fine-tuning origin configuration.

  • How to Configure Advanced Origin Settings

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Origin Settings tab.

    4. Navigate to the Advanced Origin Settings section in the Medianova Cloud Panel.

    1. Click the Add button to open the configuration popup.

    2. Fill in the following fields:

      • URI Match Mode: Select the matching mode for URIs (e.g., exact match, prefix, or regex).

      • URI Match Rule: Define the URI pattern based on the selected mode.

      • Protocols: Choose between HTTP, HTTPS, or Same as Request to determine how the traffic should be routed.

      • Domain or IP: Enter the domain or IP address of the origin server.

      • HTTP Port: Specify the HTTP port to use for connections.

      • HTTPS Port: Specify the HTTPS port to use for secure connections.

      • Host Header: Provide a custom host header if required for the origin server.

      • Priority: Assign a priority level to this rule to determine its precedence in case of multiple matching configurations.

    3. Click the Add button.

    4. Click the Submit button.

    JSON

    Structured format with separate IPv4 and IPv6 lists. Useful for automation and API integrations.

    Plain Text

    Simple text file where each IP block is listed on a separate line. Suitable for manual import or quick reference.

    CSV

    Comma-separated values file suitable for importing IP blocks into spreadsheets or scripts.

    Only allow traffic from Medianova’s IP ranges to reach your origin server (block all other sources). This practice secures your origin by preventing direct attacks and bypass attempts. Also ensure you include every address (both IPv4 and IPv6) in the allowlist. If any Medianova IP is omitted or blocked, the CDN cannot retrieve content from your origin.

    Configure Origin Response Timeout

    Follow the steps below to set the timeout duration.

    1

    Set the Timeout Duration

    Enter a timeout value between 5 seconds and 300 seconds.

    The CDN will wait for the origin response up to the duration you specify.

    2

    Save the Configuration

    Click Submit to apply the timeout value. The new timeout setting takes effect immediately.

    Timeout Behavior

    • The CDN waits for the origin to respond for the configured duration.

    • If the timeout is reached, the CDN returns 504 Gateway Timeout to the client.

    • Lower values improve failover speed; higher values allow slow origins more time to respond.

    Recommended Settings

    • 5–30 seconds: Fast origins or latency-sensitive applications

    • 30–120 seconds: Moderate response times or variable workloads

    • 120–300 seconds: Heavy processing at the origin (reports, large queries, image generation)

    Troubleshooting

    Issue: Clients receive 504 responses. Cause: Origin cannot respond within the configured timeout. Fix: Increase the timeout value or optimize origin performance.

    Issue: Requests feel slow before failing. Cause: Timeout value is set too high. Fix: Reduce the timeout to a more suitable duration.

    Medianova Control Panel
    API

    When the feature is active:

    • The CDN overwrites the Host header in the origin request with the domain you provide.

    • The domain must be entered without http:// or https://.

    • The configured value is applied to all origin fetches for the selected CDN Resource.

    • The behavior supports any valid domain that your origin server expects for routing or validation.

    The purpose of this feature is to ensure compatibility with origins that require a specific hostname, especially in environments where multiple sites share the same origin infrastructure.

    Origin Host Header field enabled with sample domain

    Use Cases

    Virtual hosting environments

    Ensure the correct site is selected when multiple hostnames share the same origin.

    Multi-tenant systems

    Send a tenant-specific domain in the Host header for proper routing.

    Origin behavior validation

    Match the exact hostname your origin expects for SSL/SNI evaluation or application routing logic (when applicable to host header usage).

    Notes

    • Enter only the domain name (e.g., subdomain.example.com).

    • Do not include URL schemes such as http:// or https://.

    • This feature modifies only the origin-bound request and does not impact the viewer response.

    • Incorrect domain entries may cause the origin to respond with errors or unexpected routing behavior.

    Medianova Control Panel
    API

    Query String Caching

    Control how query strings affect CDN cache behavior for dynamic or parameterized URLs.

    Query String Caching defines how URLs containing query parameters are interpreted by the CDN cache. You can cache each query string variant separately, ignore selected query strings, or build the cache key using only specific parameters.

    You can manage Query String Caching in the Medianova Control Panel or via API.

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Query String Caching section under the Caching tab.

    Configure Query String Caching

    This workflow defines the primary caching behavior for URLs containing query strings.

    1

    Select the Query String Caching Mode

    Choose one of the following options under Query String Caching:

    • On – Cache each query string variant separately.

    Configure Ignore Specific Query Strings

    Exclude selected query string parameters so they do not create separate cached variants.

    1

    Enable Ignore Specific Query Strings

    Toggle Ignore Specific Query Strings to On.

    2

    Cache Specific Query Strings Only

    Build the cache key using only selected parameters and ignore all others.

    1

    Enable Cache Specific Query Strings Only

    Toggle Cache Specific Query Strings Only to On.

    2

    Behaviour

    • On: The CDN caches each unique query string as a separate variant.

    • Off: Query strings are ignored; all variants map to a single cached object.

    • Request URI: The full request URI is used as the cache key.

    • Ignore Specific Query Strings: Excluded parameters do not contribute to the cache key.

    FAQ

    Do ignored parameters count toward the cache key? No. Ignored parameters never create new cache variants.

    Can both Ignore and Cache Specific modes be enabled together? No. Only one mode can be active.

    What happens if all modes are Off? All query variations serve the same cached response.

    Does enabling On increase cache fragmentation? Yes. Each query combination creates a separate cached object.

    Origin SNI Request

    Learn how to configure Origin SNI Request to ensure secure SSL/TLS connections between the CDN and your origin server.

    Origin SNI Request enables the CDN to send the correct Server Name Indication (SNI) value when establishing SSL/TLS connections with your origin. This ensures that the origin server selects the appropriate SSL certificate, especially when hosting multiple domains on the same IP address.

    Enabling this feature improves compatibility and prevents certificate mismatch errors during HTTPS communication.

    You can manage Origin SNI Request using the Medianova Control Panel or API.

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.

    Configure Origin SNI Request

    Follow the steps below to enable and configure Origin SNI Request for your CDN Resource.

    1

    Enable Origin SNI Request

    Toggle Origin SNI Request to On.

    The domain input field becomes active.

    2

    How SNI Works

    During an SSL/TLS handshake, the CDN includes the SNI extension, which specifies the domain name requested by the client. This allows the origin server to:

    • Select the correct SSL certificate

    • Support multiple domains on a shared IP

    • Avoid certificate mismatch errors

    When to Enable Origin SNI Request

    Use this setting when:

    • Your origin serves multiple HTTPS domains from the same IP

    • The origin requires SNI to present the correct SSL certificate

    • You encounter HTTPS 421 or certificate mismatch errors

    What Happens if the Setting is Disabled

    If SNI is not sent:

    • The origin may return the wrong SSL certificate

    • HTTPS validation may fail

    • Dynamic requests may intermittently fail under multi-domain hosting setups

    Troubleshooting

    Issue: HTTPS requests fail with certificate mismatch. Cause: The origin returned the default certificate instead of the certificate for the requested domain. Fix: Enable Origin SNI Request and enter the correct domain.

    Issue: Origin returns 421 Misdirected Request. Cause: The origin requires SNI to route the request to the correct virtual host. Fix: Ensure the SNI domain matches the vhost configuration on the origin.

    Issue: Requests fail after enabling SNI. Cause: Incorrect domain entered in the Origin SNI Request Domain field. Fix: Confirm that the domain matches a valid certificate installed on the origin.

    Rate Limiting

    Control traffic flow, protect resources, and ensure fair usage across your CDN resources with Medianova’s intelligent Rate Limiting feature.

    Rate Limiting helps you maintain stable application performance by controlling how many requests a client can make in a given time frame. It protects against excessive API calls, brute-force attempts, and high-frequency requests that can degrade origin performance or service quality.

    With Medianova’s edge-level implementation, rate limits are applied directly at the CDN layer — before the traffic reaches your origin servers — ensuring both reliability and efficiency.

    Rate Limiting is available for Dynamic CDN Resources and can be configured per domain, path, or file extension through the Medianova Control Panel.

    Why Use Rate Limiting?

    Rate Limiting ensures a secure, predictable, and efficient experience for all users by:

    • Preventing abuse or overload from bots or aggressive clients.

    • Protecting login endpoints and API gateways from brute-force attacks.

    • Ensuring fair bandwidth distribution among users.

    • Preserving origin stability and avoiding unnecessary compute or database load.

    Key Features

    • Customizable Limits – Define request thresholds per second or minute to suit your application.

    • Edge-Level Enforcement – Limit requests at the CDN edge, preventing overload before it reaches your origin.

    • Burst Control Options – Configure how short bursts of requests are handled:

    Use Cases

    • API Protection – Prevent abuse of public APIs and ensure consistent response times.

    • Authentication Endpoints – Limit login attempts to protect user accounts.

    • Download or Media Control – Restrict large file or video download frequency to optimize CDN performance.

    • E-commerce Traffic Shaping – Manage checkout or cart requests during high-traffic campaigns.

    Built for Performance

    Medianova’s Rate Limiting operates at the edge, ensuring minimal latency and zero impact on normal user experience. By combining adaptive enforcement, path-based rules, and real-time analytics, it enables granular control over how traffic interacts with your CDN — keeping your applications fast, fair, and secure.

    You can configure and monitor Rate Limiting directly through the Medianova Control Panel under the Security section.

    Edge Cache Expiration

    Learn how to configure how long content remains cached on CDN edge servers.

    Edge Cache Expiration controls whether CDN edge servers cache an object and how long the cached content remains valid before it must be refreshed from the origin.

    It defines the caching behavior applied at the edge, including modes that disable caching entirely or defer expiration settings to the origin.

    You can manage Edge Cache Expiration in the Medianova Control Panel or via API.

    Configure Edge Cache Expiration

    Use this workflow to define how the CDN determines cache duration and applies expiration rules on edge servers.

    1

    Access the Edge Cache Expiration

    This feature is located under the Caching tab in any CDN Resource. This section includes the Cache Type selector and expiration time fields.

    2

    Select the Cache Type

    Choose how the CDN evaluates cache duration:

    Edge — The CDN applies the expiration time configured in the Panel. A value of 0 disables caching. Origin — The CDN honors cache headers sent by the origin. If no cache duration is provided, the Panel-defined value applies. A value of 0 disables caching. Dynamic — The CDN does not cache the content. All requests always forward to the origin regardless of origin headers or Panel settings.

    3

    Enter the expiration time

    Specify how long content should remain cached on edge servers. For Origin mode, this value is applied only when the origin provides no cache duration.

    4

    Save the configuration

    Click Submit to apply the updated caching rules across the CDN network.

    • A value of 0 disables caching for both Edge and Origin modes.

    • Dynamic mode always bypasses caching on edge servers.

    • These settings do not impact browser caching; use for client-side caching behavior.

    Best Practices

    • Apply long TTL values for static assets such as images, fonts, CSS, and JavaScript.

    • Use shorter TTL values for frequently updated or dynamic endpoints.

    • Monitor edge cache hit ratios to optimize performance and origin load.

    Range Based Caching

    Cache partial content based on byte ranges so the CDN can serve only the requested portions of large files.

    Range Based Caching allows the CDN to cache and deliver content in byte-range segments rather than requiring the entire file to be fetched or cached. This improves performance for large files such as videos, archives, or software downloads by serving only the requested portions.

    You can manage Range Based Caching in the Medianova Control Panel or via API.

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    Configure Range Based Caching

    1

    Enable Range Based Caching

    Toggle Range Based Caching to On to allow the CDN to cache partial byte-range segments.

    2

    Select Segment Size

    Choose a Segment Size value to define how large each cached byte-range segment should be. This determines how the CDN partitions and stores partial content.

    3

    Save the Configuration

    Click Submit to apply the Range Based Caching settings.

    Behaviour

    • The CDN caches content in fixed-size byte segments defined by Segment Size.

    • Requests for ranges within the same segment are served directly from cache.

    • Useful for video playback, downloads, and large binary files where clients request only parts of a resource.

    • A smaller segment size increases cache precision but may increase the number of stored segments.

    FAQ

    Does Range Based Caching improve video streaming performance? Yes. It prevents the CDN from fetching the entire file when only a portion is requested, improving responsiveness.

    What happens if I change the Segment Size? New segment size applies only to future cached segments. Existing segments remain until evicted.

    Is this feature required for byte-range requests to work? Byte-range requests work regardless, but enabling Range Based Caching ensures partial responses can come from cache instead of the origin.

    X-XSS Protection

    Learn how the X-XSS Protection header controls browser-side filtering of reflected Cross-Site Scripting (XSS) attacks.

    The X-XSS Protection feature adds the X-XSS-Protection header to viewer responses. This header instructs compatible browsers to enable their built-in XSS filtering mechanisms. While most modern browsers now ignore this header, the setting can still provide protection for legacy browsers that rely on it.

    The feature does not modify origin requests or affect CDN caching behavior.

    How X-XSS Protection Works

    You can configure X-CDN Header in the Medianova Control Panel or via API

    When enabled:

    • The CDN adds the following header to viewer-facing responses:

    • Browsers that still support the header will block pages that trigger reflected XSS heuristics.

    • If disabled, the CDN does not include the header, and browsers revert to their default behavior.

    This feature is primarily relevant for environments that depend on legacy browser compatibility.

    Use Cases

    Legacy browser support

    Provide reflected-XSS filtering for older browsers that still honor the header.

    Controlled security posture

    Ensure consistent browser behavior across mixed device environments or corporate networks with outdated browser fleets.

    Notes

    • Modern browsers (Chrome, Edge, Safari) ignore X-XSS-Protection and instead rely on CSP (Content-Security-Policy) for XSS mitigation.

    • This feature affects only viewer responses, not origin requests.

    • Enabling the header does not prevent stored or DOM-based XSS attacks.

    X-CDN Header

    Learn how the X-CDN Header adds CDN-specific information to origin requests in the Medianova Control Panel.

    The X-CDN Header feature adds an X-CDN header to requests that are forwarded from the CDN to your origin. This allows your origin to identify that the request is coming through Medianova CDN, which can be useful for logging, routing decisions, and origin-side analytics.

    This feature does not modify the response returned to the viewer and does not affect caching or delivery logic.

    How X-CDN Header Works

    You can configure X-CDN Header in the or via

    When the X-CDN Header toggle is enabled:

    • The CDN adds the X-CDN header to the origin request during the fetch operation.

    • Your origin receives every request with this header included.

    • The header allows your origin to distinguish CDN-proxied traffic from direct client traffic.

    • The behavior applies to all request types because insertion occurs before the origin fetch.

    This feature is passive and does not alter cache decisions, TTL behavior, Page Rules, or viewer-facing responses.

    Use Cases

    Origin-side analytics

    Log whether a request came through the CDN layer by checking for the X-CDN header.

    Conditional behavior at the origin

    Apply specific logic (e.g., rate limits, routing decisions, request tagging) based on the presence of this header.

    Debugging origin fetches

    Verify that requests are reaching your origin through the CDN, especially when diagnosing caching or routing flows.

    Notes

    • The header is inserted only on the origin request.

    • It is not visible to clients and does not appear in viewer-facing responses.

    • Header values may differ based on internal CDN configuration.

    • Enabling the header does not change caching rules, request normalization, or delivery performance.

    Aksela Test Steps

    1. The IP address of the CDN URL shared with you by the Medianova Technical Sales team or created via a Free trial can be found as follows.

    • The CDN URL is pinged by opening the Command Prompt. (CDN URL = <zone_name>.mncdn.com)

    Example: ping <zone_name>.mncdn.com

    1. The IP address retrieved above is written to the “host” file of your computer.

    • Open the Run tab by pressing the Windows key + R.

    • Type system32 in the search bar and click ok.

    • On the screen that opens, navigate to the drivers folder and open it.

    • Navigate to the etc folder in the “drivers” folder and open it.

    • Add the IP address you obtained in the first step and the website you want to reach using this IP address and save the file as shown below.

    • Clear the browser cache. Make a request to the page by typing in the address bar. After opening the page, right-click on an empty area and select inspect. The Network tab will open. Verify that the .html file comes from Medianova when you see the MNCDN description under the Server tab.

    Error Status Code Cache Expiration

    The Error Status Code Cache Expiration feature in the Medianova Cloud Panel for dynamic content allows you to cache error responses (such as 404, 500, etc.) generated by dynamic content for a specified duration. This helps manage error handling efficiently by reducing unnecessary load on the origin server and optimizing cache usage.

    Key Features

    • Cache Error Status Codes: You can define a set of dynamic error codes (e.g., 404, 500) and specify a cache duration for each. By caching these error responses, you prevent the origin server from repeatedly processing the same error conditions, reducing server load and improving overall performance.

    • Removal of Caching Definition: If you decide that certain error codes should no longer be cached, you can remove their definitions. Requests for these error codes will then bypass the CDN cache and go directly to the origin server. However, cached error content will remain in the cache until the specified cache duration expires, ensuring that the system operates smoothly during transitions.

    By configuring Error Status Code Cache Expiration for dynamic content, you can control how error responses are handled and cached, reducing server strain while still allowing for accurate error management when needed. This feature is especially useful for error pages that are generated dynamically, such as custom 404 pages or server error responses, where frequent caching can save resources without compromising on error response accuracy.

    How to Configure Error Status Cache Expiration

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Error Status Code Cache Expiration section in the Medianova Cloud Panel.

    1. Click the Add button to create a new definition.

      • Cache Time: Specify the cache duration for the error code (in seconds).

      • Status Code: Enter the HTTP status code(s) that you want to cache (e.g., 404, 500, etc.).

      • Add Multiple Definitions

    Edge Cache Expiration

    The Edge Cache Expiration setting in the Medianova Cloud Panel for dynamic content allows you to control how long dynamically generated content is cached on the CDN edge servers before it expires. This setting helps to strike a balance between performance and freshness, ensuring that dynamic content is served quickly from the edge servers while still allowing for real-time updates from the origin server when needed.

    Key Features

    • Cache Type: For dynamic content, the cache type ensures that content is cached at the edge servers but can be dynamically retrieved from the origin server as necessary. This ensures that frequently accessed dynamic resources are delivered quickly, while also ensuring the content remains up-to-date when needed.

    • Cache Time Configuration: Define the expiration time for dynamic content cached on the edge servers. You can set specific expiration times based on the nature of the dynamic content, ensuring that data is refreshed based on its update frequency. When both edge and origin cache settings are used, the system will prompt you to define cache expiration for each to optimize delivery.

    By adjusting the Edge Cache Expiration for dynamic content, you can enhance performance by serving cached content quickly while ensuring that any real-time or user-specific data is always up-to-date. This is especially useful for content that changes frequently, such as user profiles, real-time data, or personalized resources.

    How to Configure Edge Cache Expiration

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Edge Cache Expiration section in the Medianova Cloud Panel.

    1. Select Cache Type: Choose edge-origin-dynamic as the cache type.

    2. Define Cache Expiration Time: When both edge and origin cache settings are enabled, you will be prompted to specify the cache expiration time for both. Set the expiration time according to your needs.

    3. Once you’ve configured the expiration time, click Save to apply the changes.

    By setting the Edge Cache Expiration, you can ensure that content is efficiently cached on the edge servers while still allowing for timely updates from the origin server when required.

    Cookie Base Cache

    The Cookie-Base Cache feature in the Medianova Cloud Panel enables caching decisions based on specific cookies. This feature allows you to define multiple cookie values, ensuring that content caching aligns with different user sessions and dynamic content requirements.

    Key Features

    • Cache Based on Specific Cookies: When enabled, this feature ensures that caching behavior is determined by the presence and values of specified cookies. This is particularly useful for personalizing content or delivering dynamic resources based on user-specific data.

    • Support for Multiple Cookies: You can define multiple cookies to fine-tune caching strategies for diverse user interactions. Each cookie value can influence how the cache is managed for specific scenarios.

    How to Configure Cookie Base Cache

    1. Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Scroll down to the Cookie-Based Cache section.

    Important Notes

    • Dynamic Content Optimization: This feature helps deliver personalized or session-specific content by adjusting caching behavior based on user cookies.

    • Multiple Cookie Values: Define as many cookie values as necessary to address the caching needs of your application.

    By configuring the Cookie-Based Cache settings, you can ensure a seamless user experience while optimizing caching for dynamic and personalized content delivery.

    Web Application Firewall (WAF)

    Protect your web applications from common exploits and malicious traffic with Medianova’s Web Application Firewall (WAF).

    WAF is Medianova’s intelligent web security layer that protects your applications from malicious traffic, bots, and exploits. With real-time filtering, custom rule control, and built-in analytics, it helps you prevent attacks before they reach your origin servers.

    Why Choose WAF?

    Medianova WAF combines ease of use, robust protection, and edge-level performance to keep your web applications secure. Unlike standard firewalls, WAF protects against both network and application-layer attacks.

    • Edge-level protection – All traffic is filtered at Medianova’s global CDN edge before it reaches your origin.

    • Managed Rules – Constantly updated rulesets by Medianova’s Security Team, including OWASP Top 10 protections.

    • Custom Rules – Define your own rules to block, allow, or log specific requests.

    • Real-time defense – Detect and mitigate attacks instantly without affecting legitimate traffic.

    Key Features

    • OWASP Top 10 Protection – Shields against SQL Injection, XSS, and other common web vulnerabilities.

    • Custom Rule Engine – Create granular policies based on IP, URI, headers, or user agents.

    • Monitoring Mode – Observe how rules behave before full activation.

    • Instant Mitigation – Block or log attacks in real time with no latency impact.

    Use Cases

    • Web Application Security – Protect public websites and portals from injection and XSS attacks.

    • API Protection – Filter and control requests to your backend APIs.

    • E-commerce Security – Prevent data breaches, bot abuse, and checkout exploitation attempts.

    Built for Modern Web Security

    Medianova WAF delivers enterprise-grade web protection that’s easy to deploy and manage through the . It helps you stay secure without adding complexity — protecting your applications from the edge, in real time.

    Page Rules

    Learn about Page Rules, how to manage Page Rules and the available settings.

    Page Rules trigger one or more actions on an incoming request to Medianova CDN whenever a defined URL pattern is matched.

    Page Rules are available in the Medianova Panel for any CDN resource in the Page Rules tab.

    Available settings for Page Rules include Cache Type, Custom Header, Geoblocking and more.

    Availability

    Page Rules can be configured foror CDN resources of type Small, Dynamic, Large & VOD.

    The default number of allowed page rules depends on the package as shown below.

    Free
    Pro
    Business
    Enterprise

    Priority Order Matters

    Only one Page Rule will trigger per URL, that is the the matching page rule with the highest priority.

    In the Medianova Panel, Page Rules are sorted top-to-bottom from highest priority to lowest priority. For this reason, we recommend ordering your rules from most specific to least specific.

    Origin Response Timeout

    The Origin Response Timeout setting in the Medianova Cloud Panel allows you to control how long the system waits for a response from your origin server before marking the request as failed. In dynamic content delivery, where requests often depend on real-time data or API responses, managing timeout settings becomes critical to ensure responsiveness and maintain performance.

    Key Features

    • Customizable Timeout Duration Set a specific time (in seconds) for the system to wait for responses from your dynamic origin server.

      • Min: 5 seconds

      • Max: 300 seconds

    • Dynamic Content Optimization Adjust timeout settings to account for real-time backend processing or API response variability, balancing performance and availability.

    • Improved Request Efficiency Reduce failed requests and latency by defining appropriate timeout values for dynamic origin servers.

    Key Benefits

    • Real-Time Performance: Ensures dynamic requests complete within acceptable timeframes, even under variable load.

    • Optimized API Handling: Prevents unnecessary failures when API responses require slightly longer processing.

    • Enhanced User Experience: Reduces delays for end users, ensuring that dynamic content is delivered seamlessly.

    How to Configure Origin Response Timeout

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Origin Settings tab.

    4. Navigate to the Origin Response Timeout section in the Medianova Cloud Panel.

    1. Set the Timeout Duration: In the Origin Response Timeout section, set the timeout value between 5 seconds and 300 seconds, according to your needs.

    2. After adjusting the timeout, click Save to apply the new settings.

    By configuring the Origin Response Timeout, you can optimize the time the system waits for a response, ensuring that requests are handled efficiently without unnecessary delays.

    Etag Verification

    The Etag Verification feature in the Medianova Cloud Panel for dynamic content allows the CDN to validate cached dynamic content against the origin server using entity tags (ETags). This ensures that the dynamically generated resources are up-to-date and that the CDN only refreshes the cache when the content has changed, optimizing both performance and accuracy.

    Key Features

    • Etag Validation:

      • When enabled, the Etag header is used to check the validity of cached dynamic content. This ensures that the content served from the CDN is always synchronized with the most recent version from the origin server. The Etag helps prevent the delivery of outdated or incorrect content, especially for dynamic resources that might change frequently based on user interactions, session data, or real-time information.

    By using Etag Verification for dynamic content, you ensure that the CDN serves the freshest version of dynamic resources without unnecessarily re-fetching them from the origin server, improving load times and resource utilization. This is especially beneficial for dynamic content that changes often, such as personalized data, real-time updates, or API responses.

    How to Enable Etag Verification

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Etag Verification section in the Medianova Cloud Panel.

    Enable Gzip from Origin

    Fetch gzip-compressed text files from your origin for faster, more efficient content delivery.

    The Enable Gzip from Origin setting lets Medianova CDN fetch gzip-compressed content directly from your origin using the Accept-Encoding: gzip header. When enabled, the CDN retrieves already-compressed versions of text-based files such as .js, .css, and .txt instead of fetching and compressing them again.

    This reduces origin data transfer and improves delivery performance.

    This feature applies only to text-based file types (such as .js, .css, .txt, and HTML). Image formats (JPG, PNG, WebP, AVIF) are excluded because they already go through .

    You can enable this feature via or API

    Enable Gzip from Origin

    1

    Open CDN Resources in the left-hand menu.

    This section lists all CDN Resources available in your account.

    2

    Medianova CDN starts sending the Accept-Encoding: gzip header to your origin for eligible file types.

    Troubleshooting

    Issue
    Cause
    Solution

    Stale Cache

    The Stale Cache feature in the Medianova Cloud Panel for dynamic content allows you to serve previously cached content when certain HTTP error codes or an "Updating" status is encountered. This ensures continuous availability of content, even during temporary issues with the origin server or while content is being updated.

    Key Features

    • Maintain Availability: The Stale Cache feature allows you to serve cached content when the origin server is temporarily unavailable or encounters specific error codes (such as 500 or 503). This ensures that users can still access content without disruption, even if the origin server is experiencing issues.

    • Customizable Error Triggers: You can define which HTTP error codes or the "Updating" status will trigger the use of stale cached content. This allows you to customize when the CDN should serve cached content instead of waiting for a fresh response from the origin server.

    • Improved User Experience: By serving stale cached content during backend disruptions, the Stale Cache feature minimizes downtime and ensures users continue to have access to content. This is particularly useful for dynamic content that might be subject to frequent changes or when there are temporary delays in fetching new data from the origin server.

    The Stale Cache feature helps enhance reliability and user experience by reducing the impact of origin server downtime or content updates, ensuring that users are always able to access content with minimal interruptions.

    Supported Triggers:

    You can configure the system to serve stale cached content when any of the following statuses are detected:

    • Updating: Triggered when content is in the process of being updated.

    • HTTP_500: Internal Server Error.

    • HTTP_502: Bad Gateway.

    • HTTP_503: Service Unavailable.

    How to Configure Stale Cache

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Stale Cache section in the Medianova Cloud Panel.

    Upload and Manage SSL Certificates

    Learn how to upload and manage SSL certificates in the Medianova Control Panel.

    SSL/TLS certificates enable encrypted HTTPS communication between users and CDN Resources. You can upload your own certificate, use Medianova’s shared SSL, or activate a free certificate provided by Let’s Encrypt.

    TLS is the modern version of SSL. All Medianova services support TLS 1.2 and TLS 1.3 by default.

    1

    Redirect Handle From Origin

    Learn how to manage Redirect Handle From Origin to control how 3xx redirect responses from your origin are processed by the CDN.

    Redirect Handle From Origin allows the CDN to modify request or response headers when the origin returns a 3xx redirect.

    You can select which redirect codes to handle and optionally add or modify headers sent during redirection.

    This provides greater control over origin-driven redirects and ensures consistent client behavior.

    You can manage Redirect Handle From Origin using the or the .

    In the , go to CDN Resources, select your resource, and navigate to Origin Settings

    How to Activate WAF

    Learn how to activate and configure the Web Application Firewall (WAF) for your CDN Resources in the Medianova Control Panel.

    WAF (Web Application Firewall) enhances your website’s security by inspecting and filtering incoming HTTP/HTTPS traffic. You can enable it for any Dynamic CDN Resource, select the protection mode, and create Custom Rules to detect and block malicious requests.

    WAF is available only for Dynamic CDN Resources. Ensure your resource is active before proceeding.

    1

    Error Status Code Cache Expiration

    Configure how long specific HTTP error responses remain cached on CDN edge servers.

    Error Status Code Cache Expiration defines how long selected HTTP error responses (such as 404 or 500) stay valid in the CDN cache. This reduces repeated requests to the origin when the same error occurs frequently.

    You can manage Error Status Code Cache Expiration in the or via .

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    Configure Error Status Code Cache Expiration

    Stale Cache

    Serve stale cached content when the origin returns specific HTTP error responses or enters an Updating state

    Stale Cache allows CDN edge servers to deliver the last cached version of an object when the origin becomes temporarily unavailable. This includes conditions such as 500–504 errors, invalid headers, timeouts, forbidden responses, or an Updating status. Enabling Stale Cache helps maintain availability and ensures continuity of service during short-term origin instability.

    You can manage Stale Cache in the or via .

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Stale Cache.

    Configure Stale Cache

    This workflow defines which origin responses allow the CDN to serve stale cached content.

    How to Prefetch

    Perform Prefetch operations through the Control Panel or API to proactively cache files and deliver them instantly to end-users.

    Prefetch allows you to pull specific files from your origin into the CDN cache before any user requests them. Use this feature to eliminate cache misses, reduce origin load, and ensure fast delivery to the first users.

    You can initiate Prefetch via the or .

    Prefetch does not overwrite existing cached content. To update a file that is already cached, you must first Purge it and then Prefetch.

    Mobile Device Cache

    Define device-based caching behavior to create separate cached versions for mobile, tablet, and desktop clients.

    Mobile Device Cache allows the CDN to generate different cache entries based on the detected device type. This ensures that each device category receives appropriately formatted content without cache conflicts.

    The feature also forwards device information to your origin using the X-DEVICE and X-MOBILE headers.

    You can manage Mobile Device Cache in the

    Log in to the , select a CDN resource in the CDN section, and navigate to the Caching tab.

    Enable Mobile Device Cache

    Compression

    Learn all about Gzip and Brotli compression at Medianova, including which content types are compressed by default and compression of error responses.

    Gzip and Brotli compression reduces file sizes by up to 80% for common content types like HTML, CSS and JavaScript, leading to faster load times and improved user experience. This not only enhances website performance and improves SEO / Core Web Vitals, but also decreases bandwidth usage, saving CDN costs and ensuring efficient content delivery.

    Compression at the Edge

    Gzip compression happens at Medianova Midcache servers, which is then passed on to the Edge servers. Both the Midcache and Edge servers may cache the Gzip compressed content for faster delivery of next responses. Edge servers perform Brotli compression on-the-fly when requested by the client.

    Medianova delivers content with Gzip compression, Brotli compression or no compression depending on:

    How to Purge

    Learn how to invalidate cached content instantly across all Medianova CDN

    You can manage Purge operations in the or via .

    Log in to the , select a CDN Resource in the CDN section, and navigate to the Purge tab.

    Purge Cached Files

    Purge instantly invalidates cached content across all Medianova CDN cache layers. Use this feature when updated content is not yet reflected or when outdated assets need to be refreshed.

    1

    Query String Caching

    The Query String Caching feature in the Medianova Cloud Panel for dynamic content allows you to manage how query strings are handled and cached by the CDN. For dynamic content, query strings often carry important parameters, such as user-specific data, filters, or session identifiers. With this feature, you can control how variations of a dynamic URL with different query strings are cached separately or treated as the same resource.

    Key Features

    • Enable Query String Caching: When enabled, each unique query string variation of a dynamic URL will be cached separately. This allows dynamic content with different query parameters (e.g., user IDs, session tokens, or filters) to be treated as distinct cached resources, optimizing delivery for different content variations.

    X-Content Type Options

    Learn how the X-Content-Type-Options header prevents MIME sniffing and enforces strict content-type handling in the browser.

    The X-Content-Type-Options feature adds the X-Content-Type-Options header to viewer responses. This header instructs compatible browsers not to perform MIME sniffing and to rely strictly on the Content-Type declared by the server. Disabling MIME sniffing helps reduce exposure to certain injection and cross-site scripting (XSS) vectors.

    The feature does not modify origin requests or CDN caching behavior.

    Enable Gzip from Origin

    Fetch gzip-compressed text-based content from your origin to improve delivery efficiency.

    Enable Gzip From Origin allows the CDN to request text-based files from your origin using the Accept-Encoding: gzip header.

    This feature is available for Small, Large, and Dynamic CDN Resources.

    If the origin supports gzip, the CDN stores the compressed version in cache; otherwise, it stores the uncompressed response.

    X-Frame Options

    Learn how the X-Frame Options feature controls which sites are allowed to frame your content.

    The X-Frame Options feature adds the X-Frame-Options HTTP response header to prevent unauthorized framing of your website. This header is commonly used to mitigate clickjacking attacks by restricting how and where your content can be embedded inside an <iframe>.

    When enabled, the CDN includes the header in responses according to the configuration you provide.

    How X-Frame Options Works

    You can configure X-CDN Header in the or via

    HTTP Strict Transport (HSTS) Protection

    Learn how HSTS Protection enforces HTTPS-only access for your CDN Resource.

    HTTP Strict Transport Security (HSTS) instructs browsers to connect to your domain only over HTTPS for a defined period of time. When enabled, the CDN adds the Strict-Transport-Security header to HTTPS responses, preventing protocol downgrade attacks and reducing the risk of session or cookie interception.

    HSTS can also extend enforcement to subdomains and optionally request inclusion in browser preload lists.

    How HSTS Protection Works

    You can configure X-CDN Header in the or via

    Configure IP Restriction

    Learn how to enable and configure IP Restriction in the Medianova Control Panel to allow or block access from specific IP addresses.

    IP Restriction enables you to define which IP addresses can access your CDN Resources by using either whitelist or blacklist rules. When configured, access control is enforced at the CDN edge, ensuring that unauthorized requests are blocked before they reach your origin server.

    You can enable IP Restriction for each CDN Resource in the

    1

    Rewrite Origin URLs

    The Rewrite Origin URLs feature enables precise control over how dynamic requests are routed to the origin server. By defining flexible rewrite rules, you can seamlessly map public-facing URLs to complex backend structures, ensuring efficient content delivery for frequently changing or user-specific resources.

    Key Features

    • Match Mode Options: Define dynamic matching criteria to identify URL patterns that require rewriting. Supports regular expressions and parameter-based matching for complex routing scenarios.

    Integrating Dynamic CDN Resource

    1. Click on the CDN Resource menu, select the CDN Resource you created and move to the Caching menu.

    1. First you need to configure the Cache Settings at the bottom of the page. Cache Type field provides two options.

    Create Dynamic Resource

    Aksela can integrate support for CNAME records, allowing domain mapping to another hostname instead of an IP address. However, some DNS providers do not support CNAME records at the root domain (example.com → ddd.mncdn.com) due to DNS standards. In such cases, only subdomains (e.g., → ddd.mncdn.com) can use CNAME records.

    Example: Supported (Subdomain CNAME):

    Redirect Handle From Origin

    The Redirect Handle From Origin feature provides advanced control over how redirects are managed between the CDN and your origin server, tailored specifically for dynamic content delivery. Redirects for dynamic content often depend on real-time variables, such as user sessions, geolocation, or API responses. This feature ensures that such redirects are handled efficiently, maintaining low latency and a seamless user experience.

    Key Features

    • 3xx Status Code Configuration Customize and manage HTTP status codes in the 3xx range (e.g., 301, 302, 307) to optimize redirect behavior for dynamic content. Fine-tune how redirect rules interact with personalized or session-based requests.

    CORS Header

    Learn about the CORS Header and how to enable and configure this feature.

    Cross-origin resource sharing (CORS) is a browser security mechanism that determines whether a web page can load resources from a different origin. While browsers allow cross-origin images, CSS files, scripts, iframes, and videos without restrictions, other request types — such as Ajax calls and web fonts — are blocked by default under the same-origin policy.

    CORS defines how browsers and servers evaluate cross-origin requests. Medianova CDN can send the access-control-allow-origin header in HTML responses to enable controlled cross-origin access.

    By default, Medianova CDN forwards any CORS-related headers sent by your origin. You only need to enable CORS Header if you want CDN edges to set or override this header.

    If your origin already sends a correct CORS header with HTML responses and you do not see CORS errors, you can keep CORS Header disabled.

    Shared Cache

    The Shared Cache feature in the Medianova Cloud Panel for dynamic content allows you to define a Domain Cache Key, enabling multiple accounts or domains to share the same cached content. This feature helps optimize content delivery, reduces redundancy, and ensures that the same cached data is available across relevant accounts, making caching more efficient.

    Key Features

    • Domain Cache Key: The Domain Cache Key is used to define a shared cache structure, ensuring that multiple accounts or domains can access the same cached content. This eliminates the need to cache identical dynamic content separately for each account, thus improving caching efficiency and reducing the load on the origin server.

    Static Content Delivery

    Deliver images, scripts, and other static assets faster and more reliably across the globe with Medianova’s Static CDN service.

    Static Content Delivery accelerates websites and applications by distributing static assets—such as images, CSS, and JavaScript files—across Medianova’s globally distributed CDN network. By caching content at the edge, end-users receive data from the nearest server, reducing latency and improving overall page load performance.

    Static CDN is ideal for websites with large amounts of unchanging content that must be delivered consistently to users worldwide.

    Header Value Base Cache

    The Header Value-Based Cache feature in the Medianova Cloud Panel allows you to control caching behavior based on specific header values. By defining the type (deny or allow), along with the header and its corresponding value, you can precisely determine whether content should be cached.

    Key Features

    • Control Caching with Header Values: This feature enables caching rules to be influenced by specific header values, allowing for flexible and dynamic cache management.

    Header Base Cache

    The Header-Base Cache feature in the Medianova Cloud Panel enables caching decisions based on specific HTTP headers. By defining multiple header key-value pairs, you can control how content is cached depending on the request headers, allowing for advanced caching strategies tailored to your application's needs.

    Key Features

    • Cache Based on HTTP Headers: When enabled, this feature allows caching behavior to be determined by specific HTTP header key-value pairs, ensuring dynamic and personalized content delivery.

    Custom Header

    Learn how to configure Custom Header rules for a CDN Resource.

    The Custom Header feature allows you to add, modify, or remove HTTP headers for both origin requests and CDN responses. This configuration enables fine-grained control over how headers are passed, overwritten, or stripped at different stages of the delivery flow.

    When Custom Header is enabled, you can define multiple header actions, each with a specific key–value pair and rule type. All rules are executed by CDN edge servers for the selected CDN Resource.

    You can configure Custom Header in the or via

    Configure Custom Header

    1
    chmod +x extract-cert.sh
    ./extract-cert.sh yourPFXpassword
    ✅ Certificate and Key match.
    ❌ Mismatch between certificate and key.
    #!/bin/bash
    # Usage: ./extract-cert.sh <pfx-password>
    
    # 1. Extract encrypted private key
    openssl pkcs12 -in domain.pfx -nocerts -out encrypted-domain.key -passin pass:$1 -passout pass:$1
    
    # 2. Decrypt the private key
    openssl rsa -in encrypted-domain.key -out domain.key -passin pass:$1
    
    # 3. Extract public certificate
    openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.crt -passin pass:$1
    
    # 4. Verify that the certificate and key match
    first=$(openssl x509 -in domain.crt -modulus -noout | openssl md5)
    second=$(openssl rsa -in domain.key -modulus -noout | openssl md5)
    
    if [[ "$first" == "$second" ]]; then
        echo "✅ Certificate and Key match."
    else
        echo "❌ Mismatch between certificate and key."
    fi
  • Allowing flexible control through customized thresholds and actions.

  • Burst
    – Allows short spikes within the limit window.
  • Burst + No Delay – Permits short bursts without delay enforcement.

  • None – Strict limit; requests beyond the threshold are immediately blocked.

  • IP Whitelisting – Exclude trusted IPs, monitoring tools, or partners from rate enforcement.

  • Flexible Actions – Choose to Block or Challenge clients that exceed limits.

  • Configurable HTTP Response Codes – Return 429 or 529 errors when limits are exceeded.

  • Path & Extension Support – Apply rate limits to specific endpoints (e.g., /login, /api/) or file types (e.g., .pdf, .mp4).

  • Bot Mitigation – Reduce load from automated crawlers or scrapers.

  • Ignore Specific Query Strings: This option allows you to specify query strings that should not be cached separately. If a URL contains certain query strings (e.g., tracking parameters), these query strings will be ignored in the caching process. As a result, requests with these query strings will be treated as if they do not exist, reducing the number of cached versions and optimizing storage.

    How It Works:

    • After enabling this option, a field will appear where you can enter the specific query strings you wish to ignore.

    • You can add multiple query strings by clicking the + button.

    • Once set, requests with these query strings will not create separate cached versions.

  • Cache Specific Query Strings Only: When enabled, you can specify a list of query strings that should be cached separately. Only requests with these query strings will create distinct cached versions, while other requests with different query strings will be treated as the same resource.

    How It Works:

  • After enabling this option, a field will appear where you can enter the query strings you want to cache separately.

  • You can add multiple query strings by clicking the + button.

  • Once set, only requests with these query strings will be cached separately, while other requests without these parameters will be treated as the same cached resource.

  • Important Note

    Mutual Exclusivity: Both the Ignore Specific Query Strings and Cache Specific Query Strings Only options cannot be enabled simultaneously. Only one of these options can be active at any given time, ensuring clear and distinct caching behavior.

    By using Query String Caching for dynamic content, you can optimize caching for content that varies based on user-specific parameters or session data, improving performance while maintaining accurate and fresh dynamic content delivery.

    How to Configure Query String Caching

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Query String Caching section in the Medianova Cloud Panel.

    1. Choose Caching option.

      1. Ignore Specific Query Strings: Enable this option if you want to ignore specific query strings and not cache them separately. Enter the query strings you want to ignore in the provided field. Click the + button to add multiple query strings.

      2. Cache Specific Query Strings Only: Enable this option if you want to cache only specific query strings separately. Enter the query strings you want to cache separately in the provided field. Click the + button to add multiple query strings.

    2. After configuring the query string caching settings, click Submit to apply the changes.

    By configuring the Query String Caching settings, you gain granular control over how query string variations of your resources are cached, optimizing caching strategies based on your specific needs.

    Public certificate.

    domain.key

    Unencrypted private key.

    encrypted-domain.key

    Encrypted private key (temporary, can be deleted).

    Availability

    Yes

    Yes

    Yes

    Yes

    Number of rules

    5

    30

    50

    125

    Actionable analytics – Gain visibility into threats, attack sources, and triggered rules through the Control Panel.

    Integrated Analytics – Visual dashboards for traffic and threat insights.

  • False Positive Control – Fine-tune rules to balance protection and accessibility.

  • Medianova Control Panel
    Medianova CDN IP ranges (JSON)
    Medianova CDN IP ranges (Text)
    Medianova CDN IP ranges (CSV)
    Add an Error Status Code Definition

    Define a cache duration for specific HTTP error codes.

    1

    Click Add to Create a New Definition

    2

    Enter the Cache Time

    Enter the duration (in seconds) for how long the selected error code should remain cached.

    3

    Enter the Status Code

    Specify one or more HTTP status codes such as 404, 500, or 502.

    4

    Submit the Configuration

    Click Submit to save the definition.

    Edit an Error Status Code Definition

    Modify the cache time or status code.

    1

    Click the Edit Icon Next to the Definition

    2

    Update the Cache Time or Status Code

    3

    Submit the Changes

    Click Submit to apply updates.

    Delete an Error Status Code Definition

    Remove a cache rule so that future error responses bypass CDN cache.

    Behaviour

    • Cached error responses remain valid until the configured cache time expires.

    • Deleting a definition does not immediately remove already cached error objects; existing cached content remains until expiration.

    • Setting a low cache duration minimizes the risk of serving error responses for extended periods.

    • If no definition exists for a status code, the CDN forwards all such responses to the origin without caching.

    FAQ

    Does removing a definition purge already cached error responses? No. Existing cached content remains until it expires.

    Can I cache multiple error codes with different durations? Yes. Each status code can have its own cache time.

    What happens if I set the cache time to zero? A value of zero disables caching for that error status code.

    Medianova Control Panel
    API

    Off – Ignore all query strings; all variations map to a single cached object.

  • Request URI – Cache based on the full request URI, including query parameters exactly as received.

  • 2

    Submit the Configuration

    Click Submit to apply the selected caching mode.

    Enter Query Strings to Ignore

    Add one or more parameters that should not affect the cache key.

    3

    Submit the Configuration

    Click Submit to save the changes.

    Enter Query Strings to Cache

    Add parameters that should be included in the cache key.

    3

    Submit the Configuration

    Click Submit to apply the rule.

    Cache Specific Query Strings Only: Only the selected parameters contribute to the cache key; all others are ignored.

    Enter the SNI Domain

    Provide the Origin SNI Request Domain:

    • Enter the domain name that should be included as the SNI value during SSL/TLS handshake.

    • Ensure this domain corresponds to a valid SSL certificate installed on your origin server.

    3

    Save the Configuration

    Click Submit to apply your settings. Origin SNI Request is now enabled for the CDN Resource.

    Medianova Control Panel
    API
    X-CDN Header configuration area inside the Headers tab
    : You can add multiple error status codes and their respective cache durations by clicking the
    Add
    button repeatedly.
  • Once all necessary error codes and cache times are defined, click Submit to apply the changes.

  • Toggle the feature to "On."

  • Define cookie values:

    • Enter the cookie key in the respective field.

    • Use the + button to add more cookies.

  • Click Submit to apply the changes.

  • Enable Etag Verification: Toggle the Etag Verification setting to On to enable it. This will allow the system to validate the cached content based on the Etag header.

  • Once enabled, click Submit to apply the changes.

  • HTTP_504: Gateway Timeout.

  • HTTP_403: Forbidden.

  • HTTP_404: Not Found.

  • HTTP_429: Too Many Requests.

  • Activate the Stale Cache option to configure the settings.

  • Select Error Triggers:

    • Choose the HTTP error codes (e.g., 500, 502, 503, etc.) or Updating status that will trigger the use of stale cached content.

    • Multiple triggers can be selected simultaneously.

  • Click Submit to apply your configurations.

  • Prefetch via Control Panel
    1

    Enter File Path

    In the Path field, enter one file path per line. Each line must point to a specific file you want to prefetch.

    Examples:

    Wildcard paths (e.g. /images/*) are not supported.

    2

    Execute the Prefetch

    Click Prefetch Files to initiate the operation. Medianova will send an HTTP GET request to your origin for each file and cache the response.

    Once complete, those files will be ready for instant delivery from the CDN cache.

    Medianova’s Prefetch mechanism performs controlled fetch operations that proactively warm up cache layers. This eliminates the delay caused by a first-time cache miss and reduces origin load during peak demand.

    Monitor Prefetch Requests

    All Prefetch operations are listed in the Prefetch Log table below. Use this view to track the status and results of your Prefetch actions.

    Column

    Description

    Status

    Indicates whether the Prefetch operation is Running, Successful, or Failed.

    Task ID

    A unique identifier assigned to each Prefetch request.

    File Path

    Type of Prefetch

    Created At

    Time when the Prefetch was initiated.

    Duration

    Total time the operation took to complete.

    Result

    Summary of the Prefetch

    Click the refresh icon to reload the Prefetch Log and check the latest results.

    Medianova Control Panel
    Prefetch API

    Enter File Path

    In the Path field, type the exact file or directory path you want to purge. You can specify multiple paths by entering one per line.

    Example:

    2

    Use Wildcards

    You can use the * symbol to purge multiple files within a directory.

    Examples:

    • /images/* — removes all files and subdirectories inside /images/

    • /images/im* — removes files starting with “im”

    3

    Execute the Purge

    Click Purge Files to start the invalidation. Medianova CDN will distribute the purge request to all cache layers and mark the specified objects as expired. The next request will automatically fetch the latest version from your origin.

    Medianova’s purge mechanism rapidly invalidates content across every cache layer (from edge nodes to core caches), usually finishing propagation within seconds under normal conditions. This near-immediate purge completion means users around the world see the updated content almost instantly after you purge.

    Monitor Purge Requests

    All recent purge operations are listed in the Purge Log table below. Use this view to track the status of your requests.

    Column
    Description

    Status

    Shows whether the purge is Running, Successful, or Failed.

    Task ID

    A unique identifier for each purge operation.

    File Type

    Type of purge

    Created At

    Time the purge was initiated.

    URLs

    Number of URLs affected.

    Running / Successful / Failed

    Summary of the operation result.

    Click the refresh icon to reload the log and check the latest results.

    Medianova Control Panel
    API
    Medianova Control Panel
    X-XSS Protection toggle inside the Headers tab
    1

    Enable the Setting

    Switch Mobile Device Cache to On to create separate cached versions for mobile, tablet, and desktop.

    2

    Submit the Configuration

    Click Submit to apply the updated caching behavior.

    Behaviour

    Mobile Device Cache changes how cache keys are generated and what information is forwarded to the origin.

    Device Classification

    The CDN classifies each request using the User-Agent header:

    • mobile

    • tablet

    • desktop

    Cache Key Variation

    A unique cache entry is created per device type, for example:

    Forwarded Headers

    Header
    Description
    Example

    X-DEVICE

    Device category detected by the CDN

    mobile / tablet / desktop

    X-MOBILE

    Whether the device is mobile

    true / false

    These headers allow your origin to serve tailored content if needed.

    • Device detection is based on User-Agent parsing and may not be accurate for all custom or rare device signatures.

    • The feature does not provide per-resolution caching (e.g., based on screen width).

    • Use this feature only if your mobile/tablet/desktop content differs meaningfully.

    FAQ

    Does Mobile Device Cache change how requests are routed to the origin?

    No. This feature affects only cache segmentation and forwards device headers. Origin routing remains unchanged.

    What happens if the CDN cannot identify the device type from the User-Agent?

    The request is classified as desktop by default, and the cache key is generated accordingly.

    Will enabling this feature create separate cached versions for each device type?

    Yes. Mobile, tablet, and desktop clients each receive their own cached version, preventing cross-device content mismatches.

    Medianova Control Panel
    Medianova Control Panel
    • Values of the Accept-Encoding header in the request coming into Medianova

    • Your Medianova configuration (learn how to configure Gzip and Brotli)

    Content types

    You can customize which content types Medianova serves compressed for Gzip and Brotli, except for content of type text/html : this is always compressed.By default, Medianova compresses the following content types:

    Status Codes

    For responses coming from customer origin server or CDN cache, Medianova performs compression for any status code.Some MN features like Geoblocking may cause MN CDN to serve lightweight, edge-generated error responses and these are always served uncompressed.

    Minimum response size for compression

    If compression is enabled for the requested content type, Medianova applies compression to responses with a minimum size of 400 bytes.

    Content-Length and No-Transform

    Medianova sends compressed responses without the Content-Length header to prevent browsers receiving possibly incorrect length information as a result of dynamic transformation.

    Sending Cache-Control: no-transform on the response from origin has no effect on compression.

    Compression at Origin

    Medianova always requests uncompressed content from the customer origin server. The CDN sends no Accept-Encoding header to the origin and expects to receive the response uncompressed and without a Content-Encoding header.

    FAQ

    Which compression level does Medianova use for Gzip and Brotli?

    MN uses compression level 6 for Gzip and 5 for Brotli. These compression levels provide an optimal balance between compression efficiency and server CPU consumption.

    After I disable compression, does Medianova continue to serve compressed from cache?

    Yes. When a request is first made, Medianova servers cache the content Gzip compressed. If Gzip is later disabled, the already cached Gzip version will still be served unless a purge is performed or the cached object expires.

    When will Medianova support Zstandard (ZSTD) compression?

    Currently, Medianova has no plans for supporting Zstandard-encoded content.

    Request/response compression at Medianova
    By default, Medianova CDN forwards the CORS header in HTML responses from your origin to browsers.

    You can configure CORS Header in the Medianova Control Panel or via the API.

    Enable CORS Header

    1

    Access CORS Header

    Go to CDN → CDN Resources and select a CDN Resource. Open the Headers tab.

    2

    Enable CORS Header

    By default, CORS Header is disabled. Toggle Status to enable the feature.

    Confirm that configuration fields are now active

    Configure CORS Header

    After enabling the feature, Medianova CDN edge servers add the access-control-allow-origin header to HTML responses based on your configuration.

    Allow all origins (Wildcard)

    If no domains are defined in the allow list, CDN edges return the following header:

    The wildcard * allows any origin to load cross-origin resources from the CDN.

    Allow specific domains

    Add domains to restrict cross-origin access to only approved origins.

    For example, if https://www.shop.com loads web fonts from https://fonts.shop.com and you want to prevent external sites from using these fonts, add fonts.shop.com to the allow list.

    When a domain is added, CDN edges respond with:

    1

    Enter a domain into the Allowed Domains field. Examples: fonts.shop.com, https://fonts.shop.com

    2

    Select Add to include the domain in the allow list.

    Troubleshooting

    • CORS Header applies only to HTML responses.

    • If your origin also sets access-control-allow-origin, CDN behavior depends on your Header Override configuration.

    • Browser console messages provide the most accurate diagnostics for CORS failures.

    • If you use credentials or custom headers in your requests, additional CORS headers may be required at the origin level.

    /videos/product_launch.mp4  
    /assets/images/banner.jpg  
    /css/style.css
    /myimages/subfolder/image.png
    /assets/css/*
    X-XSS-Protection: 1; mode=block
    /index.html | mobile
    /index.html | desktop
    text/html
    text/plain
    text/css
    text/x-component
    text/javascript
    application/javascript
    application/x-javascript
    application/json
    text/xml
    application/xml
    application/rss+xml
    application/atom+xml
    application/rdf+xml
    application/xhtml+xml
    application/vnd.ms-fontobject
    application/x-font
    application/x-font-opentype,
    application/x-font-otf
    application/x-font-truetype
    application/x-font-ttf
    font/opentype
    font/otf
    font/ttf
    font/woff
    font/woff2
    image/svg+xml
    image/x-icon
    application/x-www-form-urlencoded
    application/dash+xml
    application/x-mpegURL
    application/octet-stream
    access-control-allow-origin: *
    access-control-allow-origin: https://fonts.shop.com
    The Edge Cache Expiration section allows configuration of the Cache Type and duration settings.
    Browser Cache Rule

    Right-click on your “host” file and choose open with. Edit it with one of the applications such as Notepad or Notepad++.

    yourdomain.com
    Select a CDN Resource.

    This feature is available for Small, Large, and Dynamic CDN Resources.

    3

    Go to Advanced Configuration → Origin Settings.

    The tab displays all origin-related configuration options.

    4

    Enable Gzip from Origin and click Submit.

    Enable Gzip from Origin

    This action saves your configuration and activates gzip fetching for text-based files.

    Origin still returns uncompressed files

    The origin server does not return gzip-compressed responses

    Verify that gzip compression is enabled and properly configured on your origin server (for example, gzip on; in Nginx or mod_deflate in Apache).

    Images not affected

    The feature applies only to text-based files

    Use Medianova Image Optimization for image compression and format conversion.

    Image Optimization and WebP
    Medianova Control Panel
    Access the SSL Management Page

    To start managing SSL certificates, open the Medianova Control Panel and navigate to the SSL Management section.

    • Go to CDN → SSL Management in the left-hand menu.

    • Review the list of existing certificates in your organization.

    • Click Add New SSL to begin adding a certificate.

    2

    Add a New SSL Certificate

    When adding a certificate, you will be asked to choose the SSL type and format.

    Choose SSL Type

    Option
    Description

    Click Next after selecting the desired option.

    Choose Free SSL for quick setups. Use Own SSL for organization-validated certificates or wildcard support.

    Own SSL Setup

    If you selected Own SSL, choose a certificate format and provide the required information.

    Choose Certificate Format

    Format
    Description

    Ensure that your certificate and private key match. Uploading mismatched pairs will result in an error.

    Field Descriptions

    Field
    Description

    Free SSL Setup

    If you selected Free SSL, fill in the following details:

    Field
    Description

    Click Add Free SSL to issue and install your certificate automatically.

    Free SSL certificates are valid for 90 days and are automatically renewed by Medianova.

    Free SSLs are ideal for fast deployment or non-critical environments.

    3

    Assign SSL to a CDN Resource

    After uploading or creating your certificate, assign it to a specific CDN Resource.

    • Go to CDN → CDN Resources.

    • Open the SSL tab (or CNAME & SSL for Small and Large resources).

    • Select one of the following options:

      • SNI (Own SSL): Use your uploaded SSL certificate.

      • Shared SSL: Use Medianova’s shared certificate.

    Resource tab names differ by product type.

    Small/Large Resources: CNAME & SSL

    Streaming/VOD/Dynamic: SSL

    4

    Manage and Validate SSL Certificates

    From the SSL Management page, you can:

    • Edit SSL Name – Rename an existing certificate.

    • Replace SSL – Upload a new certificate to replace an expired one.

    • Delete – Remove unused or expired certificates.

    Always upload the complete certificate chain (Leaf + Intermediate + Root) to avoid browser trust warnings.

    Component
    Description

    Uploading only the leaf certificate may cause incomplete validation. Always include the full chain.

    Redirect Handle From Origin

    Follow the steps below to enable and configure redirect handling for your CDN Resource.

    1

    Enable Redirect Handling

    Toggle Status to On.

    Additional configuration options become active.

    2

    Select Redirect Codes to Handle

    Open Handle Origin Redirection Error and choose one or more redirect status codes that the CDN should process.

    These codes determine which 3xx responses from your origin will trigger redirect handling logic. When a selected code is returned by the origin, the CDN applies your configured header settings and processes the redirect instead of simply passing it through unchanged.

    Supported redirect codes:

    • 301

    3

    Configure Request Headers (Optional)

    Enter a Request Header Key and Request Header Value if you want to include or modify request headers when a redirect occurs.

    Examples:

    4

    Add Custom Headers (Optional)

    Use Add Header Key and Add Header Value to specify additional headers that should be appended during redirect handling.

    Examples:

    5

    Save the Configuration

    Select Add to register your header definitions. Then click Submit to apply the Redirect Handle From Origin settings. Redirect handling is now active for your CDN Resource.

    Redirect Handling Logic

    When the origin returns a selected 3xx status code:

    1. CDN intercepts the response.

    2. CDN adds or modifies headers based on your configuration.

    3. The redirect is returned to the client with the updated headers.

    Header Processing

    • Request Header Key / Value modifies the header sent from CDN → Origin.

    • Add Header Key / Value appends additional headers in redirection processing.

    Status Toggle

    • When On, CDN evaluates redirect codes and applies your header settings.

    • When Off, CDN forwards redirect responses without modification.

    Troubleshooting

    Issue: Redirect handling does not apply. Cause: Status toggle is disabled or no redirect codes are selected. Fix: Enable Status and choose at least one code under Handle Origin Redirection Error.

    Issue: Headers are not appearing in redirected responses. Cause: Header Key or Value fields are empty. Fix: Ensure both fields are filled before selecting Add.

    Issue: Redirect behavior is inconsistent. Cause: Origin and CDN redirect configurations conflict. Fix: Review origin redirect rules and ensure the CDN's configured headers do not override necessary behavior.

    Medianova Control Panel
    API
    Medianova Control Panel
    Access the WAF

    To begin configuration, log in to the Medianova Control Panel and navigate to the WAF settings.

    • Go to Security → WAF in the left-hand menu.

    • Select the Dynamic CDN Resource where you want to activate WAF.

    • The WAF configuration page will open.

    If you haven’t created a Dynamic CDN Resource yet, go to CDN → Create CDN Resource first, then return to this section.

    2

    Choose WAF Mode

    Select how the firewall will operate for your CDN Resource.

    • Monitoring Only: Logs all requests but does not block them. Recommended for initial setup and rule tuning.

    • On: Fully active mode that filters and blocks malicious traffic in real time.

    After selecting a mode, click Save to apply the change.

    Start with Monitoring Only mode to observe your application’s normal request patterns before enabling full protection.

    3

    Create Your First Rule

    After activation, you can define custom rules to control how WAF handles requests. For example, you can block requests from specific IP ranges or allow trusted user agents.

    To create or manage rules, go to Managing Rules & Actions.

    Rule configuration is optional at activation. WAF includes predefined Managed Rules that are enabled by default.

    4

    Verify WAF Activation

    Once WAF is enabled, the Status indicator on your resource page will show “Active.” Incoming requests are now analyzed by the firewall and logged in real time.

    You can monitor activity in the Analytics → WAF Dashboard section.

    WAF logs and metrics may take up to a few minutes to appear after initial activation.

    Best Practices

    • Always start with Monitoring Only mode for new configurations.

    • Combine Managed Rules and Custom Rules for optimal coverage.

    • Review your WAF Analytics regularly to track threats and rule behavior.

    • Avoid creating overly broad rules to minimize false positives.

    1

    Select stale cache triggers

    Choose one or more conditions from the trigger list. Stale content will be served when any selected condition occurs.

    Supported triggers in the Medianova Control Panel:

    • error — Generic error indicator returned by the origin system.

    • timeout — The CDN did not receive a timely response from the origin.

    • invalid_header — The origin returned malformed or unexpected HTTP headers.

    • http_500 — Internal Server Error.

    • http_502 — Bad Gateway.

    • http_503 — Service Unavailable.

    • http_504 — Gateway Timeout.

    • http_403 — Forbidden.

    • http_404 — Not Found.

    • http_429 — Too Many Requests (rate limit).

    • updating — The origin is in an update/maintenance state.

    2

    Save the configuration

    Select Submit to apply all changes.

    • Stale content is served only if a cached version already exists at the edge.

    • Any selected trigger can activate stale delivery.

    • When the origin becomes healthy again, normal cache rules resume automatically.

    • Stale Cache does not refresh or regenerate content; it only delivers the most recent cached copy.

    • This feature is intended for temporary failures, not extended outages.

    FAQ

    What happens if no triggers are selected? Stale content is never served.

    Will Stale Cache fetch new content? No. It serves only what is already cached.

    Does enabling all triggers hide origin problems? It may delay visibility of backend issues. Select triggers based on operational strategy.

    Does TTL affect stale delivery? TTL defines freshness; stale delivery allows fallback after TTL when origin issues occur.

    Medianova Control Panel
    API
    How X-Content-Type-Options Works

    You can configure X-CDN Header in the Medianova Control Panel or via API

    When enabled:

    • The CDN adds the following header to viewer-facing responses:

    • Browsers that support this header will not attempt to infer content types and will instead enforce the value provided by the origin.

    • MIME sniffing is disabled for resources such as scripts, stylesheets, and other content types that could be misinterpreted.

    X-Content-Type-Options toggle inside the Headers tab

    Use Cases

    Prevent MIME sniffing

    Ensure the browser does not guess content types, avoiding scenarios where a file may be interpreted as executable code.

    Improve XSS resilience

    Reduce attack surfaces where incorrect content-type interpretation could lead to script execution.

    Enforce strict content handling

    Guarantee consistent behavior across browsers by ensuring content is processed exactly as declared.

    Notes

    • The header is applied only to viewer responses, not to origin-bound requests.

    • Modern browsers widely support nosniff, but legacy browsers may behave inconsistently.

    • Enabling this header does not alter your CDN caching logic.

    • Correct MIME types must still be set by your origin; this header does not correct misconfigured content types.

    This feature does not control CDN → client compression. For client-side compression, see How to Configure Gzip and Brotli.

    Enable Gzip From Origin instructs the CDN to request text-based files from your origin using:

    When enabled:

    • The CDN requests gzip-compressed content from the origin. • If the origin supports gzip, the CDN stores the compressed version in cache. • If the origin does not support gzip, the CDN stores the uncompressed response.

    This improves performance and reduces bandwidth usage between the Origin → CDN path.

    How It Works

    CDN requests gzip-compressed content from the origin when this feature is enabled.

    The CDN sends Accept-Encoding: gzip to the origin. If the origin supports gzip, compressed content is returned and stored in the cache. If the origin does not support gzip, the CDN caches the uncompressed response.

    Applies only to text-based MIME types (.js, .css, .html, .txt, .xml, .json, …). Does not apply to images. Use Image Optimization instead.

    Enable Gzip from Origin

    You can enable this feature via the Medianova Control Panel

    1

    Open CDN Resources in the left-hand menu.

    This section lists all CDN Resources available in your account.

    2

    Select a CDN Resource.

    This feature is available for Small, Large, and Dynamic CDN Resources.

    3

    Go to Advanced Configuration → Origin Settings.

    The tab displays all origin-related configuration options.

    4

    Enable Gzip from Origin and click Submit.

    This action saves your configuration and activates gzip fetching for text files.

    Medianova CDN starts sending the Accept-Encoding: gzip header to your origin for eligible file types.

    FAQ

    Does this feature compress content for end-users? No. It only optimizes the origin → CDN transfer. Client-side compression is handled separately by Gzip Delivery and Brotli Delivery.

    What if my origin does not support gzip? The CDN will fetch and cache the uncompressed version of the file.

    Does this apply to all file types? No. The feature applies only to text-based MIME types. Images are not affected and require Image Optimization.

    When the feature is active:
    • The CDN adds an X-Frame-Options header to viewer responses.

    • If no domain is configured, the CDN sets:

      which allows framing only from the same domain.

    • If one or more domains are provided, the CDN applies:

      for each allowed domain, enabling selective embedding.

    • The browser enforces the framing policy and blocks disallowed attempts.

    X-Frame Options configuration area inside the Headers tab

    Use Cases

    Prevent clickjacking

    Block external sites from embedding your pages to protect users from UI redress attacks.

    Allow trusted partners

    Permit framing only from specific domains that require embedded content (e.g., partner dashboards, internal tools).

    Enforce controlled embedding behavior

    Define clear, browser-enforced restrictions on how your content is presented in external applications.

    Notes

    • ALLOW-FROM is not supported by all browsers. Modern security policies often prefer CSP frame-ancestors.

    • X-Frame-Options does not affect API endpoints or non-HTML content.

    • If multiple allowed domains are configured, behavior may vary by browser due to varying support levels.

    • This header has no effect on origin requests; it is applied only to viewer-facing responses.

    Medianova Control Panel
    API
    When HSTS Protection is enabled:
    • The CDN adds a Strict-Transport-Security header to HTTPS responses.

    • Browsers cache the policy for the duration specified in the max-age parameter.

    • HTTP requests are redirected to HTTPS before the HSTS header is evaluated.

    • Optional parameters allow extending enforcement to subdomains and requesting preload inclusion.

    • The policy remains active in the browser until the max-age period expires.

    HSTS Protection configuration options in the Headers tab

    HSTS Response Header Format

    Depending on your configuration, the header may include:

    Configuration Options

    Max Age (Seconds)

    Defines how long the browser must enforce HTTPS for your domain. Common values:

    • 31536000 (1 year)

    • 63072000 (2 years)

    Include Subdomains

    When enabled, HSTS applies to all subdomains, not only the primary domain.

    Preload

    Requests inclusion in browser preload lists. (Preload requires max-age ≥ 31536000 and includeSubDomains to be enabled.)

    Use Cases

    • Enforce HTTPS-only access for compliance or security policies.

    • Reduce risk of downgrade/MiTM attacks.

    • Strengthen browser-side enforcement for high-value applications.

    • Ensure all subdomains—including those without valid HTTP → HTTPS redirects—are protected.

    Notes

    • HSTS applies only to HTTPS responses; the header is not sent over HTTP.

    • Incorrect configuration may block HTTP fallback paths if subdomains or legacy systems depend on them.

    • Preload inclusion requires submitting your domain to the global HSTS preload list.

    • Changing the HSTS max-age does not immediately remove the policy from browsers; they follow previously cached durations.

    Medianova Control Panel
    API
    Access the IP Restriction
    1. Log in to the Medianova Control Panel.

    2. Go to CDN → CDN Resources.

    3. Select the resource where you want to apply IP restrictions.

    4. Click the Security tab.

    5. Open the IP Restriction (ACL) section.

    IP Restriction is available only for active CDN Resources.

    2

    Choose Restriction Mode

    Select one of the following modes based on your access policy:

    Mode
    Description

    Whitelist

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    3

    Add IP Addresses or Ranges

    1. Click Add IP.

    2. Enter an IP address or subnet range in CIDR format (e.g., 192.168.0.0/24).

    3. Press Enter or click the + icon to add it to the list.

    4. Repeat for additional IPs or ranges.

    5. Click Save to apply changes.

    Use CIDR notation to efficiently manage large network ranges.

    4

    Edit or Remove Existing Entries

    • Edit: Click the Edit icon to update an IP or range.

    • Delete: Click the Delete icon to remove it.

    • Save Changes: Click Save after every modification to ensure updates are applied at the edge.

    Removing an entry from a Whitelist immediately blocks that IP from accessing your resource.

    5

    Verify Configuration

    Once saved, you can verify your configuration:

    • Attempt access from an allowed IP → content should load successfully.

    • Attempt access from a restricted IP → access should be denied or redirected.

    • Review logs or analytics to confirm correct enforcement.

    Test from different networks (VPN, mobile, or office IPs) to ensure your list is accurate.

    Medianova Control Panel.

    Dynamic Origin URI: Specify dynamic or user-specific URIs that trigger the rewrite rules, ensuring accurate routing for content generated in real time.

  • Target URI: Set the destination URIs to which requests will be rewritten. Supports placeholders and query string management for personalized and API-driven content.

  • Priority-Based Execution: Assign priorities to rewrite rules to ensure correct execution order, especially when multiple rules overlap.

  • Key Benefits

    • Optimized Content Routing: Ensures real-time requests are directed to the correct origin endpoints, even when public-facing URLs differ from backend paths.

    • Improved Backend Integration: Allows seamless integration with origin servers that use dynamic or customized URL structures.

    • Enhanced Flexibility: Supports complex URL rewrites using regular expressions and query string management for APIs, dynamic resources, or personalized content.

    • Reduced Latency: Enables direct mapping of public URLs to backend resources, reducing processing time and improving overall response speed.

    • Scalable Personalization: Dynamically adapts routing for user-specific requests, ensuring accurate delivery of tailored content without exposing backend complexities.

    How to Configure Rewrite Origin URLs

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Origin Settings tab.

    4. Navigate to the Rewrite Origin URLs section in the Medianova Cloud Panel.

    1. Click the Add button to open the configuration popup.

    2. Fill in the required fields:

      • Match Mode: Choose from the following options:

        • All files: Apply the rule to all files.

        • Path: Match a specific path.

        • Full Path: Match the exact full path of the URL.

        • Wildcard: Use wildcards for broader matching patterns.

      • Origin URI: Enter the URI that should be rewritten.

      • Target URI: Provide the URI where requests should be redirected.

      • Priority: Assign a priority to this rule to determine its execution order when multiple rules are defined.

    3. Click the Add button.

    4. Click the Submit button.

    If you would like to use the cache time defined on the origin with the cache-control header, you can select “Origin”. If you would like to set custom cache time, you can select “Edge”.
  • When you select Edge, you should set the cache time, which indicates the maximum age of your cached content. Then you should also specify if you would like to cache dynamic content such as your HTML files and click the Save Changes button.

    1. Next, you need to check your Query String Caching settings. You can leave the Query String setting disabled, if you would like to cache your files by ignoring query strings; or you can enable it to treat each query string as a cacheable item.

    1. If “Cache Dynamic Pages” option under Cache Settings has been enabled at Step 4.1, that means all HTML files served by your origin and all resources (CSS, images, JavaScript) found in HTML files, will be cached and served through Medianova CDN.

    However, it is recommended to exclude some of the HTML files which contain private information (such as account details, credit card information on check out page etc.). Below are two options to disallow caching, either by defining paths or by using cookies.

    a. Page Rule Cache Type: Go to the Page Rules menu and select dynamic cache type for the desired paths and/or extensions.

    b. Disallow Caching by Using Cookies: Go to the Caching menu and enter Cookie Key & Cookie Value to bypass caching under “Disallow Cookie Base Cache” setting.

    1. Go to the SSL menu and upload your SSL certificate.

    1. You can test your Aksela account before redirecting your Website URL to your CDN URL, and serving traffic through our platform.

    2. To start testing, first you need to find the IP address of the CDN URL. In order to do that, you can ping your CDN URL on Command prompt.

    Example: ping cdnresource_name.mncdn.com

    b. Then, you need to add this IP address to your hosts file.

    - Open the Run tab by pressing Windows key + R.

    - Type system32 in the search bar and click ok.

    - On the screen, go to the “drivers” folder and then to the “etc” folder.

    - Under the “etc” folder, you can right-click on your “hosts” file and select open and edit with application such as Notepad or Notepad++.

    - Please add the IP address you obtained in the first step and the website you want to reach using this IP address to the file and save it.

    c. Clear your browser cache. Make a request to the page by typing yourdomain.com in the address bar. On the page that opens, right-click on an empty area and select “inspect”. Go to the “Network” tab and find your Website URL within the list of requests. Click on it and and display the information in the “Headers -> Response Headers” area. Seeing “MNCDN” next to the “Server” field shows that the .html file is served from Medianova.

    1. After completing the test successfully, login to your DNS hosting provider’s client panel and add a CNAME record for redirecting your Site URL to the CDN URL you have created.

      yourdomain.com IN CNAME cdnresource_name.mncdn.com

    2. Your traffic is now served through Medianova Aksela.

    www.example.com → example.mncdn.com
  • cdn.example.com → example.mncdn.com

  • Not Supported by Some DNS Providers (Root Domain CNAME):

    • example.com → ddd.mncdn.com

    For root domains, ANAME or ALIAS records (if supported by the DNS provider) can be an alternative solution to achieve similar functionality.

    Aksela is a micro-caching platform developed by Medianova. Micro caching ensures that your content can be cached even for seconds. It serves static & dynamic content and API requests on your website through edge servers closest to end users.

    By laying between the origin server and the end user, Aksela both increases performance and provides an additional layer of security. In addition to the security measures provided by Aksela, WAF (Web Application Firewall) can be provided as an additional security service.

    1. You can access the Medianova cloud panel by logging in with your username and password at cloud.medianova.com

    1. Click on “CDN → Create CDN Resource” option from the menu on the left side of the panel.

    1. In the next screen, Dynamic CDN Resource is selected from the “Start building your CDN”

    1. Fill in the requested information for Dynamic CDN Resource.

    Your Origin URL and Website URL cannot be identical. To differentiate your Origin URL from your Website URL, you can follow one of the two following methods:

    • Login to your DNS hosting provider’s client panel and add an A record that points your origin address (different than the Website URL) on your DNS server. This will be the origin URL for Aksela to retrieve your site’s content.

      • Example: Origin URL - yourdomain.com

    • Fill in the Origin URL field using the IP address information instead of a URL. In that case, the Website URL has to be filled in the Origin Set header. This can be configured in CDN Resources → Headers settings, after Aksela CDN Resource is created.

      • Example: Origin URL - https://IP.IP.IP.IP Origin Set Header - yourdomain.com

    5 . When all the information is filled in correctly, the Dynamic CDN Resource is created by clicking the “Create CDN Resource” button. It will take a few minutes to be active on all edge servers. (When the “ping example.mncdn.com” command is run, getting a response from an IP address means that the CDN Resource is active).

    www.example.com
  • Dynamic Header Management Define which request headers are passed or excluded during the redirect process, ensuring consistency for user-specific or API-driven workflows.

  • Real-Time Header Customization Add or modify headers dynamically during the redirection process to align with real-time conditions or backend logic.

  • Key Benefits

    • Optimized for Dynamic Content: Handles session-based or real-time redirects without introducing latency.

    • Seamless User Experience: Ensures that personalized content routing occurs smoothly.

    • Improved Efficiency: Reduces unnecessary origin server requests for redirects triggered by dynamic conditions.

    How to Enable Redirect Handle From Origin

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Origin Settings tab.

    4. Enable this setting.

    5. Fill in the required fields.

      • Handle Origin Redirection Error: Select which HTTP status codes (301, 302, 303, 307, 308) to handle for origin redirections. You can choose one or multiple options depending on the behavior you want to implement.

      • Request Header Key: Specify the name of the request header you want to manage during the redirection process.

      • Request Header Value: Provide the value for the corresponding request header key.

    6. Click the Add button.

    7. Click the Submit button.

  • Cache Sharing Across Accounts: By setting the cache to "Shared", you enable different accounts or domains to use the same cache structure. This ensures faster content delivery for dynamic content, as the CDN can serve cached data across multiple accounts without re-fetching from the origin server, improving performance and reducing server load.

  • Status Options:

    • Default (Default Setting): The cache is not shared across accounts. Each account has its own separate cache structure, and dynamic content is cached independently for each account.

    • Share: When set to "Share", the Domain Cache Key allows multiple accounts or domains to access the same cache structure. This enables shared caching of dynamic content, optimizing delivery speed and reducing unnecessary redundancy in caching.

  • By utilizing the Shared Cache feature for dynamic content, you can significantly improve cache efficiency, reduce redundant caching, and enhance the performance of content delivery across multiple accounts or domains. This feature is particularly useful for organizations managing multiple domains or accounts that require consistent access to the same dynamic resources.

    How to Configure Shared Cache

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Stale Cache section in the Medianova Cloud Panel.

    5. Set the Cache Status:

      • To enable shared cache, select the Share option.

      • To keep the cache separate, leave it set to the Default option.

    6. Save Your Settings: Once you've selected the desired cache status, click Submit to apply the changes.

    Why Use Static CDN?

    Medianova’s Static CDN provides an optimized way to serve static assets with speed, security, and scalability:

    • Reduced Latency – Serve content from the nearest CDN edge location.

    • Improved Page Load Times – Accelerate rendering of images, scripts, and styles.

    • Lower Origin Load – Cache content at the edge to minimize backend requests.

    • High Availability – Redundant nodes ensure reliability even under heavy traffic.

    • Global Reach – Consistent performance across all geographic regions.

    Combine Static CDN with Dynamic CDN or Image Optimization to maximize performance across your entire website.

    Medianova Static CDN – accelerating delivery of static assets through global edge caching

    Key Features

    • Edge Caching – Automatically stores and serves static content at geographically distributed edge nodes.

    • Custom Domain Support – Use your own domain (CNAME) for branded content delivery.

    • SSL/TLS Encryption – Secure asset delivery with HTTPS support.

    • Compression & Optimization – Automatically compresses and optimizes file sizes for faster transfer.

    • Scalability – Handles spikes in user traffic seamlessly without impacting origin performance.

    • Monitoring & Analytics – Real-time reporting to track delivery performance and usage trends.

    Built for Performance

    Medianova’s Static CDN combines global edge coverage, intelligent caching, and secure HTTPS delivery to optimize the delivery of static assets. Whether hosting media, websites, or web applications, this service ensures users experience faster load times and consistent performance anywhere in the world.

    Deny or Allow Caching: You can specify whether to deny or allow caching based on the presence of a particular header value.

    How to Configure Header Value Base Cache

    1. Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Scroll down to the Header Value-Based Cache section.

    5. Enable the Feature: Toggle the Header Value-Based Cache option to "On" in the panel.

    6. Define Header Caching Rules:

      • Type: Select whether to deny or allow caching based on the header value.

      • Header: Enter the HTTP header name.

      • Value: Enter the corresponding header value.

    7. Submit Changes: After filling in the fields, click the Submit button to save and apply your changes.

    Important Notes

    • Precise Cache Control: This feature ensures that caching behavior is determined by specific header values, providing granular control over cache management.

    • Single Rule Definition: You can define one header value-based caching rule at a time. Additional rules can be added later if needed.

    By configuring the Header Value-Based Cache settings, you can optimize caching for scenarios where header values dictate whether content should be cached, ensuring efficient content delivery and personalized user experiences.

    Support for Multiple Headers: You can define multiple header key-value pairs to fine-tune caching rules for diverse request scenarios.

    How to Configure Header Base Cache

    1. Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Scroll down to the Header-Base Cache section.

    5. Toggle the feature to "On."

    6. Define header key-value pairs:

      • Enter the header key and value in the respective fields.

      • Use the + button to add more header key-value pairs.

    7. Click Submit to apply the changes.

    Important Notes

    • Granular Control: This feature ensures that requests with specific HTTP headers influence caching decisions, enabling more precise cache management.

    • Multiple Header Key-Value Pairs: Define as many header key-value pairs as necessary to meet the caching requirements of your application.

    By configuring the Header-Base Cache settings, you can optimize caching strategies for requests that vary based on HTTP headers, improving both performance and user experience.

    Access Custom Header

    Go to CDN → CDN Resources and select a CDN Resource. Scroll to the Custom Header section.

    2

    Enable Custom Header

    Custom Header configuration interface in the Headers tab

    Toggle Status to enable the Custom Header feature. Verify that the rule configuration area becomes active.

    3

    Create Custom Header Rules

    Select a header action from the dropdown.

    Available Header Actions You can create header rules using the Add dropdown. Each option applies to a different stage of the request/response flow. Add Origin Request Header Adds a custom header to the request sent from CDN edge to the origin server. Add CDN Response Header Adds a custom header to responses delivered from CDN edge to the viewer. Remove CDN Response Header Removes a header from the response before it is sent to the viewer. Raw Header Creates a raw header rule with a custom directive, without binding it to request or response type logic. (Use only if you require fully custom header behavior.) Remove Origin Request Header Removes a header before the request is forwarded to the origin server.

    Enter the Key and Value for the header, if the selected action requires one.

    4

    Select Submit to save

    Best Practices

    • Header keys and values must follow valid HTTP header formatting rules.

    • If the same header is modified by multiple rules, CDN edge behavior follows the order of applied rules.

    • Removing headers may affect origin authentication, CORS behavior, or cache control logic.

    • Use Raw Header only when standard rule types do not fit your use case.

    Medianova Control Panel
    API

    Handle False Positives

    Learn how to identify, analyze, and minimize false positives in the Web Application Firewall (WAF) to ensure accurate protection without disrupting legitimate traffic.

    A false positive occurs when the WAF blocks or flags a legitimate request as malicious. This can happen due to aggressive rule patterns or incomplete exceptions. Proper handling of false positives helps maintain both security and availability of your applications.

    False positives are common during initial WAF configuration. Always start in Monitoring Only mode to observe behavior before activating full protection.

    1

    Identify False Positives

    Use WAF logs and analytics to locate requests that were incorrectly blocked or flagged.

    1. Open the Medianova Control Panel.

    2. Go to Analytics → WAF Dashboard.

    3. Review blocked requests and event logs.

    4. Look for requests that match normal user or API behavior but are classified as threats.

    Pay special attention to repetitive blocks from trusted IPs or common API endpoints — they are typical indicators of false positives.

    2

    Analyze Rule Behavior

    Determine which rule caused the false detection. You can identify the Rule ID or Rule Name responsible by inspecting the event details in the WAF dashboard.

    Common Cause
    Example
    3

    Adjust Rules or Add Exceptions

    After identifying the cause, fine-tune your rules to allow legitimate traffic while keeping protection active.

    You can:

    • Modify an existing rule

      • Adjust the Field, Operator, or Value

    4

    Validate After Adjustments

    Once changes are made, monitor the WAF dashboard again:

    1. Keep the affected rule in Log Only mode for several hours or days.

    2. Check if the same requests are still flagged.

    Rewrite Origin URLs

    Learn how to manage Rewrite Origin URLs to modify how request paths are sent to your origin.

    Rewrite Origin URLs enables you to transform incoming paths before they are forwarded to origin servers. You can configure Match Mode, Origin URI, Target URI, and Priority to adjust how paths are rewritten for directory changes, API restructuring, or backend routing needs.

    You can manage Rewrite Origin URLs using the Medianova Control Panel or API.

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings

    Manage Rewrite Origin URLs

    Follow the steps below to add and manage Rewrite Origin URLs for your CDN Resource.

    1

    Add a Rewrite Origin URL

    Select Add to create a new Rewrite Origin URL.

    The Add Rewrite Origin URL popup appears.

    2

    Match Mode Behavior

    • All files: Applies to every incoming request.

    • Path: Matches only the path portion of the request URI.

    • Full Path: Matches the exact full URL path.

    • Wildcard: Enables dynamic pattern matching using wildcard symbols.

    Troubleshooting

    Issue: Rewrite Origin URL does not apply. Cause: Incorrect Match Mode or Origin URI format. Fix: Verify that the incoming request path matches the defined parameters.

    Issue: A different Rewrite Origin URL is applied first. Cause: Priority ordering conflict. Fix: Assign a lower priority value to the entry you want processed first.

    Issue: Origin returns 404 after rewrite. Cause: Target URI does not exist on the origin. Fix: Confirm that the target path is valid and reachable at the origin server.

    Use Free SSL Certificates

    Learn how to enable and manage free SSL certificates in the Medianova Control Panel.

    Free SSL certificates provide an easy and cost-effective way to secure your CDN Resources without purchasing a commercial SSL. Medianova integrates Let’s Encrypt to automatically issue and renew these certificates through the SSL Management interface.

    Free SSL certificates are valid for 90 days and are automatically renewed before expiration.

    1

    Access the SSL Management

    To begin, log in to the and open the SSL Management section.

    • Navigate to CDN → SSL Management in the left-hand menu.

    • Review your existing SSL certificates.

    • Click Add New SSL in the upper-right corner.

    2

    Select the Free SSL Option

    When the dialog appears, choose Free SSL as the certificate type and click Next to continue.

    3

    Fill in Certificate Details

    Enter the required information in the form:

    Field
    Description
    4

    Complete Let’s Encrypt Verification

    Medianova automatically performs domain verification using Let’s Encrypt.

    • Wait for the verification process to complete.

    5

    Assign the SSL to a CDN Resource

    After installation, assign the certificate to the desired CDN Resource:

    1. Go to CDN → CDN Resources.

    WAF Analytics

    Learn how to interpret the Web Application Firewall (WAF) dashboard and key analytics metrics in the Medianova Control Panel.

    The WAF Analytics Dashboard provides visibility into malicious traffic, rule performance, and blocked requests detected by the Web Application Firewall (WAF). You can monitor attacks in real time, identify their sources, and adjust your rules to improve detection accuracy.

    Analytics data is available when WAF is active in either On or Monitoring Only mode.

    Accessing the Dashboard

    You can access the WAF analytics from the . Navigate to Analytics → WAF, then select the CDN Resource for which WAF is enabled. The dashboard displays real-time charts, tables, and logs that visualize threat activity, blocked requests, and triggered rules.

    Metrics update automatically at short intervals, though the refresh rate may vary depending on your resource’s traffic volume.

    Key Metrics and Visualizations

    1. Attack Histogram

    Shows the number of attacks over time, helping you detect spikes or recurring patterns. You can filter by URL to analyze specific endpoints under attack.

    Use it for: spotting attack trends and determining peak hours of malicious traffic.

    2. Threats

    Displays the total number of requests that triggered WAF rules versus total incoming requests. Includes summary values such as:

    • Total: All detected threats since activation

    • Today: Threats detected in the last 24 hours

    • This Month / Last Month: Periodic comparison

    Use it for: measuring overall WAF effectiveness and identifying sudden spikes that may signal an attack.

    3. Top Client IPs

    Lists the IP addresses triggering the most WAF rules. A pie chart provides a quick visual overview of threat sources.

    Use it for: detecting potential attackers or regions generating malicious traffic.

    Repeated offenders can be blocked or rate-limited via Custom Rules.

    4. Top Request URIs

    Shows the URLs most frequently targeted by suspicious or blocked requests.

    Use it for: identifying vulnerable endpoints or popular attack targets. If a specific path (e.g., /login, /api/v1/auth) appears repeatedly, consider applying additional rule protections.

    5. Top User Agents

    Lists browsers, bots, or automated clients generating flagged requests.

    Use it for: distinguishing legitimate traffic from malicious bots. Unusual or outdated User Agents may indicate automated attack tools.

    6. Rule Activity

    Displays which WAF rules are triggered most often, showing their frequency and relative impact.

    Column
    Description

    Use it for: assessing rule efficiency and identifying potential false positives. Frequently triggered rules may need refinement or condition adjustments.

    7. Activity Log (Last 300 Requests)

    Shows detailed information about the most recent flagged requests, including:

    • Timestamp

    • IP address

    • Request URI

    • User Agent

    Use it for: investigating incidents and validating rule accuracy. Regular review helps fine-tune your security posture.

    Best Practices

    • Review WAF analytics at least weekly to identify trends.

    • Watch for repeated attacks from the same IPs or regions.

    • Use the Threats and Rule Activity metrics to detect false positives or over-triggered rules.

    • Adjust or refine rules based on recurring attack patterns.

    Manage Rules & Actions

    The Web Application Firewall (WAF) allows you to define Custom Rules that specify how incoming traffic is evaluated. Each rule can match certain request attributes and apply an action — such as Block, Allow, or Log Only — when conditions are met.

    Managed Rules are automatically maintained by Medianova’s Security Team. Custom Rules are created manually to adapt the WAF to your specific application needs.

    1

    Access the Rule Management

    To manage rules, log in to the Medianova Control Panel:

    1. Go to Security → WAF.

    2. Select your Dynamic CDN Resource.

    3. Open the Rules & Actions tab.

    You’ll see a list of existing Custom Rules and the option to create new ones.

    Managed Rules are always active by default. You can combine both Managed and Custom Rules for layered protection.

    2

    Create a New Custom Rule

    Follow these steps to add a new rule:

    1. Click Add Rule.

    3

    Edit or Delete Existing Rules

    You can modify or remove existing rules at any time:

    • Edit: Click the Edit icon next to a rule, adjust the fields or actions, and click Save.

    Understand Rule Actions

    Each action defines how WAF handles a matched request:

    Action
    Behavior

    Note: “Log Only” is ideal for testing or monitoring potential issues before applying stricter blocking rules.

    Create Large CDN Resource

    Learn how to create a Large CDN Resource in the Medianova Control Panel for large file delivery or video-on-demand (VOD) content.

    A Large CDN Resource is designed for delivering large files such as video, music, archives (.zip), or executables (.exe). This resource type provides optimized caching behavior for large objects, improving performance and minimizing load on your origin servers.

    In the Create CDN Resource form, you can configure either:

    • Large Content Caching – for static large files such as videos, music, zip, or exe files.

    • VOD Content Caching – for media content that requires transcoding to streaming protocols (e.g., HLS, DASH).

    You can also reach this page from the Overview screen by clicking Get Started Now, which redirects to CDN Resources.

    Create a Large CDN Resource

    Note: Following file extensions are not allowed in a Large CDN Resource. The service will return a 403 error when calling these type of files.

    | gif | jpg | jpeg | png | bmp | swf | psd | tif | tiff | txt | html | jsp | js | css | ico | aspx | php | woff | ttf | eot | otf | htm | xml | pdf | psb | ashx | swz | cur | svg | jpr | webp |

    1

    Access the Create CDN Resource page.

    From the left menu, go to CDN → Create CDN Resource.

    2

    • Use Large Content Caching for large, static files and VOD Content Caching for media that needs adaptive packaging.

    • Config Status and Resource Status icons confirm that setup is complete.

    • If configuration fails, verify origin connectivity and port settings.

    After creation, your Large CDN Resource appears in the CDN Resources list with valid configuration indicators. You can verify connectivity by running:

    A successful response from an IP address confirms that the resource is active and accessible through Medianova’s edge network.

    Advanced Origin Settings

    Define advanced origin routing rules by matching requests to specific origins based on URI patterns, protocols, domains, ports, and priority.

    Advanced Origin Settings allow you to configure granular origin-routing behavior for specific URIs, file types, or directories. By defining rule-based conditions, you can route selected traffic to different origins, override ports, set custom host headers, or assign priorities for complex routing environments.

    You can manage Advanced Origin Settings in the Medianova Control Panel or via API.

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Origin Settings tab.

    Advanced Origin Settings use rule-based logic. Each rule defines what request pattern to match and how the CDN should route that traffic.

    Add an Origin Rule

    This workflow creates a new rule for routing selected requests to a specific origin configuration.

    1

    Open the Add Rule Dialog

    Select Add in the Advanced Origin Settings section to create a new routing rule.

    2

    Edit an Origin Rule

    1

    Select the Rule To Edit

    Choose an existing rule from the list in the Advanced Origin Settings section.

    2

    Delete an Origin Rule

    1

    Remove the Rule

    Select the delete icon next to the rule you want to remove.

    2

    Behaviour

    Advanced Origin Settings follow a priority-based evaluation model:

    • Highest priority wins. Lower numeric values represent higher priority.

    • If multiple rules match the incoming request, the CDN applies the rule with the highest priority.

    • If no rules match, the CDN uses the default origin configuration.

    Routing decisions consider:

    • URI match pattern

    • Origin protocol selection

    • Domain/IP

    • Ports

    This allows precise routing for APIs, media directories, file extensions, or multi-origin deployments.

    FAQ

    What happens if multiple rules match the same request?

    The rule with the highest priority (lowest priority number) is applied.

    Do regex or prefix rules impact performance?

    Regex rules are more expensive than prefix or extension matches. Use them only when necessary.

    What if no Advanced Origin rule matches the request?

    The request is sent to the default origin defined in the main Origin Settings section.

    Prefetch

    Proactively warm up CDN caches by fetching files from your origin before user access, ensuring fast delivery and avoiding cache misses.

    Prefetch refers to the process of proactively fetching and caching specific files from your origin before any user request occurs. It warms up CDN caches so that the first users receive content instantly, avoiding slow cache misses and offloading your origin server. When you initiate a Prefetch, the CDN pulls the file from your origin and caches it across all CDN POPs. This is especially effective for the delivery of large static or media files.

    Prefetch does not override existing cache entries. If the file is already cached, a prefetch request will not re-fetch it from origin.

    To force a refresh, perform a Purge first, followed by Prefetch.

    You can initiate Prefetch operations from the or via the .

    When to Use Prefetch

    Use Prefetch to:

    • Preload content before a scheduled event, campaign, or content release

    • Ensure large static files (e.g., videos, software downloads) load instantly

    • Avoid cache-miss latency for the first user(s)

    • Offload your origin by serving assets from CDN edge locations

    How Prefetch Works

    1. You submit one or more file paths via the or .

    2. Medianova CDN initiates an HTTP GET request to your origin for each file.

    3. If the file is not already cached, it is fetched and stored across CDN edge locations.

    4. The file is then available to be served instantly to users from cache.

    Prefetch attempts to populate the file across all CDN edge caches to reduce latency globally.

    Prefetch Propagation & Behavior

    When you initiate a Prefetch, the CDN issues an HTTP GET request to your origin and stores the file in cache across all CDN POPs (Points of Presence). This ensures that the file is readily available globally, without waiting for actual user traffic to trigger cache population.

    Unlike Purge, which invalidates cached content, Prefetch only populates caches if the file is not already cached. If the file already exists in cache, Prefetch will not re-fetch it from origin.

    Prefetch Type

    Medianova supports single-file Prefetch, which allows fetching and caching a specific file from your origin.

    Wildcard operations are not supported. Each Prefetch request must target a single file path.

    Best Practice Highlights

    • Prefetch only frequently accessed static files, such as videos, images, or large downloads.

    • Use Purge + Prefetch together to refresh caches after file updates.

    • Schedule Prefetch operations during off-peak hours to minimize origin load.

    • Avoid prefetching non-cacheable or dynamic resources.

    Monitor your Prefetch efficiency using .

    Browser Cache Rule

    Configure browser-side caching behavior for different resource types using Browser Cache Rules.

    Browser Cache Rule allows you to control how long different resource types remain cached in the visitor’s browser.

    This improves performance by reducing repeated network requests for static or frequently accessed files.

    You can manage Browser Cache Rules in the Medianova Control Panel or via API.

    Configure Browser Cache Rules

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    1

    Add a Browser Cache Rule

    A dialog opens for creating a new Browser Cache Rule.

    2

    Edit a Browser Cache Rule

    1

    Open the options menu for the rule and select Edit.

    2

    Modify Type, Priority, or Cache Mode as required.

    3

    Select Submit to save the changes.

    Delete a Browser Cache Rule

    1

    Open the options menu for the rule and select Delete.

    2

    Confirm the deletion to remove the rule.

    3

    Select Submit to apply the update.

    • Rules are evaluated in order of Priority, where smaller numbers indicate higher precedence.

    • Browser Cache Rules control browser-side caching only, not CDN edge caching.

    • The Apply the HTML/JSON files toggle affects all rules globally.

    • When Cache Mode = Origin, browser caching behavior follows origin headers;

    Best Practices

    • Use file extension rules to cache static assets like .js, .css, and .png for long durations.

    • Use no cache mode for frequently updated resources (e.g., .html, .json APIs).

    Configuration Basics

    Medianova CDN Configuration Basics document is designed to help you understand and implement the fundamental configurations necessary to leverage the full potential of Medianova's Content Delivery Network (CDN). Whether you are a web developer, content creator, or IT professional, this guide will walk you through essential concepts and steps to optimize content delivery, enhance performance, and improve user experience.

    Creating a Medianova CDN Resource

    To get started with Medianova CDN, follow these steps:

    1. Log in to with your username and password.

    2. Click on the Create CDN Resource tab in the left menu.

    3. Choose any resource type and fill in the necessary fields.

    4. Create a resource and configure the necessary settings.

    5. The resource you created will be in a "pending" status. Below is information about the resource statuses:

    About the status of resources

    • Pending: The URL entered by the user is marked as "Pending" until the DNS resolution is complete. In this state, the domain name provided by the user has not yet been resolved to an IP address. While the DNS resolution process is ongoing, the resources are not yet accessible through the CDN.

    • Active: Once the DNS resolution for the URL is successfully completed, the resource status changes to "Active." In this state, the domain name has been resolved to an IP address, and the resource is accessible via the CDN. The resource is activated across all data centers and is optimized to provide the best performance to users.

    Configuration

    The CDN URL and the ORIGIN URL below are examples.

    Enlarges the table by opening it in a full screen dialogOpen

    You must replace the existing domain on website code with the CDN URL for contents that you want to serve from CDN.

    Examples of HTML code illustrating how to configure a CDN URL with the Origin URL:

    Origin URL

    <img src=” alt=”” />

    or

    <img src=”/images/logos/logo.jpg” alt=”” />

    CDN URL

    <img src=” alt=”” />

    Source codes are replaced with the CDN URL instead of the Origin URL as mentioned above.

    Thus, our CDN service becomes active on your site.

    In order to access your content, you also need to define our IPs in your firewalls. to access the IP list of Medianova.

    Browser Cache Rule

    The Browser Cache Rule feature in the Medianova Cloud Panel for dynamic content allows you to define caching behavior for dynamically generated resources. This feature helps optimize content delivery for dynamic content, reduce load times, and ensure that content is always up-to-date or efficiently cached for better performance.

    Key Features

    • Flexible Cache Type Options:

      • All Files: This rule applies to all dynamic files, regardless of their type or location. It can be useful when you want to apply caching behavior globally to all dynamic resources.

      • Full Path: Apply the caching rule based on the exact full URL path of the dynamic content. This allows for fine-tuned control over specific dynamic URLs.

      • Directory: Apply the caching rule to all dynamic content within a specific directory. This is useful when dynamic content is organized by folder.

      • File Extension: Apply caching rules based on the file extension (e.g., .json, .html, .php). This is particularly useful when dynamic content is served as JSON, HTML, or other formats.

    • Cache Priority: Set priorities for dynamic resources to control which resources are cached first. For example, prioritize critical dynamic content (e.g., personalized data, user-specific content) over less important content to improve user experience.

    • Cache Mode Options:

      • Origin: Dynamic resources are fetched and cached directly from the origin server, ensuring that content is always up-to-date.

      • No Cache: The dynamic resource will not be cached in the browser and will always be fetched from the origin server. This ensures that the latest dynamic content is always served, but can increase load times.

      • Cache:

    • Apply to HTML/JSON Files:

      • On: The caching rule will apply to HTML and JSON files that contain dynamic content, allowing you to fine-tune caching behavior for these specific resource types.

      • Off: The caching rule will not apply to HTML and JSON files, ensuring they are always fetched fresh from the origin server.

    By configuring Browser Cache Rules for dynamic content, you can optimize content delivery for both performance and freshness, ensuring that dynamic resources are efficiently cached or fetched in a way that best meets your application's needs.

    How to Configure Browser Cache Rule

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Navigate to the Browser Cache Rule section in the Medianova Cloud Panel.

    1. Click on the Add button to create a new cache rule.

      • Configure Cache Rule Settings:

        • Type: Choose the type of cache rule you want to apply:

    By configuring the Browser Cache Rule, you can control how different file types are cached, ensuring that critical resources are loaded faster and less important resources are handled according to your specifications. The option to apply or not apply to HTML/JSON files provides further flexibility in caching strategies.

    Dynamic Content Acceleration

    Accelerate personalized, database-driven, or API-based content with Medianova’s Dynamic CDN. Cache dynamic responses at the edge to reduce origin load and deliver faster user experiences.

    Dynamic Content Acceleration delivers time-sensitive and user-specific content faster by intelligently caching dynamic responses at the CDN edge. Unlike static assets, dynamic content (such as personalized dashboards, API responses, or search results) is generated for each request, which can increase server load. Medianova’s microcaching technology allows these responses to be cached for very short durations — even a few seconds — dramatically improving responsiveness while keeping data up to date.

    This feature is available for Dynamic CDN Resources and can be managed through the Medianova Control Panel.

    Why Use Dynamic CDN?

    Dynamic content caching enhances both speed and efficiency for high-traffic applications. It helps you:

    • Reduce origin load – Serve frequent requests directly from CDN edge nodes.

    • Improve page responsiveness – Cache HTML and API responses for short durations.

    • Lower bandwidth costs – Decrease redundant origin requests.

    • Scale efficiently – Handle large traffic spikes with consistent response times.

    Use Dynamic CDN for applications where content changes often but not on every request — such as product listings, search results, or pricing data.

    Key Features

    • Microcaching – Cache dynamic responses for seconds or minutes to optimize performance.

    • Full Page Caching (FPC) – Cache entire HTML pages to reduce origin queries.

    • API Caching – Store API responses for repetitive or frequent calls.

    • Edge-based Caching – Execute caching at CDN edge locations to minimize latency.

    How It Works

    1. The origin server generates dynamic content in response to user requests.

    2. The Dynamic CDN edge caches the response for a short, configurable duration (e.g., 5 seconds).

    3. Repeated requests within that duration are served instantly from the edge cache.

    4. Once the TTL expires, the CDN refreshes the data from the origin to ensure freshness.

    A product API returning inventory counts can be cached for 10 seconds — enough to handle hundreds of identical requests without stressing your database.

    Important Configurations

    Setting
    Description

    Setting cache time too low may reduce cache efficiency, while setting it too high can risk serving outdated data. Start small and adjust gradually based on analytics.

    Best Practices

    • Exclude personalized or transactional pages (like /checkout or /profile) from caching.

    • Cache short-lived API responses to improve responsiveness.

    • Regularly monitor cache hit ratios to fine-tune TTLs and rules.

    Disallow Cookie Base Cache

    The Disallow Cookie-Based Cache feature in the Medianova Cloud Panel allows you to prevent caching for requests containing specific cookie values. By defining multiple key-value pairs, you can control how the cache behaves when certain cookies are present, ensuring that caching policies align with your requirements.

    Key Features

    • Prevent Caching for Specific Cookies: When enabled, this feature allows you to specify cookie key-value pairs that should bypass caching. Requests containing these cookies will not be cached, ensuring dynamic and personalized content delivery.

    • Support for Multiple Key-Value Pairs: You can define multiple cookie key-value pairs to tailor caching behavior for a variety of scenarios. This provides flexibility in managing caching for complex applications with diverse user interactions.

    How it works?

    1. Enable the Feature: Toggle the Disallow Cookie-Based Cache option to "On" in the panel.

    2. Define Cookie Key-Value Pairs:

      • Enter the cookie key in the provided field.

      • Enter the corresponding cookie value.

    How to Configure Disallow Cookie-Based Cache

    1. Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.

    2. Select the relevant resource.

    3. Click on the Caching tab.

    4. Scroll down to the Disallow Cookie-Based Cache section.

    Important Notes

    • Granular Control: This feature ensures that requests containing specified cookies bypass the cache, enabling precise control over cache behavior for dynamic content.

    • Multiple Key-Value Pairs: You can define as many key-value pairs as necessary to accommodate your application's caching needs.

    By configuring the Disallow Cookie-Based Cache settings, you can optimize cache management for scenarios requiring personalized or dynamic content delivery, ensuring seamless and accurate user experiences.

    Origin SNI Request

    The Origin SNI Request feature ensures that Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connections to your origin server use the correct domain name during the handshake process. By including the Server Name Indication (SNI) extension in the connection request, the origin server can identify and present the appropriate SSL certificate, even when multiple domains are hosted under the same IP address.

    In dynamic content delivery, where secure connections are frequently established and involve user-specific or API-driven resources, Origin SNI Request plays a critical role in ensuring secure and seamless content routing. This feature enhances compatibility with origin servers handling dynamic or personalized content while maintaining optimal performance.

    Key Benefits

    • Seamless Multi-Domain Support: Ensures proper SSL/TLS certificate selection for multiple domains hosted on the same origin server.

    • Enhanced Security: Enables secure connections for dynamic requests, protecting sensitive user data during transit.

    • Improved Compatibility: Supports origin servers that rely on SNI for SSL/TLS handshakes, ensuring uninterrupted content delivery.

    • Optimized for Dynamic Content: Handles frequent and personalized requests efficiently, without compromising connection performance.

    How to Configure Origin SNI Request

    1. Click on the CDN Resources section in the left-hand menu of the Cloud panel.

    2. Select the relevant resource.

    3. Click on the Origin Settings tab.

    4. Navigate to the Origin SNI Request section in the Medianova Cloud Panel.

    1. Provide the required Origin SNI Request Domain:

    • Enter the domain name for which SSL/TLS connections should be established.

    • Ensure the domain corresponds to a valid SSL certificate on the origin server.

    1. Click Submit to save the configuration.

    ETag Verification

    Validate cached content using the ETag response header so the CDN can detect when the origin object has changed.

    ETag Verification ensures that cached objects remain consistent with the latest version served by the origin. When enabled, the CDN evaluates the ETag header returned by the origin and refreshes the cached object when a mismatch is detected. This prevents outdated or stale content from being delivered to end users.

    You can manage ETag Verification in the Medianova Control Panel or via API.

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    Configure ETag Verification

    Enable or disable ETag validation to ensure cached content remains synchronized with the origin.

    1

    Access the ETag Verification Section

    Open the ETag Verification section under the Caching tab of the selected CDN resource.

    2

    Behaviour

    • When enabled, the CDN compares the origin’s ETag header with the cached object to determine whether a refresh is required.

    • When disabled, cached objects are served without ETag-based validation.

    • ETag validation improves consistency but may result in more origin requests depending on header behavior.

    FAQ

    Does ETag Verification guarantee that the CDN always serves the latest version? Yes. When enabled, the CDN validates the cached object using the ETag header and refreshes it if the origin indicates a change.

    Does enabling ETag Verification increase origin traffic? It can. Validation requires comparing ETag values, which may trigger additional revalidation requests depending on origin behavior.

    What happens if the origin does not send an ETag header? The CDN cannot perform ETag-based validation. Normal cache expiration and revalidation rules apply.

    Integrate WordPress with Medianova CDN

    Learn how to integrate WordPress with Medianova CDN to deliver static and media content faster, improve page load times, and enhance your website’s overall performance.

    WordPress is one of the world’s most widely used content management systems (CMS), offering flexibility through open-source development, easy setup, and extensive theme and plugin support. With Medianova CDN, your WordPress site’s static assets—such as images, scripts, and videos—are served from the nearest CDN edge node instead of your origin server, ensuring faster delivery to global users.

    We recommend backing up your WordPress files and database before starting the integration.

    Prerequisites

    • Access to your WordPress Admin Panel

    • A Medianova CDN Resource created in the Medianova Control Panel

    • Optional: Separate CDN resources for static images (Small Resource) and large media files such as videos (Large Resource)

    Integration Steps

    1

    Create a CDN Resource

    • Log in to the .

    Tips and Best Practices

    • To include multiple file extensions, separate them with commas (,). Example: jpg, png, gif, svg

    • You can view your CDN Resource URLs in the Medianova Control Panel under CDN → Resources or by visiting .

    Troubleshooting

    Problem
    Cause
    Solution

    Configure Rate Limiting

    Rate Limiting helps manage client request traffic by defining thresholds on how many requests a user or IP can make within a specified time window. This feature operates at the CDN edge, preventing excessive traffic from reaching your origin servers and maintaining stable performance.

    Rate Limiting is available only for Dynamic CDN Resources in the Medianova Control Panel.

    1

    Integrate Phalcon with Medianova CDN

    Learn how to integrate Phalcon, a high-performance PHP framework, with Medianova CDN to serve static assets efficiently and enhance website performance.

    Phalcon is an open-source PHP framework designed for speed and efficiency. Unlike traditional PHP frameworks, Phalcon is implemented as a C extension, providing exceptional execution performance with MVC architecture support.

    This guide explains multiple integration methods for connecting Phalcon-based applications with Medianova CDN to deliver static files (CSS, JS, images) from the nearest CDN edge.

    Before integration, back up your project files and database.

    Manage Page Rules

    Learn how to add, edit, clone and delete page rules in the Medianova Panel.

    You can manage Page Rules in the or via .

    Log in to the , select a CDN resource in the CDN section and navigate to the Page Rules tab.

    Turn on Page Rules

    By default, Page Rules is disabled. Click the Status toggle to turn on Page Rules.

    The screen now shows a

    Path & Extension Based Rate Limiting

    Overview

    Path & Extension Based Rate Limiting allows you to define traffic limits based on specific URL paths and/or file extensions (e.g., /api , /login, .pdf, .jpg). This enables targeted protection for sensitive endpoints or static resources by enforcing custom request limits per rule.

    Path & Extension Based Rate Limiting is available under Page Rules for Small, Large and Dynamic

    Integrate CakePHP with Medianova CDN

    Learn how to integrate CakePHP with Medianova CDN to deliver static assets such as images, CSS, and JavaScript files faster and improve website performance.

    CakePHP is an open-source PHP framework based on the MVC (Model-View-Controller) pattern, similar to Zend, Laravel, and Symfony. This guide explains how to configure Medianova CDN for CakePHP version 2.4 and later, enabling your application to serve static content from the nearest CDN edge node instead of the origin server.

    Before starting the integration, back up your CakePHP project files and database.

    Integrating Static CDN Resource

    Learn how to integrate your Medianova Small or Large CDN Resource with your website to deliver static assets or large media files through the CDN.

    After creating a Small or Large CDN Resource in the Medianova Control Panel, you must integrate it with your website or application so that your static and media assets are delivered through the CDN instead of your origin. This guide explains how to update your asset URLs, firewall configuration, and CMS settings to ensure seamless content delivery via Medianova CDN.

    Prerequisites

    • A

    Integrate Magento with Medianova CDN

    Learn how to integrate your Magento-based e-commerce website with Medianova CDN to improve load speed and ensure high-performance content delivery.

    Medianova provides CDN solutions for leading e-commerce companies in Türkiye to enhance performance, scalability, and customer experience. If your website is built on Magento, you can configure a CDN integration to serve static and media content faster through Medianova’s global edge network.

    Before starting, we recommend backing up your Magento files and database.

    CNAME & SSL

    Learn how to add and configure a CNAME to map your custom domain and enable secure HTTPS delivery.

    A CNAME record (Canonical Name record) allows you to associate your custom domain — for example, cdn.yourdomain.com — with the default hostname provided by Medianova, such as yourzonename.mncdn.com.

    Using a CNAME provides consistent brand identity, simplifies DNS management, and enables secure HTTPS delivery through the .

    Add a CNAME

    1
    X-Content-Type-Options: nosniff
    Accept-Encoding: gzip
    X-Frame-Options: SAMEORIGIN
    X-Frame-Options: ALLOW-FROM <domain>
    Strict-Transport-Security: max-age=<seconds>
    Strict-Transport-Security: max-age=<seconds>; includeSubDomains
    Strict-Transport-Security: max-age=<seconds>; preload
    Strict-Transport-Security: max-age=<seconds>; includeSubDomains; preload

    Only the IP addresses you add will be allowed. All others will be blocked.

    Blacklist

    The IP addresses you add will be blocked. All others will be allowed.

    Enter a Rule Name for easy identification.

  • Select a Field (parameter) from the dropdown — such as:

    • Request Method (GET, POST, etc.)

    • Client IP

    • Request URI

    • User Agent

    • Referrer

  • Choose an Operator, such as equals, contains, or matches.

  • Enter the Value to match.

  • (Optional) Add additional conditions using the And operator.

  • Select an Action to perform when the rule conditions are met:

    • Block – Reject the request and log the event.

    • Allow – Permit the request to proceed to origin.

    • Log Only – Record the request for review without blocking.

  • Click Save to apply the rule.

  • You can chain up to three conditions in a single rule. Complex logic combinations are not supported.

    Use “Log Only” for testing before switching to “Block” to minimize false positives.

    Delete: Click the Delete icon to permanently remove the rule.

  • Reorder (if supported): Drag and drop to change rule evaluation priority.

  • Review logs frequently to ensure that new or modified rules behave as expected.

    Block

    Immediately rejects the request with an error response.

    Allow

    Lets the request pass to the origin server.

    Log Only

    Records the event for analysis without blocking traffic.

    Verify operation results in the Prefetch Logs section.

    Behavior

    Description

    Single-file fetching

    Each Prefetch request targets one specific file path

    CDN-wide propagation

    Files are cached across all POPs

    TTL adherence

    Cache duration respects the file's Cache-Control or configured TTL settings

    Origin-safe

    No effect if the file is already cached unless purged first

    Type

    Description

    Example

    Single File Prefetch

    Fetches and caches one specific file from your origin.

    /videos/intro.mp4

    Medianova Control Panel
    API
    Medianova Control Panel
    API
    MN Logz Analytics
  • Passive: If the resource becomes unavailable for any reason, the resource status changes to "Passive." In this state, the resource is inactive, and users cannot access it.

  • Origin URL

    http://yourdomain.com

    CDN URL

    yourresourcename.mncdn.com

    www.cloud.medianova.com
    http://yourdomain.com/images/logos/logo.jpg”
    yourresourcename.mncdn.com/images/logos/logo.jpg”
    Click
    Create a Small Resource for static assets (e.g., .jpg, .png) and a Large Resource for video files (e.g., .mp4). → Copy the CDN URLs of your created resources; they will be used in plugin configuration.
    2

    Install the Medianova CDN Plugin

    • Log in to your WordPress Admin Panel.

    • In the left-hand menu, go to Plugins → Add New.

    • In the search bar, type Medianova and press Enter.

    • Install the Medianova CDN plugin and click Activate.

    3

    Configure the Plugin

    • After activation, go to Settings → CDN Medianova from the left menu.

    • Enter your CDN URLs, specify the folders to include, and list file extensions to exclude.

    • Click Save Changes to apply your configuration.

    CDN URLs not applied to static files

    Plugin not configured or cache not cleared

    Recheck the CDN URLs in plugin settings and clear the WordPress cache.

    Site shows mixed content warnings

    HTTPS not enabled on CDN resource

    Configure Shared SSL or Custom SSL in the Medianova Control Panel before enabling HTTPS.

    CDN plugin not found in search

    Outdated WordPress version

    Update WordPress to the latest version and try again.

    Medianova Control Panel
    Medianova CDN Integration Docs

    Click Save to apply the changes.

    Own SSL

    Upload your own SSL/TLS certificate issued by a Certificate Authority (CA).

    Free SSL

    Use a free SSL certificate automatically issued by Medianova (Let’s Encrypt).

    Domain SSL

    Extract an existing certificate directly from your domain if HTTPS is enabled.

    .crt / .pem / .key (Paste Content)

    Paste your certificate, private key, and CA chain into the input fields.

    .crt / .pem / .key (Upload File)

    Upload the certificate and private key files directly from your device.

    .pfx (Personal Information Exchange)

    Upload a .pfx file containing your certificate, key, and chain. Provide a password if required.

    SSL Name

    Internal display name for your SSL certificate.

    Domain Name

    Domain or wildcard domain to secure.

    Certificate (.crt)

    Public certificate file for HTTPS validation.

    Private Key

    Private key matching the certificate.

    Certificate Password

    Password for encrypted key or .pfx file.

    CA Chain / Intermediate Certificates

    Certificates linking your domain to the root authority.

    SSL Name

    A name to identify the certificate in your organization.

    Wildcard

    Toggle this option to secure all subdomains under the same domain.

    Domain

    Select the CDN domain to apply the certificate.

    Leaf Certificate

    The primary certificate for your domain.

    Intermediate Certificates

    Bridge between the leaf and the root authority.

    Root Certificate

    Trusted by browsers and operating systems.

    Full Chain = Leaf + Intermediate (+ Root)

    Configure Parameters

    Fill in the required fields in the popup:

    • Match Mode — Choose how the incoming path is matched. Options include:

      • All files

      • Path

      • Full Path

      • Wildcard

    • Origin URI — Enter the incoming request path to match.

    • Target URI — Enter the new path that requests will be rewritten to.

    • Priority — Lower values are evaluated first when multiple Rewrite Origin URLs exist.

    3

    Save the Configuration

    Select Add, then click Submit. Your Rewrite Origin URL is added to the list.

    Triggered Rule

    Combine analytics data with logs from your origin server for deeper context.

    Rule ID / Name

    Identifier of the triggered rule.

    Triggers

    Number of times the rule matched incoming requests.

    Last Triggered

    Most recent occurrence time.

    Medianova Control Panel
    Select the Type for the rule.

    Choose how the rule matches content:

    • All Files – Applies rule to all content.

    • Full Path – Applies to an exact URL path.

    • Directory – Applies to all content under a directory (for example: /images/).

    • File Extension – Applies to file types (for example: .jpg, .css, .js).

    3

    Set the Priority

    Select Priority to determine the rule evaluation order.

    4

    Select the Cache Mode.

    • Origin – Uses caching headers from the origin.

    • No Cache – Disables browser caching.

    • Cache – Forces caching for a defined duration.

    5

    Select Add to create the rule.

    6

    Configure HTML/JSON Application

    Enable or disable Apply the HTML/JSON files to define whether rules also apply to .html and .json responses.

    7

    Select Submit to apply

    No Cache
    forces revalidation;
    Cache
    overrides browser behavior with a fixed duration.
    Assign high priority to specific full path or directory rules if they should override global rules.
    The 'Add Browser Cache Rule' dialog box appears after clicking Add.
    The dynamic resource is cached in the browser for the specified duration. This improves performance for subsequent requests but ensures that content is refreshed after the cache expiration time.
    All Files: Applies to all files.
  • Full Path: Applies to files based on their exact URL path.

  • Directory: Applies to all files within a directory.

  • File Extension: Applies based on file extensions like .js, .css, .jpg, etc.

  • Priority: Set the priority (e.g., High, Medium, Low) for this cache rule to manage which files are cached first.

  • Cache Mode: Select the cache mode:

    • Origin: The resource is cached from the origin server.

    • No Cache: The resource is not cached.

    • Cache: The resource is cached in the browser for a set duration.

  • Apply the HTML/JSON Files:

    • On: Enable this option to apply the rule to HTML and JSON files.

    • Off: Disable this option to exclude HTML and JSON files from this cache rule.

  • Once you've configured the browser cache rule, click Submit to apply the changes.

  • Balance freshness and performance – Configure cache rules to keep data relevant without overloading the origin.

    Custom Page Rules – Exclude sensitive or real-time pages such as checkout or admin panels.

  • Granular Cache Control – Configure individual TTLs (cache durations) for different endpoints.

  • Combine Dynamic CDN with Rate Limiting and WAF for performance and protection.
  • Use Compression and WebP Optimization to further reduce load times.

  • Cache Time (TTL)

    Determines how long dynamic responses are cached before being refreshed. Shorter TTLs maintain freshness; longer TTLs improve performance.

    Page Rules

    Define which paths should or should not be cached (e.g., exclude /checkout, /admin, or highly dynamic pages).

    API Endpoints

    Apply caching selectively to repetitive API calls (e.g., product listings, autocomplete, or pricing).

    Medianova Dynamic CDN

    Use the + button to add additional key-value pairs as needed.

  • Submit Changes: After entering the required cookie key-value pairs, click the Submit button to save and apply your changes.

  • Toggle the feature to "On."

  • Define cookie key-value pairs:

    • Enter the cookie key and value in the respective fields.

    • Use the + button to add more key-value pairs.

  • Click Submit to apply the changes.

  • Enable the Origin SNI Request setting by toggling it to On.

    Toggle ETag Verification

    Enable or disable ETag validation using the ETag Verification toggle.

    3

    Submit the Configuration

    Click Submit to apply the updated validation behavior.

    — Permanent redirect
  • 302 — Temporary redirect

  • 303 — See Other

  • 307 — Temporary redirect (method is preserved)

  • 308 — Permanent redirect (method is preserved)

  • The CDN will apply your redirect-handling configuration only to the selected status codes, giving you granular control over how different redirect types are processed.

    Request Header Key: User-Agent
  • Request Header Value: Custom-UA

  • If you do not need to change request headers, leave these fields empty.

    Add Header Key: X-Debug-Redirect
  • Add Header Value: true

  • These headers are included in redirected requests or responses depending on your configuration.

    Enable Gzip from Origin

    Add Header Key: Specify the name of the custom header to be appended during the redirection.

  • Add Header Value: Provide the value for the custom header key to ensure it is correctly appended.

  • Select the URI Match Mode

    Choose whether the rule should match an Exact Path, Prefix, File Extension, or Regex pattern.

    3

    Define the URI Match Rule

    Enter the URI, directory, extension, or expression that determines which requests will use this origin rule.

    4

    Select the Protocol

    Choose whether the CDN forwards requests using HTTP, HTTPS, or Same as Request.

    5

    Enter the Domain or IP

    Specify the origin host that the CDN should forward matched traffic to.

    6

    Configure HTTP and HTTPS Ports

    Enter the port numbers the CDN should use when communicating with the origin.

    7

    Set the Host Header

    Define a custom Host header if the origin requires a different hostname than the request URL.

    8

    Assign Priority

    Choose a priority value to control which rule applies if multiple rules match the same request.

    9

    Save the Rule

    Select Add to save the rule to the rule list.

    10

    Submit the Configuration

    Click Submit to apply all rule changes to the CDN resource.

    Modify the Required Fields

    Update match conditions, origin host, ports, or priority values.

    3

    Save the Updated Rule

    Click Submit to apply the updated configuration.

    Confirm Deletion

    Submit the change to finalize the removal.

    Host header

    Outdated rule condition

    Old regex pattern still matching new endpoint

    Custom Rules take precedence over Managed Rules. If both apply, the Custom Rule’s action will execute.

    for more precise matching.
  • Example: Change “contains /api” to “equals /api/admin”.

  • Change the rule action

    • Temporarily switch from Block to Log Only to monitor.

  • Add an exception rule

    • Allow requests from a specific IP, URI, or User Agent.

  • Whitelist internal services

    • Add known internal IPs (monitoring tools, API clients) to an allowlist.

  • Apply changes incrementally and review logs after each update to confirm resolution.

    If no false alerts occur, switch the rule back to Block mode.

    Do not disable Managed Rules globally to avoid temporary false positives. Always isolate and fix the specific rule causing the issue.

    Overly broad request URI match

    Blocking /api/v1/ instead of /api/v1/admin

    Strict User Agent filtering

    Blocking “curl” used in automated internal scripts

    Missing whitelist entry

    Internal monitoring IPs not excluded

    Choose Free SSL when you want to automatically issue and manage a certificate through Medianova’s Let’s Encrypt integration.

    Wildcard

    (Optional) Enable this option to secure all subdomains under the same domain (e.g., *.example.com).

    Domain

    Select the domain associated with your CDN Resource.

    After filling in the fields, click Add SSL to start the process.

    Once successful, click Confirm to finalize installation.

    The new SSL certificate will appear in your SSL Management list and can now be assigned to your CDN Resources.

    Domain verification may take up to a few minutes depending on DNS propagation.

    If domain ownership cannot be verified, the process will fail. Ensure that your DNS settings are correct and that your domain points to Medianova’s CDN.

    Open the SSL (or CNAME & SSL) tab.

  • Choose Shared SSL to apply the Free SSL certificate.

  • Click Save.

  • You can verify activation by opening your domain in a browser using https://. The lock icon indicates a valid SSL connection.

    SSL Name

    Medianova Control Panel

    A name to identify the certificate in your organization.

    Select the resource type.

    In Select CDN Resource Type, choose Large & VOD Streaming.

    Two configuration tabs appear: Large Content Caching and VOD Content Caching.

    3

    Large Content Caching

    Use Large Content Caching for static large files such as videos, music, .zip, and .exe.

    • CDN Resource Name – Enter a short, descriptive name for your resource. → This name will appear in your default CDN hostname (for example, example.mncdn.com).

    • Source of Your Files

      • My Origin (Origin Pull) – Medianova fetches content directly from your server.

        • Click Add and complete:

    4

    VOD Content Caching

    Use VOD Content Caching if you plan to deliver video content and need automatic packaging for streaming protocols.

    • CDN Resource Name – Provide a name for the VOD resource.

    • Source of Your Files

      • My Origin (Origin Pull) – Specify your Origin URL (for example, https://www.example.com).

      • Stook Object Storage (Origin Push) – Choose a Stook Bucket/Path.

      • (Optional) Enable Medianova VOD Packaging to automatically prepare your MP4 files for streaming protocols (HLS, DASH).

    • CDN Resource Label – (Optional) Add a label for identification.

    5

    Create the resource.

    Click Create CDN Resource at the bottom of the form. The new resource appears in the CDN Resources list. Configuration and availability are indicated by icons under:

    • Config Status – Green check shows valid configuration.

    • Resource Status – Blue toggle indicates the resource is active.

    6

    (Optional) Configure your custom domain (CNAME).

    If you want to serve content using your own domain (for example, cdn.yourdomain.com) instead of the default hostname (example.mncdn.com), configure a CNAME record.

    To use your own domain, add a CNAME under the CNAME & SSL tab of your CDN Resource. For detailed steps, see for CDN Resource.

    Access the Rate Limiting

    To begin configuration, log in to the Medianova Control Panel and follow these steps:

    1. Navigate to Security → Rate Limiting.

    2. Select the Dynamic CDN Resource where you want to enable Rate Limiting.

    3. The configuration panel for that resource will open.

    If you don’t have a Dynamic CDN Resource yet, create one under CDN → Create CDN Resource, then return to the Security section.

    2

    Enable Rate Limiting

    Toggle the Rate Limiting option to On to activate the feature. Once enabled, you can define custom thresholds and actions for your selected resource.

    Disabling Rate Limiting immediately removes active enforcement rules but retains your configuration for future use.

    3

    Set Request Limits

    Specify the number of requests allowed per client within a given time interval.

    Field
    Description

    Request Limit

    Start with conservative thresholds and gradually adjust them based on traffic analytics.

    4

    Choose Rate Limit Option

    Define how bursts of traffic are handled when the limit is reached. Select one of the following modes from the dropdown:

    Option
    Description

    “Burst” modes are useful for high-traffic APIs or login pages where short spikes are expected.

    5

    Configure IP Whitelisting (Optional)

    Add trusted IP addresses or networks that should bypass rate enforcement.

    • Click Add Whitelist Entry.

    • Enter the IP address or range (e.g., 192.168.0.0/24).

    • Click Save to apply.

    Whitelist internal monitoring systems or administrative users to prevent accidental blocking.

    6

    Define Actions for Exceeded Limits

    Specify what happens when a user exceeds the defined rate limit.

    Action
    Description

    You can also define the HTTP response code to be returned:

    • 429 — Too Many Requests

    • 529 — Custom throttling response

    Use Challenge mode only if you have challenge verification integrated on your frontend (e.g., CAPTCHA).

    7

    Save and Apply Configuration

    After defining all parameters, click Save to activate your Rate Limiting settings. The configuration takes effect immediately at the CDN edge.

    Test your configuration with real traffic or API calls to ensure it behaves as expected.

    8

    Verify and Monitor

    To confirm that Rate Limiting is working:

    • Send multiple requests exceeding your threshold to trigger enforcement.

    • Check the response code (429 or 529).

    • Review request logs and metrics in Analytics → Rate Limiting Dashboard.

    Metric visibility may take a few minutes after activation depending on traffic volume.

    Path & Extension Based Rate Limiting

    Some parts of your application may require different rate limits — for example, to protect login endpoints or limit access to downloadable files — without affecting the entire CDN resource.

    With Path & Extension Based Rate Limiting, you can define request thresholds that apply only to specific URL paths (such as /login or /api/) or file types (like .pdf, .jpg, or .mp4). These rules are managed under the Page Rules section in the Medianova Control Panel and allow more granular control over how traffic is handled at the edge.

    Use this feature when you need to:

    • Apply stricter limits to sensitive routes such as /auth/, /checkout, or /login.

    • Restrict access to large media or document files.

    • Combine global rate limits with path-level overrides for flexible traffic management.

    Learn more: See Path & Extension Based Rate Limiting for configuration steps and advanced examples.

    Prerequisites
    • A configured CDN Resource

    • Access to the Phalcon project source code

    • PHP 7.4 or later (recommended)

    Integration Methods

    1

    Use setStaticBaseUri

    The simplest way to integrate your Phalcon application with Medianova CDN is by defining a static base URI. This approach ensures that dynamic content stays on your origin, while static files (CSS, JS, images) are delivered via CDN.

    Replace <CDN_Resource_URL> with your actual CDN Resource URL (for example: https://example.mncdn.com/).

    2

    Use Asset Collections with Conditional CDN Prefix

    For more granular control, you can configure your asset collections to automatically switch between development and production environments.

    3

    Direct CDN Path in Asset Definition

    You can also directly define CDN-prefixed URLs when adding assets to your project.

    4

    Verify CDN Integration

    After applying one of the methods above:

    1. Deploy your changes to the web server.

    Troubleshooting

    Problem
    Cause
    Solution

    Assets are still served from the origin

    The CDN prefix is not applied in code.

    Verify that setStaticBaseUri() or $css->setPrefix() includes your correct CDN Resource URL.

    Invalid asset paths

    The CDN prefix or local directory structure is incorrect.

    Check the path structure inside your assets directory and ensure the CDN path matches the file hierarchy.

    SSL-related warnings

    HTTPS not enabled on CDN resource.

    Enable Shared SSL or Custom SSL in the Medianova Control Panel before using HTTPS URLs.

    Create Page Rule
    button, enabling you to get started with your first page rule.

    File Path and File Extension

    Page Rules match on a combination of file path and file extension.

    Field
    Available options

    File Path

    Directory, wildcard and regex pattern

    File Extensions

    Any, one or more

    Directory is recursive (unless using the Exact Match setting), meaning /dir/ matches all URLs for files in the /dir/ directory and its subdirectories.

    Wildcard is for example * to match on any URL path and /*/images/ matches URLs in any second-level images directory.

    When using regex pattern, only the * . / () [] $ symbols are supported. You cannot use other symbols, including ? ! + ^.

    Add a Page Rule

    1

    Click the Create Page Rule button

    A new window appears containing a form to create a page rule. The form requires specifying a File Path and one or more File Extension entries, and allows for selecting and configuring Page Rules settings.

    Create a Page Rule screen
    2

    Set the File Path and File Extensions

    3

    Select and Configure Settings

    From the drop down menu, select a setting and click the Add a Setting button. Configure the setting using the options that appear below the drop down menu.

    Repeat this step if you want the page rule to trigger multiple actions.

    4

    Deploy to CDN

    Push the page rule to the CDN by clicking the Create button.

    View Page Rule Details

    Find the page rule in the table, click the three dots and select Page Rule Details. The new window shows the status of every setting and details for each setting.

    Page rule details screen

    Clone a Page Rule

    If you want to create a new page rule that is very similar to an existing rule, the easiest way is to clone the existing rule, and then apply changes to the clone.

    1

    Select the Page Rule to Clone

    Find the page rule in the table, click the three dots and select Clone Page Rule. A new window appears for editing the cloned rule:

    Clone a Page Rule screen
    2

    Set the File Path and File Extensions

    Set a combination of file path and file extensions that is different from the rule you just cloned.

    3

    Deploy to CDN

    Push the new page rule to the CDN by clicking the Clone button.

    Edit a Page Rule

    Change the page rule in three steps:

    1

    Select the Page Rule to Edit

    Find the page rule in the table, click the three dots and select Edit Page Rule. A new window appears for editing the rule.

    2

    Change the File Path and File Extensions

    If you only want to change page rule settings, do not edit the file path and file extensions

    3

    Change Page Rule Settings

    From the drop down menu, select a setting you want to change and click the Add a Setting button. Configure the setting using the options that appear below the drop down menu.

    Repeat this step if you want to change another setting.

    4

    Deploy to CDN

    Push the page rule to the CDN by clicking the Update button.

    Delete a Page Rule

    Find the page rule in the table, click the three dots, select Delete Page Rule and click Yes, Delete in the confirmation window. This triggers an immediate update to CDN servers.

    Medianova Panel
    API
    Medianova Panel
    Page Rules start screen
    accounts. It remains
    OFF by default
    and must be explicitly enabled per rule, even when global
    Rate Limiting
    is ON.

    Activation Requirements

    • Rate Limiting must be enabled globally under the Security tab.

    • Path & Extension Based Rate Limiting is disabled by default, even when Rate Limiting is ON.

    • Rules are created under the Page Rules section of the panel.

    • You can define different rate limits for each path or file type, separate from the base rule.

    • Whitelist IPs are managed from a single global pool; no separation exists between general Rate Limiting and Path & Extension Based Rate Limiting.

    Rule Behavior

    Each Path & Extension Based Rate Limiting rule inherits global Rate Limiting settings (request limit, burst, time window, etc.), but allows you to scope limits to a specific path or file extension.

    Configuration Fields

    Field
    Description

    Path

    Target path (e.g., /api/login)

    File Extension

    Target extensions (e.g., .pdf, .jpg, .html)

    Request Limit

    Requests per second/minute (inherited from global config)

    Burst

    Number of extra allowed requests before enforcing limits

    If the account's default Cache Type is dynamic or edge, you must explicitly define the same Cache Type in the Page Rule when applying Path & Extension Based Rate Limiting; otherwise, caching for that path or extension will fall back to origin, and response behavior will rely on origin headers.

    How to Configure

    1. Navigate to the Page Rules section in the Medianova panel.

    2. Click Add Rule.

    3. In the rule editor, define:

      • Path (e.g., /login)

      • File Extensions (e.g., .pdf, .jpg)

    4. Select and enable Rate Limiting toggle inside the rule.

    5. Set:

      • Request Limit (100–1000)

      • Time Window (Per Second or Per Minute)

      • Burst value (optional)

    6. If your account’s default Cache Type is dynamic or edge, add the same Cache Type field to this rule explicitly.

    Page Rules are processed in order, from top to bottom. If multiple rules match the same path or file, only the first matching rule is applied. Make sure your rate limiting rule is placed before broader or less restrictive rules.

    Example Rule

    This rule limits .pdf file requests under /reports to 100 per minute, allowing 20 additional burst requests before applying the rate limit.

    Use Cases

    • Limit file downloads by extension: Apply rate limits to .pdf, .zip, .jpg files regardless of path.

    • Protect API endpoints by path: Limit access to paths like /api/auth, /api/login, /checkout.

    • Combine path + extension filtering: Limit requests to /reports/*.pdf or /downloads/*.zip.

    • Restrict access to static assets: Control access to large files or images under /media/ or /static/.

    • Prevent scraping of product/category pages: Apply limits to paths like /products/, /categories/.

    • Rate-limit search endpoints: Protect /search or /filter paths from abuse.

    Limitations

    • Path & Extension Based Rate Limiting is disabled by default and must be activated per rule

    • Only functional when resource Rate Limiting is enabled

    • Whitelisted IPs cannot be scoped per rule

    • Request Limit Range: 100 - 1000

    Prerequisites
    • A configured CDN Resource.

    • A running CakePHP 2.4+ application

    • Write access to your ./Config/bootstrap.php file

    Integration Steps

    1

    Create a CDN Resource

    • Log in to the Medianova Control Panel.

    • Create a new CDN Resource for your application.

    • Copy your Resource URL (for example: https://example.mncdn.com/).

    2

    Define CDN Base URLs

    • Open the configuration file: ./Config/bootstrap.php

    3

    Use the HTML Helper for Images

    Use the HtmlHelper::image() function to generate image URLs automatically through the CDN.

    Output:

    4

    Use the HTML Helper for CSS Files

    To load your CSS files from the CDN, use the HtmlHelper::css() function:

    Output:

    5

    Use the HTML Helper for JavaScript Files

    To load JavaScript assets from the CDN, use the HtmlHelper::script() function:

    Output:

    6

    Verify Integration

    • Save your configuration and clear the CakePHP cache.

    Troubleshooting

    Problem
    Cause
    Solution

    Assets still load from the origin server

    CDN URLs not defined or configuration not reloaded.

    Check the bootstrap.php entries and clear the CakePHP cache.

    Assets missing or 404 errors

    Incorrect CDN path or directory mismatch.

    Verify that your img, css, and js directories match the structure in your CDN Resource.

    Mixed content warning (HTTP/HTTPS)

    HTTPS not enabled on CDN resource.

    Enable Shared SSL or Custom SSL in the Medianova Control Panel before using secure URLs.

    or
    already created in the
  • Access to your website’s HTML, CSS, JS, or CMS configuration.

  • Ability to modify firewall rules on your origin server.

  • For websites with both static and video content, you can use separate CDN Resources (Small + Large) under the same account and domain structure.

    1

    Identify assets for CDN delivery

    List all assets that can benefit from CDN acceleration:

    • For Small CDN Resource: images, CSS, JavaScript, fonts, and similar static content.

    • For Large CDN Resource: videos, downloadable files, or other large media assets.

    2

    Update URLs in HTML code

    Replace existing URLs with the corresponding CDN URLs.

    Before
    After
    3

    Update CSS file references

    Update references inside CSS files (e.g., images, fonts, or icons).

    4

    Update JavaScript file references

    Ensure that all script sources are loaded from the CDN.

    Before
    After
    5

    Check relative paths

    Confirm that relative paths continue to work correctly after switching to CDN URLs. Adjust directory structures if required.

    6

    Verify all resources

    Open your website and confirm that assets load from CDN URLs.

    Use browser DevTools → Network

    7

    Update CMS or framework settings

    If you use a CMS (WordPress, Drupal, Joomla, etc.), configure its CDN or performance plugin to automatically replace static URLs with CDN URLs.

    8

    Allow Medianova IPs in your firewall

    Add Medianova’s CDN IP ranges to your origin’s firewall allowlist to permit content fetches from edge servers. See

    9

    Test in all environments

    Test both staging and production environments to ensure the CDN works correctly and does not break content delivery.

    10

    Monitor and optimize performance

    Use to monitor cache hits, latency, and traffic volume. Refine cache rules or resource paths if needed.

    11

    Review SEO and canonical tags

    When assets move to CDN URLs, update sitemaps and if required. Ensure that canonical tags still point to your main domain to prevent duplicate content indexing.

    Small CDN Resource
    Large CDN Resource
    Medianova Control Panel
    Prerequisites
    • An active Medianova CDN Resource

    • Access to your Magento Admin Panel (Administrator role)

    • Optional: A configured Shared SSL or Custom SSL in the Medianova Control Panel if HTTPS is required

    Integration Steps

    1

    Create a CDN Resource

    • Log in to the Medianova Control Panel.

    • Create a new CDN Resource for your Magento domain. → Once created, copy the Zone URL (for example: https://example.mncdn.com).

    2

    Access Magento Configuration

    • Log in to your Magento Admin Panel.

    3

    Configure Base URLs

    • Open the Base URLs section.

    4

    Save and Clear Cache

    • Click Save Config to apply the changes.

    Verify Integration

    After completing these steps, Magento will deliver static and media files via Medianova CDN.

    To confirm integration, check the HTML source code of your website. All asset URLs should begin with your CDN Zone domain (for example: https://example.mncdn.com).

    Optional: Configure HTTPS

    If your Magento site uses HTTPS, repeat the Base URL configuration steps for the Secure section as well.

    Ensure that you have configured Shared SSL or Custom SSL in the Medianova Control Panel before enabling HTTPS.

    Troubleshooting

    Problem
    Cause
    Solution

    CDN URLs not visible in HTML

    Magento cache not refreshed

    Go to System → Cache Management and flush all caches.

    Mixed content warning (HTTP/HTTPS)

    HTTPS not configured properly in Medianova

    Configure Shared SSL or Custom SSL before updating secure URLs.

    Slow asset delivery

    Zone caching disabled

    Check the Zone settings in the Medianova Control Panel and ensure caching is active.

    Open your CDN Resource

    From the left menu, go to CDN → CDN Resources, and click the resource for which you want to add a CNAME.

    2

    Access the CNAME & SSL tab

    Select the CNAME & SSL tab from the horizontal navigation menu. The CNAME input field appears at the top of the tab.

    CNAME
    3

    Enter the CNAME value

    Type your custom domain (for example, cdn.yourdomain.com) in the input field and click Submit. The CNAME is saved and applied to your selected CDN Resource.

    4

    Create the DNS mapping

    In your DNS provider’s management panel, create a CNAME record that points your custom domain to the Medianova CDN hostname.

    Example:

    After DNS propagation, requests to your domain will resolve through Medianova’s CDN edge network.

    Configure SSL & TLS

    1

    Select an SSL certificate.

    In the SSL Certificate section, choose one of the available options from the Select SSL Certificate dropdown:

    • Shared SSL – Use Medianova’s shared certificate.

    • SNI – Use your organization’s uploaded certificate.

    • Custom SNI – Apply a specific SSL from your list.

    • Disabled – Turn off HTTPS for the resource.

    2

    Apply the changes.

    Click Submit to save the configuration. The selected SSL certificate will secure all CNAMEs assigned to this resource.

    3

    Configure TLS versions.

    At the bottom of the tab, enable supported TLS versions (recommended: TLS 1.2 and TLS 1.3). Click Submit to confirm.

    For detailed SSL & TLS configuration instructions, see SSL & TLS Encryption.

    Verification and Troubleshooting

    • DNS propagation may take several minutes depending on your DNS provider’s TTL configuration.

    • CNAMEs must be unique and not used by any other services (for example, mail or web hosting).

    • If you are using a Custom SSL, ensure the certificate covers all configured CNAMEs (via CN or SAN fields).

    • TLS 1.1 is deprecated and should remain disabled for security compliance.

    • To verify your configuration, run:

      The response should resolve to your Medianova CDN hostname.

    Example (HTML Integration)

    When your CNAME configuration is active, you can replace original URLs in your web assets with the CDN domain:

    Your CNAME domain (for example, cdn.yourdomain.com) now resolves to Medianova’s edge network, serving cached content from your CDN Resource.

    Your CDN Resource is now accessible through your custom domain (for example, cdn.yourdomain.com). All requests to this domain are served securely via Medianova’s edge network using the configured SSL and TLS versions.

    Medianova Control Panel

    Purge

    Instantly invalidate outdated cache entries across all Medianova CDN cache layers to ensure the latest content is delivered globally without waiting for TTL expiration.

    Purge invalidates cached content across the Medianova CDN before its cache lifetime (TTL) expires. It ensures that updated content from your origin is immediately reflected and consistently served from all cache layers worldwide.

    When a purge is executed, the Medianova purge system distributes invalidation commands across the CDN’s cache hierarchy. Cached objects are marked as expired and fetched again from your origin upon the next user request.

    You can trigger a purge from the Medianova Control Panel or via API .

    When to Purge Cached Content

    Use purge whenever:

    • Updated HTML, CSS, JS, images, or video files must be reflected immediately.

    • Outdated or sensitive content needs to be removed from CDN caches.

    • New deployments or configuration changes require instant cache refresh.

    • Consistency across all cache layers is required after a content update.

    Combine purge operations with shorter TTL values for dynamic or frequently changing content.

    Types of Purge

    Medianova supports multiple purge methods to give you flexibility and control:

    Type
    Description
    Example

    Wildcard purge operations are recursive and affect all subdirectories. To use wildcard patterns, the Wildcard Purge Suffix option must be enabled under CDN Settings.

    How Purge Works

    1. A purge request is initiated via the or .

    2. Medianova’s purge system distributes invalidation commands to all cache layers.

    3. Cached objects matching the path are marked as invalid and no longer served.

    4. On the next user request, the CDN retrieves the fresh content from the origin and re-caches it.

    Cache propagation completes rapidly, depending on node density, region count, and network conditions.

    Purge Propagation & Behavior

    Purge requests propagate through all layers of Medianova’s caching infrastructure extremely quickly – typically completing across our global network in under 5 seconds – ensuring that outdated content is swiftly replaced with fresh content worldwide.

    Behavior
    Description

    A full purge (/*) removes all cached files for that resource and should be used only when necessary.

    Best Practices

    • Purge only what’s needed. Avoid full purges to reduce cache refill load.

    • Use specific paths instead of broad wildcard patterns whenever possible.

    • Automate with API purge to clear cache after deployments or content updates.

    • Monitor purge logs to verify completion (see Manage Purge).

    Create Small CDN Resource

    Learn how to create a Small CDN Resource in the Medianova Control Panel for static content delivery.

    A Small CDN Resource is optimized for small-sized static assets such as images, CSS, JavaScript, and web fonts. It delivers these files efficiently through Medianova’s global edge network, improving website performance and reducing load on your origin servers.

    You can configure a Small CDN Resource to fetch content directly from your own origin (Origin Pull) or host it on Medianova Storage (Origin Push).

    You can also reach this page from the Overview screen by clicking Get Started Now, which redirects to CDN Resources.

    Create a Small CDN Resource

    Unsupported file extensions The following file types are not supported in Small CDN Resources and will return 403 Forbidden responses when requested: | 3gp | 3gpp | asf | asx | mp3 | wm | wav | midi | mpg | mov | mpeg | m2p | flv | f4v | | avi | ogv | ogg | aac | mp4 | m4a | m4v |

    1

    Access the Create CDN Resource page.

    From the left menu, go to CDN → Create CDN Resource.

    2

    • Use Small only for static assets. For large files, video, or downloadable content, use Large & VOD Streaming instead.

    • Config Status and Resource Status icons confirm that your setup is complete.

    • If configuration fails, verify origin accessibility and port settings.

    Use the following command to test connectivity and view CDN response headers:

    Replace example.mncdn.com with your CDN URL (use the Custom CNAME if this has been activated) and choose a URL path that returns a 200.

    This example curl command sends a GET request to the CDN and returns output detailing the remote IP address and HTTP request and response headers. The response body is discarded.

    Troubleshooting

    • If configuration fails, verify origin accessibility and port settings.

    • Ensure DNS updates (especially Custom CNAME) have propagated before testing.

    • For SSL errors, confirm that the certificate matches the domain and is active.

    ping example.mncdn.com
    <?php
    
    $url = new Phalcon\Mvc\Url();
    
    // Dynamic URIs remain on your origin server
    $url->setBaseUri('/');
    
    // Static resources go through Medianova CDN
    $url->setStaticBaseUri('https://<CDN_ZONE_URL>/');
    
    Path: /reports
    File Extensions: .pdf
    Request Limit: 100
    Time Window: Per Minute
    Burst: 20
    cdn.yourdomain.com  CNAME  yourzonename.mncdn.com
    <!-- Origin URL -->
    <img src="http://yourdomain.com/images/logo.jpg" alt="">
    
    <!-- CDN URL -->
    <img src="http://cdn.yourdomain.com/images/logo.jpg" alt="">

    Coordinate with TTL strategy. If content changes often, use shorter cache durations.

    Single File Purge

    Removes one specific file from all CDN caches.

    /images/banner.jpg

    Wildcard Purge

    Removes multiple files using pattern matching.

    /images/*

    Full CDN Resource Purge

    Clears all cached files for a specific CDN Resource.

    /*

    Instant Global Invalidation

    Cache invalidations propagate rapidly across all CDN cache layers.

    Parallel Distribution

    Purge commands are broadcast concurrently to all cache nodes for faster execution.

    Independent Caches

    Each CDN node manages its local cache separately; purge ensures global synchronization.

    Auto Revalidation

    After purge, next requests trigger fresh pulls from the origin.

    Medianova Control Panel
    API
    Domain or IP
  • HTTP Port / HTTPS Port

  • Protocol

  • Host Header

  • (Optional) Origin SNI Request, Priority, Weight if multiple origins exist.

  • Stook Object Storage (Origin Push) – Medianova hosts your files.

    • Choose your Stook Bucket / Path.

    • (Optional) Add a CDN Resource Label.

    • Set FTP Password and Confirm Password for uploads.

  • Set FTP Password and Confirm Password to upload files if required.

  • CNAME

    The maximum number of requests allowed (e.g., 100).

    Time Interval

    The period within which requests are counted (e.g., per second, per minute).

    Burst

    Allows short spikes within the limit window before throttling begins.

    Burst + No Delay

    Permits short bursts instantly, without waiting for enforcement delay.

    None

    Strict enforcement. Requests exceeding the limit are immediately blocked.

    Block

    Rejects the request and returns an error response (default).

    Challenge

    Sends a verification challenge to the client before allowing further requests.

    This method allows you to automatically use local assets in development and CDN-prefixed URLs in production.

    Open your website in a browser.

  • View the HTML source (Ctrl + U) and confirm that static file URLs begin with your CDN Resource domain.

  • Example: https://example.mncdn.com/css/bootstrap.min.css

    tab to verify requests.
    If your origin firewall blocks Medianova IPs, CDN requests will fail. Always verify your allowlist configuration.

    <img src="https://yourdomain.com/images/example.jpg" alt="Example Image">

    <script src="/scripts/example.js"></script>

    Medianova IP Blocks
    MNLogz Analytics
    robots.txt

    <img src="https://CDN_URL/images/example.jpg" alt="Example Image">

    <script src="https://CDN_URL/scripts/example.js"></script>

    Add the following variables to define Medianova CDN paths for your assets:

    Replace <CDN_RESOURCE_URL> with your actual CDN Resource address, such as https://example.mncdn.com/.

    Open your website in a browser and view the HTML source (Ctrl + U).
  • Confirm that image, CSS, and JS assets are loaded from your Medianova CDN Resource.

  • Example: https://example.mncdn.com/css/style.css

    <?php
    
    $css = $this->assets->collection('header');
    $scripts = $this->assets->collection('footer');
    
    if ($config->environment == 'development') {
        $css->setPrefix('/');
        $scripts->setPrefix('/');
    } else {
        $cdnURL = 'https://<CDN_ZONE_URL>/';
        $css->setPrefix($cdnURL);
        $scripts->setPrefix($cdnURL);
    }
    
    $css->addCss('css/bootstrap.min.css')
        ->addCss('css/custom.css');
    
    $scripts->addJs('js/jquery.js')
        ->addJs('js/bootstrap.min.js');
    
    <?php
    $cdnURL = 'https://<CDN_ZONE_URL>/';
    $this->assets
         ->addCss($cdnURL . 'css/custom.css', false);
    /* Before */
    background-image: url('/images/background.jpg');
    
    /* After */
    background-image: url('https://CDN_URL/images/background.jpg');
    nslookup cdn.yourdomain.com
    <?php echo $this->Html->image('medianova-logo.png', ['alt' => 'Medianova Logo']); ?>
    <img src="https://example.mncdn.com/img/medianova-logo.png" alt="Medianova Logo" />
    <?php echo $this->Html->css('style.css'); ?>
    <link rel="stylesheet" type="text/css" href="https://example.mncdn.com/css/style.css" />
    <?php echo $this->Html->script('script.js'); ?>
    <script type="text/javascript" src="https://example.mncdn.com/js/script.js"></script>
    <?php
    Configure::write('App.imageBaseUrl', 'https://<CDN_ZONE_URL>/img/');
    Configure::write('App.cssBaseUrl',   'https://<CDN_ZONE_URL>/css/');
    Configure::write('App.jsBaseUrl',    'https://<CDN_ZONE_URL>/js/');
    In the left-hand menu, go to Stores → Configuration.
  • Under the General section, select Web.

  • In the Base URL for Static View Files field, enter your Zone URL followed by /static/. Example: https://example.mncdn.com/static/
  • In the Base URL for User Media Files field, enter your Zone URL followed by /media/. Example: https://example.mncdn.com/media/

  • Navigate to System → Cache Management.
  • Select all cache types, click Submit, and then choose Flush Magento Cache.

  • Select the resource type.

    In Select CDN Resource Type, choose Small.

    Selecting Small CDN Resource in the creation form.

    This option is optimized for static content such as images, CSS, and JavaScript files.

    3

    Enter general information.

    • CDN Resource Name – Provide a short, descriptive name for your resource. → This name will appear in your default CDN hostname (for example, example.mncdn.com).

    • CDN Resource Label – (Optional) Add a label for internal reference.

    4

    Select the source of your files.

    Option 1 – My Origin (Origin Pull)

    Medianova fetches content directly from your server when users request files.

    1. Select My Origin.

    2. Click Add and complete the Origin Settings:

      • Domain or IP

      • HTTP Port / HTTPS Port

      • Protocol

    Option 2 – Stook Object Storage (Origin Push)

    Medianova hosts your files on Stook Object Storage.

    1. Select Stook Object Storage.

    2. In Stook Bucket/Path, choose an existing Bucket and optional Subfolder.

    3. (Optional) Add a CDN Resource Label for internal tracking.

    5

    Create the resource.

    The new resource appears in the CDN Resources list. Configuration and resource availability are indicated by toggle icons under:

    • Config Status – Green icon means configuration is valid.

    • Resource Status – Blue toggle means the resource is active and enabled.

    6

    (Optional) Configure your custom domain (CNAME).

    If you want to serve content using your own domain (for example, cdn.yourdomain.com) instead of the default hostname (example.mncdn.com), configure a CNAME record.

    To use your own domain instead of the default CDN hostname, add a CNAME under the CNAME & SSL tab of your CDN Resource. For detailed steps, see for CDN Resource.

    Page Rules Settings

    Learn about the actions Medianova CDN can take based on a page rule, and the configuration options for each setting.

    Settings control the actions Medianova CDN takes once a request matches the URL pattern defined in a page rule.

    The table below outlines all settings available in Page Rules from the Medianova Panel.

    Medianova can implement custom page rule configuration at your request, for example network rate limit and security headers.

    Setting
    Description
    Packages

    Cache Type

    Use the Cache Type setting to control CDN caching.

    Select Edge to specify how long the CDN may cache responses.

    Select Origin to instruct the CDN to determine the maximum cache duration from origin response headers cache-control or expires .

    Select Dynamic to disallow the CDN to cache responses for matching URLs.

    CORS

    The CORS setting controls the cross-origin resource sharing (CORS) header access-control-allow-origin in responses served by Medianova CDN edge servers.

    Option
    Description

    Custom Header

    Set the Custom Header Type to Default to have the CDN inherit the parent settings, as configured in the Headers tab in the Medianova Panel.

    Set the Custom Header Type to Custom to disable parent setting inheritance and customize the headers. Configure the CDN to manipulate headers in requests to origin, or to manipulate headers in responses the CDN sends to clients/browsers.

    Option
    Description

    Downloadable Query String Header

    Use the Downloadable Query String Header setting to trigger browsers to download a file instead of displaying it.

    In the page rule, toggle the setting on and specify a Downloadable Query String Header Key and a Downloadable Query String Header Value. For example, set the key to download and the value to yes to trigger a browser to download the file when it loads a URL with query string ?download=yes (and the URL matches on File Path and File Extension as configured in the page rule).

    The CDN will send the content-disposition response header with in its value the attachment attribute and the path to the file. For example, content-disposition: attachment; filename="manual.pdf"

    Exact Match

    Turn on Exact Match to disable recursive directory processing. For example, if the page rule has File Path /dir/ and Exact Match is enabled, only URLs for files in that exact directory will match, while with Exact Match off (default) the page rule would also take action for files in subdirectories like /dir/subdir/ .

    Hotlink Protection

    If Hotlink Protection is turned on in the parent setting in the Security tab, a new page rule will inherit its status and configuration. The Update a Page Rule screen then shows the Hotlink Protection toggle in the active state and the Hotlink Protection Type is set to Default.

    Change the Hotlink Protection Type to Custom to and confgure the Hotlink Protections that must apply to matching URLs.

    Options Request

    Turn on Options Request to have the CDN send edge-generated responses to requests with the OPTION method in case the origin does not respond to OPTION requests.

    Query String Caching

    While a new page rule inherits the parent setting for (as configured in the Caching tab in the Medianova Panel), you can customize the CDN query string caching behavior for matching URLs.

    Query String Caching in Page Rules has four options:

    Option
    Description

    Range Based Caching

    Page Rules allows you to enable/disable Range Based Caching for matching URLs, regardless of the parent setting for Range Based Caching (as configured in the Caching tab in the Medianova Panel)..

    Analytics

    Static CDN is primarily used for delivering fixed content, such as images, CSS files, and JavaScript files. These resources are typically unchanged, which allows for faster delivery through a CDN. The Static CDN Analytics section provides key metrics that help monitor, analyze, and optimize the performance of static content delivery. These metrics focus on the caching effectiveness, the amount of traffic being served from the cache versus the origin server, and the overall bandwidth usage.

    Traffic

    • Total Traffic: This chart displays the total amount of traffic delivered during a selected time range. Users can view the traffic over a custom time range or compare it with the previous time range to understand the trends and fluctuations in traffic. A significant increase in traffic indicates that the content is being accessed more frequently, which can be beneficial for scaling infrastructure and improving cache efficiency.

    • Traffic in Time: This chart provides insights into traffic variations over time. By analyzing traffic patterns, you can identify spikes in demand, possibly caused by promotions, seasonal events, or viral content. It also helps determine when content delivery peaks, assisting in optimizing server performance during high-traffic periods.

    • Cached vs Non-Cached: This chart compares traffic served from the cache versus traffic retrieved from the origin server. High cache traffic indicates that most of the data is being served efficiently from the CDN, reducing load on the origin server and speeding up delivery to end-users. A low cache hit ratio might indicate a need for better cache configuration or optimization.

    • Cached Data: This chart shows the breakdown of cached data into hits, updating, and stale categories:

      • Hits: Content successfully retrieved from the cache.

      • Updating: Content that is currently being updated in the cache.

      • Stale

    • Non-Cached Data: This chart shows the amount of data retrieved from the origin server, broken down into miss and expired categories:

      • Miss: Content that was not found in the cache and had to be fetched from the origin server.

      • Expired: Cached content that has expired and needs to be fetched again from the origin server. A higher proportion of non-cached data suggests that caching is not being utilized effectively, which could lead to higher latency and bandwidth usage.

    Bandwidth

    • Bandwidth: This chart shows the total bandwidth used for delivering static content. High bandwidth usage might indicate large file sizes or a high volume of requests, which can be optimized through compression, better cache utilization, or content delivery strategies.

    • Cached vs Non-Cached: This chart compares the bandwidth used for cached versus non-cached data. Ideally, cached data should consume most of the bandwidth, as it reduces the need for repetitive fetching from the origin server, resulting in faster load times and reduced network strain.

    Requests

    • Total Requests: This chart displays the total number of requests made for static content. A high number of requests indicates active content consumption, which is useful for monitoring content popularity and server load.

    • Hits vs Misses: This chart compares the number of requests that resulted in a cache hit versus a cache miss. A higher hit ratio is ideal, as it indicates that the CDN is effectively serving content from the cache, reducing the need to contact the origin server.

    • Request Hits: This chart shows detailed information on hits, broken down into hit, updating, stale, and revalidated categories:

      • Updating: The content is in the process of being updated.

      • Stale: The content is outdated and served while awaiting a response from the origin server.

    • Request Misses: This chart shows detailed information on misses, broken down into miss and expired categories:

      • Miss: The content was not found in the cache and was fetched from the origin server.

      • Expired: The cached content expired and had to be retrieved from the origin server again. Analyzing this data helps in understanding the reasons for cache misses and optimizing cache configurations.

    Tier Filter

    A Tier Filter dropdown is available next to the All Resources selector. This filter defines which CDN layers are included in the request data.

    Option
    Description

    Tooltips appear on hover for desktop and via an info icon on mobile. The selected filter is also reflected in exported reports.

    Example report titles: Requests – Edge only Requests – All

    API parameter: tier=edge or tier=all (default = edge)

    Status Codes

    • Total Requests: This chart displays the total number of requests, helping you track overall activity and performance.

    • Status Code Structure: This chart compares the distribution of different HTTP status codes:

      • 2xx: Successful responses (e.g., 200 OK).

    • Successful Responses (2xx): This chart shows the distribution of successful responses, particularly focusing on the 200 OK code and other 2xx codes. High 2xx responses indicate that the CDN is successfully delivering content.

    • Redirects (3xx): This chart displays the distribution of redirect codes (301, 302, etc.). Redirects can indicate changes in content location, which should be minimized for optimal performance.

    • Client Errors (4xx): This chart shows errors on the client side, such as 403 (Forbidden), 404 (Not Found), and 429 (Too Many Requests). A high number of client errors suggests that users are requesting unavailable content or facing access issues.

    • Server Errors (5xx): This chart shows server-side errors, such as 500 (Internal Server Error), 502 (Bad Gateway), and 504 (Gateway Timeout). These errors indicate issues on the origin server and require attention to ensure smooth content delivery.

    Tier Filter

    Status code metrics also reflect the selected Tier Filter. You can view codes for Edge only or include All CDN tiers. When All is selected, totals may increase because the same request can appear multiple times across tiers.

    Exported reports and visual charts indicate the active filter in their titles. API parameter: tier=edge or tier=all (default = edge)

    Error Logs

    Error logs provide a detailed record of requests that resulted in errors. By selecting a specific error code, users can view logs that include the request path, method, protocol, and hit status. The logs are invaluable for identifying patterns and resolving recurring issues in content delivery.

    Tier Filter

    The Tier Filter applies to all error log data. Users can toggle between Edge only and All, depending on whether they want to see only end-user–level errors or logs from all CDN layers.

    Selecting Edge only isolates actual user errors, while All shows cumulative errors from Edge, Mid, and Origin.

    API parameter: tier=edge or tier=all Default: edge

    curl -svo /dev/null "https://example.mncdn.com/" --compressed

    Cache Type

    Configure edge caching behaviour and TTL

    All

    CORS

    Configure cross-origin resource sharing headers

    All

    Custom Header

    Add or remove request and response headers

    All

    Downloadable Query String Header

    Trigger browser to download file

    All

    Exact Match

    Disable recursive URL matching

    All

    Hotlink Protection

    Configure specific hotlink protection

    Starter, Growth, Enterprise

    Options Request

    Enable OPTIONS requests

    All

    Query String Caching

    Configure specific query string caching

    All

    Range Based Caching

    Disable range based caching

    All

    On

    Edge servers use the settings of the Cors Header feature

    Off

    Edge servers forward the CORS header from origin

    Dynamic

    Outgoing CDN responses have the access-control-allow-origin: <origin> CORS header, where <origin> is the value of the Origin header in the incoming request

    Add Origin Request Header

    Add header to requests to origin

    Remove Origin Request Header

    Remove header from requests to origin

    Add CDN Response Header

    Add header to outgoing CDN responses

    Remove CDN Response Header

    Remove header from outgoing CDN responses

    Retain All

    Query string is part of the cache key. /image.jpg?123 is cached separately from /image.jpg?456

    Ignore All

    All query string parameters are ignored. /image.jpg?123 and /image.jpg?456 are considered the same response

    Retain Specific

    Only the specified query string parameters are included in the cache key

    Ignore Specific

    The specified query string parameters are ignored when determining the cache key

    Query String Caching
    Hotlink Protection screen in Page Rules
    : Content served from the cache that is outdated because the origin server did not respond in time. These metrics are crucial for understanding cache freshness and the efficiency of the content delivery process.
    Revalidated
    : The cached content has been successfully revalidated with the origin server and is now fresh. These metrics provide insights into the cache's efficiency and freshness.
    3xx
    : Redirects (e.g., 301, 302).
  • 4xx: Client errors (e.g., 404, 403).

  • 5xx: Server errors (e.g., 500, 502). Monitoring these status codes helps identify potential issues in content delivery and client-side or server-side errors.

  • Edge only (default)

    Displays requests from end users. Excludes internal CDN tiers.

    All

    Displays total requests from Edge + Mid + Origin layers. May include repeated counts of the same request across tiers.

    Host Header

  • (Optional) Origin SNI Request, Priority, and Weight if you add multiple origins.

  • CNAME

    FAQs

    How does Medianova’s DDoS protection work?

    Medianova’s DDoS protection works through integrated strategies like rate limiting, IP blocking, geoblocking, Anycast DNS, Origin Shield, and WAF integration to prevent overload, block threats, and protect your origin server.

    Does CDN Reduce DDoS Attacks?

    Yes, a CDN reduces DDoS attacks by distributing traffic across multiple servers, using Anycast DNS, rate limiting, and shielding the origin server. It minimizes the attack impact and improves resilience.

    Do I need to manually activate DDoS protection on Medianova?

    Medianova’s Always-On DDoS Protection is active by default, providing automatic protection for your web assets against common DDoS attack types, including DNS Query Floods, SlowLoris, HTTPS GET requests, and HTTPS POST requests. No additional activation or manual configuration is required.

    What types of SSL certificates are supported by Medianova CDN?

    Medianova CDN supports a wide range of SSL certificates, including:

    • Wildcard SSL Certificates

    • SAN-supported SSL Certificates

    • Code Signing SSL Certificates

    • Domain SSL, Organization Validated SSL, and Extended SSL Certificates

    How can I upload and manage SSL Certificates?

    Yes, it is possible. For detailed instructions, please refer to the "How to Upload and Manage SSL Certificates" documentation.

    What file formats are supported for SSL certificates?

    Medianova supports standard SSL certificate formats, including .crt for certificates and .key for private keys.

    Can I add multiple SSL certificates to my organization?

    Yes, you can add multiple SSL certificates to your organization. Each certificate can be associated with different resources or domains.

    How can I use Free SSL?

    Yes, you can use Free SSL. For detailed steps, please refer to the "How Can I Use Free SSL?" documentation.

    Does Medianova support TLS 1.3?

    Yes, Medianova CDN supports TLS 1.3, the latest version of the TLS protocol, which offers enhanced security and faster performance compared to its predecessors.

    What are the differences between “SNI” and “Shared SSL”?

    SNI (Server Name Indication): This option allows you to use your own SSL certificate uploaded via the panel for a specific CDN Resource.

    Shared SSL: If you don’t have your own SSL certificate, Medianova provides a shared SSL option that can be used for secure connection

    Can I edit an uploaded SSL certificate?

    You can only rename an SSL certificate in the SSL Management menu. Other edits, such as updating the certificate or private key, are not allowed. If changes are needed, delete the existing certificate and upload a new one.

    How do I delete an SSL certificate?

    To delete an SSL certificate:

    1. Go to “CDN → SSL Management”.

    2. Click on the “Delete” option next to the certificate.

    3. Confirm the action in the pop-up window that appears.

    What is a Private Key, and why is it important?

    The Private Key is a critical part of the SSL certificate that ensures secure communication. It is based on asymmetric encryption and must be kept secret:

    • The Private Key stays on the web server and is never shared.

    • The Public Key is shared openly to establish secure communication.

    What happens if I don’t own an SSL certificate?

    If you don’t have your own SSL certificate, you can:

    • Use the “Shared SSL” option provided by Medianova.

    • Utilize the “Free SSL” option, which generates a certificate through Let’s Encrypt.

    What is the difference between "Monitoring Only" and "On" modes in WAF?
    • Monitoring Only: In this mode, WAF monitors all incoming traffic for potential threats without blocking any traffic. It provides insights into your security posture and allows you to fine-tune rules before enforcing them.

    • On: In this mode, WAF actively filters and blocks malicious traffic, providing full protection for your web assets.

    Can I view real-time threats blocked by WAF?

    Yes, the WAF service provides real-time monitoring and logging of blocked threats, which can be viewed under Analytics → WAF in the panel.

    Can I configure WAF for Dynamic CDN Resources?

    Yes, you can configure the WAF for Dynamic CDN Resources. When creating a Dynamic CDN Resource, follow the steps to activate and configure the WAF as per your security requirements.

    How do I create a custom rule in WAF?

    To create a custom rule in WAF, please refer to the "How to Activate WAF" documentation for detailed guidance.

    How can I handle false positives in WAF?

    To handle false positives in WAF, enable Monitoring-Only mode to analyze traffic. Disable the specific rule causing the issue or create custom rules to prevent it, ensuring security remains intact.

    Can I edit or delete a custom rule in WAF?

    Yes, you can edit or delete custom rules by clicking the Edit or Delete icons and submitting the changes.

    How can I configure Rate Limiting?

    To configure Rate Limiting, please refer to the "Rate Limiting" documentation for detailed steps, where you will find instructions on how to log in, select resources, and configure settings in the Security tab.

    How do I set the request limits?

    Under the Request Limit section, specify the maximum number of requests allowed per second or minute.

    Adjust the values based on your traffic volume and server capacity.

    What is the difference between the "Burst" and "Burst + No Delay" options?

    Burst allows a burst of requests but applies throttling once the threshold is exceeded.

    Burst + No Delay allows a burst of requests without any initial delay, providing quicker responsiveness before applying throttling.

    What is the "Burst Value" and how is it used?

    The Burst Value defines the threshold for the burst limit when the Burst or Burst + No Delay option is selected. It specifies how many requests are allowed in a burst before throttling is applied.

    What HTTP status codes can be configured for Rate Limiting?

    You can choose one of the following HTTP status codes to return when the rate limit is exceeded:

    • 429 Too Many Requests: Indicates that the client has exceeded the allowed number of requests within the specified time window.

    • 529 Site Overloaded: Used when the server is overloaded and unable to process requests due to excessive traffic.

    How can I define actions for excessive requests?
    • Block: Deny requests that exceed the rate limit.

    • Challenge: Present a CAPTCHA to validate the request.

    How can I enable Hotlink Protection for my CDN Resource?

    To enable Hotlink Protection, please refer to the "Hotlink Protection" documentation for detailed instructions on configuring it in the Medianova Cloud Panel.

    How do I whitelist domains for Hotlink Protection?

    In the Hotlink Protection section, you can add whitelisted domains that are allowed to access your CDN resources.

    These domains will be granted permission to link to or embed your resources.

    What happens if a request comes from a non-whitelisted domain?

    If a request comes from a non-whitelisted domain (i.e., a blacklisted or unauthorized source), the server will:

    • Block access to the resource.

    • Optionally, you can configure the server to redirect the request to a specific page or serve a placeholder image.

    How can I disable Hotlink Protection?

    If you want to disable Hotlink Protection, simply toggle the Hotlink Protection option to Off in the Security menu of your selected CDN Resource.

    What is the difference between Whitelist and Blacklist?

    Whitelist: Only devices with IP addresses listed in the whitelist are allowed access to the designated resources. All other IP addresses are denied access.

    Blacklist: Devices with IP addresses listed in the blacklist are denied access to the resources. All other devices are allowed access.

    What happens if an IP address is not in the Whitelist or Blacklist?

    If Whitelist is selected, only the listed IP addresses will have access, and all other IP addresses will be denied.

    If Blacklist is selected, all IP addresses except those in the blacklist will have access to the resources

    Why would I use the Whitelist option?

    You would use the Whitelist option if you want to grant access to specific, trusted IP addresses (e.g., business partners, internal network) and deny all other requests.

    Why would I use the Blacklist option?

    The Blacklist option is useful if you want to block specific IP addresses that are known for malicious activity or unwanted access, while allowing all other devices to access the resources.

    What happens if I make changes to the IP Restriction ACL settings?

    After making changes to the IP Restriction ACL settings, click Save Changes to apply the new access control policy. The changes will immediately take effect.

    How do I enable Geoblocking on Medianova Cloud Panel?

    To enable Geoblocking, please refer to the "Geoblocking" documentation for detailed steps on configuring country-based restrictions in the Medianova Cloud Panel.

    Can I update my Geoblocking settings after enabling it?

    Yes, you can update your whitelist and blacklist at any time. Simply move the countries between the whitelist and blacklist boxes, and click Save Changes to apply the updates.

    Can I block or allow specific IP addresses using Geoblocking?

    Yes, in addition to country-based restrictions, you can also manage IP-based restrictions. Scroll to the IP Restriction section at the bottom of the page to whitelist or blacklist specific IP addresses.

    How do I add or remove countries from the whitelist or blacklist?

    To add a country, drag it from the country list on the left to either the Whitelist or Blacklist pane.

    To remove a country, simply drag it out of the whitelist or blacklist pane and into the country list.

    Can I apply Geoblocking to a specific CDN resource?

    Yes, Geoblocking can be applied to individual CDN resources. You can configure the settings for each CDN resource separately.

    Can I enable Geoblocking without using the IP Restriction section?

    Yes, you can enable Geoblocking without using the IP Restriction section. The IP Restriction section is optional and can be used for more granular control over access.