arrow-left

Only this pageAll pages
gitbookPowered by GitBook
triangle-exclamation
Couldn't generate the PDF for 245 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Knowledge Base

Loading...

Getting Started

Loading...

Loading...

Products

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Extract CRT and KEY Files from a PFX Certificate

Learn how to extract .crt and .key files from a .pfx certificate using OpenSSL.

A .pfx (PKCS#12) file contains your public certificate, private key, and intermediate certificates bundled together. This guide explains how to extract the certificate (.crt) and private key (.key) using a simple Bash script with OpenSSL.

hashtag
Prerequisites

Before you begin:

  • A valid .pfx file provided by the customer.

  • The password for the .pfx file.

  • OpenSSL installed on your local machine.

  • (Optional) Rename the file for clarity using this format: &#xNAN;domain.pfx — for example: medianova_com.pfx.

1

hashtag
Create the Extraction Script

Create a new Bash script file named extract-cert.sh and copy the following commands:

#!/bin/bash
# Usage: ./extract-cert.sh <pfx-password>

# 1. Extract encrypted private key
openssl pkcs12 -in domain.pfx -nocerts -out encrypted-domain.key -passin pass:$1 -passout pass:$1

# 2. Decrypt the private key
openssl rsa -in encrypted-domain.key -out domain.key -passin pass:$1

# 3. Extract public certificate
openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.crt -passin pass:$1

# 4. Verify that the certificate and key match
first=$(openssl x509 -in domain.crt -modulus -noout | openssl md5)
second=$(openssl rsa -in domain.key -modulus -noout | openssl md5)

if [[ "$first" == "$second" ]]; then
    echo "✅ Certificate and Key match."
else
    echo "❌ Mismatch between certificate and key."
fi

Save and close the file.

circle-info

Replace domain.pfx with your actual filename (e.g., medianova_com.pfx).

2

hashtag
Make the Script Executable

Run the following command to make the script executable:

3

hashtag
Run the Script

Execute the script using your .pfx password as an argument:

circle-info

4

hashtag
Files Generated

After running the script, three files will be generated:

File Name
Description
5

hashtag
Verify the Output

If extraction is successful, you’ll see one of the following messages in your terminal:

If the certificate and private key do not match:

circle-info

This procedure automates the extraction of certificate and key files from .pfx bundles. You can now use the generated .crt and .key files to upload your own SSL certificate in the Medianova Control Panelarrow-up-right.

Page Rules Settings

Learn about the actions Medianova CDN can take based on a page rule, and the configuration options for each setting.

Settings control the actions Medianova CDN takes once a request matches the URL pattern defined in a page rule.

The table below outlines all settings available in Page Rules from the Medianova Control Panelarrow-up-right.

circle-info

Medianova can implement custom page rule configuration at your request, for example network rate limit and security headers.

Setting
Description
Packages

Configure edge caching behaviour and TTL

All

Configure cross-origin resource sharing headers

All

Add or remove request and response headers

All

hashtag
Cache Type

Use the Cache Type setting to control CDN caching.

Select Edge to specify how long the CDN may cache responses.

Select Origin to instruct the CDN to determine the maximum cache duration from origin response headers cache-control or expires .

Select Dynamic to disallow the CDN to cache responses for matching URLs.

hashtag
CORS

The CORS setting controls the cross-origin resource sharing (CORS) header access-control-allow-origin in responses served by Medianova CDN edge servers.

Option
Description

On

Edge servers use the settings of the feature

Off

Edge servers forward the CORS header from origin

Dynamic

Outgoing CDN responses have the access-control-allow-origin: <origin> CORS header, where <origin> is the value of the Origin header in the incoming request

hashtag
Custom Header

Set the Custom Header Type to Default to have the CDN inherit the parent settings, as configured in the Headers tab in the Medianova Panel.

Set the Custom Header Type to Custom to disable parent setting inheritance and customize the headers. Configure the CDN to manipulate headers in requests to origin, or to manipulate headers in responses the CDN sends to clients/browsers.

Option
Description

Add Origin Request Header

Add header to requests to origin

Remove Origin Request Header

Remove header from requests to origin

Add CDN Response Header

Add header to outgoing CDN responses

hashtag
Downloadable Query String Header

Use the Downloadable Query String Header setting to trigger browsers to download a file instead of displaying it.

In the page rule, toggle the setting on and specify a Downloadable Query String Header Key and a Downloadable Query String Header Value. For example, set the key to download and the value to yes to trigger a browser to download the file when it loads a URL with query string ?download=yes (and the URL matches on File Path and File Extension as configured in the page rule).

The CDN will send the content-disposition response header with in its value the attachment attribute and the path to the file. For example, content-disposition: attachment; filename="manual.pdf"

hashtag
Exact Match

Turn on Exact Match to disable recursive directory processing. For example, if the page rule has File Path /dir/ and Exact Match is enabled, only URLs for files in that exact directory will match, while with Exact Match off (default) the page rule would also take action for files in subdirectories like /dir/subdir/ .

hashtag
Hotlink Protection

If Hotlink Protection is turned on in the parent setting in the Security tab, a new page rule will inherit its status and configuration. The Update a Page Rule screen then shows the Hotlink Protection toggle in the active state and the Hotlink Protection Type is set to Default.

Change the Hotlink Protection Type to Custom to and confgure the Hotlink Protections that must apply to matching URLs.

Hotlink Protection screen in Page Rules

hashtag
Options Request

Turn on Options Request to have the CDN send edge-generated responses to requests with the OPTION method in case the origin does not respond to OPTION requests.

hashtag
Query String Caching

While a new page rule inherits the parent setting for Query String Caching (as configured in the Caching tab in the Medianova Control Panelarrow-up-right), you can customize the CDN query string caching behavior for matching URLs.

Query String Caching in Page Rules has four options:

Option
Description

Retain All

Query string is part of the cache key. /image.jpg?123 is cached separately from /image.jpg?456

Ignore All

All query string parameters are ignored. /image.jpg?123 and /image.jpg?456 are considered the same response

Retain Specific

Only the specified query string parameters are included in the cache key

hashtag
Range Based Caching

Page Rules allows you to enable/disable Range Based Caching for matching URLs, regardless of the parent setting for Range Based Caching

(as configured in the Caching tab in the Medianova Control Panelarrow-up-right).

Trigger browser to download file

All

Exact Match

Disable recursive URL matching

All

Hotlink Protection

Configure specific hotlink protection

Starter, Growth, Enterprise

Options Request

Enable OPTIONS requests

All

Query String Caching

Configure specific query string caching

All

Range Based Caching

Disable range based caching

All

Remove CDN Response Header

Remove header from outgoing CDN responses

Ignore Specific

The specified query string parameters are ignored when determining the cache key

Cache Type
CORS
Custom Header
Downloadable Query String Header
Cors Header

Origin SNI Request

Learn how Origin SNI Request controls the SNI value used when the CDN establishes TLS connections for dynamic traffic.

The Origin SNI Request feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It ensures the CDN includes the correct Server Name Indication (SNI) during the TLS handshake when forwarding dynamic HTTPS requests to your origin. This enables the origin server to select the appropriate SSL certificate and prevents certificate mismatch issues in multi-domain environments.

For configuration details, expected behavior, and examples, refer to the main documentation: Learn more in the Origin SNI Request documentation.

Caching

Edge Cache Expiration

Learn how Edge Cache Expiration determines caching behavior and freshness for dynamic content at CDN edge servers.

The Edge Cache Expiration feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It defines how the CDN caches objects at the edge and how long cached responses remain valid before refreshing from the origin. You can configure cache modes that rely on Panel-defined TTL values, defer to origin headers, or disable caching entirely for dynamic workloads.

For configuration details, cache modes, and examples, refer to the main documentation: Learn more in the Edge Cache Expiration documentation.

Browser Cache Rule

Learn how Browser Cache Rules define how long dynamic content remains cached in the visitor’s browser.

The Browser Cache Rule feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It controls browser-side caching by defining cache duration, cache modes, and rule priorities for different URL patterns, directories, or file types. These rules determine how browsers store and revalidate dynamic content, independent of CDN edge caching behavior.

For configuration details, rule types, and examples, refer to the main documentation: Learn more in the Browser Cache Rule documentation.

Query String Caching

Learn how Query String Caching defines cache key behavior for dynamic URLs containing query parameters.

The Query String Caching feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It determines how the CDN evaluates query parameters when generating cache keys, allowing you to cache each query string variant separately, ignore specific parameters, or build cache keys using only selected values. These configurations provide granular control over caching behavior for dynamic endpoints, APIs, and personalized content.

For configuration details, caching modes, and examples, refer to the main documentation: Learn more in the Query String Caching documentation.

Etag Verification

Learn how ETag Verification ensures cached dynamic content remains consistent with the origin.

The ETag Verification feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It compares the ETag value returned by the origin with the ETag of the cached object and refreshes the cache when a mismatch occurs. This ensures the CDN serves the most up-to-date version of dynamic content and prevents stale objects from being delivered to end users.

For configuration details, validation behavior, and examples, refer to the main documentation: Learn more in the ETag Verification documentation.

Error Status Code Cache Expiration

Learn how Error Status Code Cache Expiration defines caching duration for error responses in dynamic workloads.

The Error Status Code Cache Expiration feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It allows you to define custom cache durations for specific HTTP error codes so the CDN can temporarily store repeated error responses, reducing unnecessary load on the origin. Each status code can have its own TTL, and caching can be enabled or disabled per code based on your requirements.

For configuration details, supported behaviors, and examples, refer to the main documentation: Learn more in the Error Status Code Cache Expiration documentation.

Shared Cache

Learn how Shared Cache defines whether dynamic content is cached independently or shared across accounts.

The Shared Cache feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It determines whether CDN edge nodes use an isolated cache namespace for your account (Default) or a shared cache namespace across multiple accounts that use the same Domain Cache Key (Share). When shared mode is enabled, identical content is cached once and reused across participating accounts, improving efficiency and reducing redundant origin requests.

For configuration details, cache modes, and examples, refer to the main documentation: Learn more in the Shared Cache documentation.

Stale Cache

Learn how Stale Cache enables serving previously cached dynamic content when the origin becomes temporarily unavailable.

The Stale Cache feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It allows CDN edge servers to deliver the last cached version of an object when the origin fails to respond or returns specific error codes. You can define which origin conditions—such as timeouts, invalid headers, or 5xx errors—trigger stale delivery. This improves availability for dynamic workloads during short-term origin instability.

For configuration details, supported triggers, and examples, refer to the main documentation: Learn more in the Stale Cache documentation.

Security

Performance / CDN

Origin Settings

Advanced Configuration

Caching

Replace yourPFXpassword with the actual password for your .pfx file. The script automatically validates whether the .crt and .key match.

domain.crt

Public certificate.

domain.key

Unencrypted private key.

encrypted-domain.key

Encrypted private key (temporary, can be deleted).

If you see a mismatch error, verify the .pfx file and password before re-running the script.

chmod +x extract-cert.sh
./extract-cert.sh yourPFXpassword
✅ Certificate and Key match.
❌ Mismatch between certificate and key.

Disallow Cookie Base Cache

Control CDN caching behavior by excluding requests that contain specific cookie values.

The Disallow Cookie-Based Cache feature allows you to bypass CDN caching for requests that include defined cookie key–value pairs. This ensures that personalized or session-based content is always fetched from the origin instead of being served from cache.

Use this feature to prevent incorrect caching of dynamic responses while maintaining optimal cache efficiency for all other traffic.

circle-info

This helps you avoid caching personalized or session-based responses on Dynamic Content Acceleration resources.

hashtag
How Disallow Cookie-Based Cache Works

When the feature is enabled:

  • The CDN inspects incoming requests for the configured cookie key–value pairs.

  • If any defined pair matches, the request bypasses the cache.

  • The response is fetched directly from the origin and is not stored in the CDN cache.

This behavior applies consistently across all requests for the selected CDN Resource.

hashtag
Configure Disallow Cookie-Based Cache

You can configure this feature from the .

1

Enable the Feature

In the Caching tab of your Dynamic CDN Resource, set Disallow Cookie-Based Cache to On.

The cookie rule inputs become available.

2

Define Cookie Rules

  • Cache bypass is triggered if any defined cookie rule matches.

  • Cookie matching is exact; both key and value must match.

  • This feature affects cache eligibility only and does not modify headers or routing logic.

hashtag
Troubleshooting

Issue: Responses are still cached. Cause: The incoming cookie value does not exactly match the configured key-value pair. Fix: Capture the request cookies from the client and confirm the exact key and value.

Issue: Cache hit ratio drops unexpectedly. Cause: Too many cookie pairs are configured, or a widely present cookie is included. Fix: Remove non-essential cookies and keep only cookies that must bypass cache.

Issue: Configuration does not take effect. Cause: Changes were not saved. Fix: Confirm you selected Submit and re-check the setting state in the Caching tab.

Cookie Base Cache

Control CDN caching behavior by varying cache entries based on specific cookie values.

The Cookie Base Cache feature allows you to include selected cookies in the CDN cache key for Dynamic Content Acceleration resources. This ensures that different user sessions or states receive the correct cached response without disabling caching entirely.

circle-info

This feature is available only for Dynamic CDN Resources.

hashtag
How Cookie Base Cache Works

When Cookie Base Cache is enabled:

  • The CDN inspects incoming requests for the configured Cookie Key values.

  • The specified cookies are included as part of the cache key.

  • Requests with different cookie values are cached separately.

This allows dynamic and personalized content to be cached safely without serving incorrect responses across users.

hashtag
Configure Cookie Base Cache

You can configure this feature from the .

1

Open the Caching Settings

Go to CDN → CDN Resources, select a Dynamic CDN Resource, and open the Caching tab.

2

Enable Cookie Base Cache

Set Status to On.

  • Each unique cookie value creates a separate cache entry.

  • Cookie matching is based on the cookie name only; values are evaluated dynamically.

  • This feature affects cache key generation, not cache bypass.

hashtag
Common Use Cases

  • Cache dynamic pages per user role or session type

  • Serve different cached responses for logged-in vs logged-out users

  • Safely cache HTML or JSON responses that depend on cookie state

Header Base Cache

Control CDN caching behavior by varying cache entries based on specific HTTP request headers.

The Header Base Cache feature allows you to include selected HTTP request headers in the CDN cache key for Dynamic Content Acceleration resources.

This enables the CDN to create separate cached objects for different header combinations, ensuring correct delivery of dynamic or personalized content without disabling caching.

circle-info

This feature is available only for Dynamic CDN Resources.

hashtag
How Header Base Cache Works

When Header Base Cache is enabled:

  • The CDN inspects incoming requests for the configured HTTP header keys.

  • The specified headers and their values are included in the cache key.

  • Requests with different header values are cached as separate variants.

This approach allows safe caching of responses that vary based on request headers such as language, device hints, or custom application headers.

hashtag
Configure Header Base Cache

You can configure this feature from the .

1

Open the Caching Settings

Log in to the Medianova Control Panel, navigate to CDN → CDN Resources, select a Dynamic CDN Resource, and open the Caching tab.

2

Enable Header Base Cache

Set

  • Each unique header value creates a separate cache entry.

  • Header matching is based on the header name; values are evaluated dynamically.

  • This feature affects cache key generation, not cache bypass behavior.

hashtag
Common Use Cases

  • Cache responses per language using Accept-Language

  • Separate cache entries for feature flags or tenant identifiers

  • Cache dynamic HTML or JSON responses that vary by request metadata

Header Value Base Cache

Control CDN caching behavior by allowing or denying cache based on specific HTTP header name–value pairs.

The Header Value Base Cache feature allows you to explicitly allow or deny caching when a request contains a specific HTTP header value. This provides precise control over caching behavior for Dynamic Content Acceleration resources where certain header values determine whether content should be cached.

circle-info

This feature is available only for Dynamic CDN Resources.

hashtag
How Header Value Base Cache Works

When Header Value Base Cache is enabled:

  • Medianova CDN inspects incoming requests for the configured Header and Value.

  • If the request matches the defined rule:

    • Allow — the response is eligible for caching.

This mechanism allows cache decisions to be enforced conditionally, rather than only by cache key variation.

hashtag
Configure Header Value Base Cache

You can configure this feature from the .

1

Open the Caching Settings

Log in to the Medianova Control Panel, navigate to CDN → CDN Resources, select a Dynamic CDN Resource, and open the Caching tab.

2

Enable Header Value Base Cache

Set

  • Only one header value-based rule can be active at a time.

  • Header matching is exact; both header name and value must match.

  • This feature controls cache eligibility, not cache key variation.

hashtag
Common Use Cases

  • Prevent caching when a request contains a debug or preview header

  • Allow caching only when a specific feature-flag header is present

  • Enforce cache bypass for internal or authenticated traffic

  • Control caching behavior based on application-specific headers

MNUID Cookie Base Cache

Learn how to configure MNUID Cookie Base Cache for Dynamic CDN Resources to create session-aware cached content.

MNUID Cookie Base Cache generates separate cached versions of content based on the MNUID cookie value for Dynamic Content Acceleration resources.

This feature enables session-aware caching while maintaining control over cache lifetime through configurable expiry settings.

circle-info

This feature is available only for Dynamic CDN Resources.

hashtag
How MNUID Cookie Base Cache Works

When MNUID Cookie Base Cache is enabled:

  • Medianova CDN checks incoming requests for the MNUID cookie.

  • The value of the MNUID cookie is included in the cache key.

  • Requests with different MNUID values are cached as separate variants.

This mechanism allows session-aware caching while maintaining control over cache lifetime.

hashtag
Configure MNUID Cookie Base Cache

You can manage MNUID Cookie Base Cache using the .

1

Open the Caching Settings

Log in to the Medianova Control Panel, navigate to CDN → CDN Resources, select a Dynamic CDN Resource, and open the Caching tab.

2

Enable MNUID Cookie Base Cache

Set Status to On.

  • Each unique MNUID value creates a separate cache entry.

  • Cache variation is based on the cookie value, not just its presence.

  • Cookie Expiry Time controls cache validity independently of origin headers.

hashtag
Common Use Cases

  • Cache dynamic pages per authenticated user session

  • Improve performance for logged-in users while maintaining correctness

  • Control cache lifetime for session-based personalization

  • Reduce origin load for frequently accessed user-specific content

Welcome to the Medianova Knowledge Base

Comprehensive CDN documentation and API references, with integration, troubleshooting, and developer guides across all Medianova services.

hashtag

Learn how to integrate and optimize your workflows with our detailed API documentation.

Requests that do not match any configured cookie rules continue to follow normal caching logic.
Enter the cookie details:
  • Cookie Key — Name of the cookie to match

  • Cookie Value — Value that triggers cache bypass

Select + to add additional cookie rules if required.

3

Save changes

Select Submit to save and apply the changes.

Requests that do not include matching cookies continue to benefit from CDN caching.
  • Use carefully together with Page Rules to avoid unintended cache bypass.

  • Medianova Control Panelarrow-up-right
    Requests that do not include the configured headers follow the default cache behavior.
    Status
    to
    On
    .

    The header input field becomes active.

    3

    Add Request Headers

    Enter the header information:

    • Header Key — Name of the HTTP request header to include in the cache key

    Select the + button to add additional header keys if required.

    4

    Apply the Configuration

    Select Submit to save and apply the changes.

    Adding too many headers may increase cache fragmentation and reduce cache efficiency.
  • Header Base Cache can be combined with Cookie Base Cache and Disallow Cookie Base Cache for advanced cache control strategies.

  • Support multi-tenant or region-aware applications
    Medianova Control Panelarrow-up-right
    Deny — the response bypasses the cache and is fetched from the origin.
  • Requests that do not match the rule follow the default caching behavior.

  • Status
    to
    On
    .
    3

    Select the Rule Type

    Choose the behavior for matching requests:

    • Allow — matching requests are cached

    • Deny — matching requests bypass the cache

    4

    Define the Header Rule

    Enter the rule parameters:

    • Header — Name of the HTTP request header

    • Value — Header value to match

    5

    Apply the Configuration

    Select Submit to save and apply the changes.

    Can be combined with Header Base Cache and Cookie Base Cache for advanced caching strategies.
  • Incorrect use of Deny may significantly reduce cache hit ratio.

  • Medianova Control Panelarrow-up-right

    Concepts

    hashtag
    Introduction

    Medianova is a global provider of Content Delivery Network (CDN) and cloud security services designed to accelerate and secure digital experiences. With over 50 data centers across 21 countries, it helps businesses deliver fast, reliable websites, applications, and APIs while ensuring high performance and robust security.

    hashtag
    Key Services and Concepts

    1. CDN (Content Delivery Network) A CDN optimizes content delivery by distributing it across multiple servers around the world. Medianova's CDN service ensures that content such as images, stylesheets, and scripts are delivered efficiently by caching static assets at strategically located servers. This minimizes latency and improves page load times for users.

    2. Static CDN The Static CDN service is specifically designed to optimize the delivery of static content. By caching assets globally, it ensures that users receive content from the nearest server, drastically reducing load times and enhancing performance. Integration is simple, with users needing only to update asset URLs and configure settings via the Medianova platform.

    3. Dynamic Content Caching Dynamic content, generated per user request, can be resource-intensive. Medianova's microcaching system allows for caching dynamic content (e.g., API responses or web pages) for brief periods, thus reducing server load and improving page speeds. This helps reduce bandwidth costs while enhancing the user experience.

    4. Live Streaming Medianova provides high-quality live streaming with adaptive streaming technology. This ensures optimal video quality across devices, from desktop to mobile, while maintaining seamless playback. The platform integrates with major social media platforms for broader reach. Security features, including encryption and access controls, ensure that content is protected and accessible only to authorized users.

    5. Private CDN For organizations requiring greater control, the Private CDN offers flexible, secure, and high-performance content delivery. It provides businesses with tailored solutions that allow enhanced security and content distribution management.

    6. Image Optimization Medianova offers real-time image optimization. This feature allows on-the-fly image transformations such as resizing, cropping, and watermarking through simple URL calls. It also supports responsive images, ensuring that content is tailored for different devices and screen sizes, contributing to faster load times and better user experiences.

    7. Stook - Cloud Object Storage Stook is Medianova's cloud object storage solution that enables businesses to store, manage, and retrieve data quickly and reliably. It is S3-compatible and eliminates the traditional barriers of egress and transaction fees, making it a cost-effective choice for scalable storage needs.

    8. SSL Encryption Secure Socket Layer (SSL) ensures encrypted communication between a server and a client. Websites with SSL certificates are considered secure, and this encryption is critical for e-commerce platforms, where security is a primary concern for users.

    9. Medianova WAF (Web Application Firewall) Medianova's WAF actively monitors all incoming web traffic to detect and block malicious patterns before they can affect web assets. With predefined Managed Rules, enabling these rules offers immediate protection against various security threats.

    10. DDoS Protection Medianova's DDoS protection system is always active, offering continuous defense against common attack types, such as DNS Query Floods, SlowLoris, and HTTP floods. It includes several mitigation strategies, including rate limiting, IP blocking, and geoblocking, ensuring minimal disruption to services during attacks.

    hashtag
    Conclusion

    Medianova combines advanced caching, acceleration, and security features to help businesses create fast, reliable, and secure digital solutions. With global infrastructure, robust security, and easy integration, Medianova empowers businesses to deliver superior user experiences while ensuring high performance and protection against a wide range of threats.

    Website Framework Integrations

    Requests without the configured cookies follow the default cache behavior.
    The cookie input field becomes active.
    3

    Define Cookies

    Enter the cookie name:

    • Cookie Key — Name of the cookie to include in the cache key

    Use the + button to add multiple cookie keys if required.

    4

    Apply the Configuration

    Select Submit to save and apply the changes.

    Use together with Disallow Cookie Base Cache for advanced session-aware caching strategies.
  • Adding too many cookies may increase cache fragmentation.

  • Medianova Control Panelarrow-up-right
    Cached responses remain valid for the duration defined in Cookie Expiry Time.
  • After the expiry time elapses, the cached content is refreshed from the origin.

  • 3

    Set the Cookie Expiry Time

    Enter the Cookie Expiry Time in seconds.

    This value defines how long cached content remains valid for requests that include the MNUID cookie.

    4

    Apply the Configuration

    Select Submit to save and apply the changes.

    Setting a very short expiry time may reduce cache efficiency.
  • This feature affects cache key generation, not cache bypass.

  • Can be combined with Cookie Base Cache and Header Base Cache for advanced session-aware caching strategies.

  • Medianova Control Panelarrow-up-right
    Discover Our API Documentationarrow-up-right
    Cover

    Security

    Cover

    Performance

    Cover

    Storage

    DDoS Protection

    Protect your applications and APIs from volumetric and protocol-based attacks with Medianova’s multi-layer, always-on DDoS mitigation system.

    A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic by overwhelming a target system or network with excessive requests. Medianova’s DDoS Protection automatically detects and mitigates these attacks without requiring any manual activation. From rate limiting to IP and Geo blocking, Medianova ensures uninterrupted availability even under heavy attack conditions.

    hashtag
    How Medianova DDoS Protection Works

    Medianova integrates several protection layers designed to stop attacks before they impact your services.

    Medianova DDoS Protection Architecture

    hashtag
    Always-On Defense

    Your DDoS protection is active by default. There is no need for additional setup — your web assets are continuously monitored and protected against common attack types such as:

    • DNS Query Floods

    • Slowloris Attacks

    • HTTPS GET / POST Floods

    hashtag
    Anycast DNS Infrastructure

    Medianova’s global distributes thousands of requests across multiple servers. This prevents traffic overload on a single endpoint and mitigates large-scale network floods.

    circle-exclamation

    Anycast DNS not only improves security but also reduces latency by routing users to the nearest edge location.

    hashtag
    IP and Origin Protection

    You can reduce the risk of DDoS threats by concealing your origin IP before an attack begins. Medianova provides an extra layer of protection through Secure Cloud, limiting exposure of your origin infrastructure and filtering harmful traffic before it reaches your servers.

    Warning: Exposing your origin IP directly allows attackers to bypass DDoS mitigation layers.

    hashtag
    Rate Limiting and Geo Blocking

    Edge-level rate limiting and Geo-based filtering restrict malicious or excessive traffic patterns. This ensures that legitimate users maintain access while harmful requests are dropped early in the network path.

    hashtag
    WAF Integration

    When combined with Medianova’s , DDoS Protection forms a complete multi-layer defense system. This integration protects not only against volumetric attacks but also against application-layer threats, such as bot floods or malicious payloads targeting web applications.

    hashtag
    Best Practices

    • Conceal your origin IP using Secure Cloud or Origin Shield.

    • Combine DDoS Protection with WAF for enhanced multi-layer defense.

    • Keep critical DNS zones under to distribute load globally.

    Medianova DDoS Protection delivers continuous and intelligent protection against both volumetric and application-layer attacks. By combining global Anycast DNS distribution, adaptive rate limiting, and origin shielding, Medianova ensures your online services remain fast, secure, and always available.

    Web Application Firewall (WAF)

    Protect your web applications from common exploits and malicious traffic with Medianova’s Web Application Firewall (WAF).

    WAF is Medianova’s intelligent web security layer that protects your applications from malicious traffic, bots, and exploits. With real-time filtering, custom rule control, and built-in analytics, it helps you prevent attacks before they reach your origin servers.

    hashtag
    Why Choose WAF?

    Medianova WAF combines ease of use, robust protection, and edge-level performance to keep your web applications secure. Unlike standard firewalls, WAF protects against both network and application-layer attacks.

    • Edge-level protection – All traffic is filtered at Medianova’s global CDN edge before it reaches your origin.

    • Managed Rules – Constantly updated rulesets by Medianova’s Security Team, including OWASP Top 10 protections.

    • Custom Rules – Define your own rules to block, allow, or log specific requests.

    hashtag
    Key Features

    • OWASP Top 10 Protection – Shields against SQL Injection, XSS, and other common web vulnerabilities.

    • Custom Rule Engine – Create granular policies based on IP, URI, headers, or user agents.

    • Monitoring Mode – Observe how rules behave before full activation.

    hashtag
    Use Cases

    • Web Application Security – Protect public websites and portals from injection and XSS attacks.

    • API Protection – Filter and control requests to your backend APIs.

    • E-commerce Security – Prevent data breaches, bot abuse, and checkout exploitation attempts.

    hashtag
    Built for Modern Web Security

    Medianova WAF delivers enterprise-grade web protection that’s easy to deploy and manage through the . It helps you stay secure without adding complexity — protecting your applications from the edge, in real time.

    Use Free SSL Certificates

    Learn how to enable and manage free SSL certificates in the Medianova Control Panel.

    Free SSL certificates provide an easy and cost-effective way to secure your CDN Resources without purchasing a commercial SSL. Medianova integrates Let’s Encrypt to automatically issue and renew these certificates through the SSL Management interface.

    circle-info

    Free SSL certificates are valid for 90 days and are automatically renewed before expiration.

    1

    Access the SSL Management

    To begin, log in to the and open the SSL Management section.

    • Navigate to CDN → SSL Management in the left-hand menu.

    • Review your existing SSL certificates.

    • Click Add New SSL in the upper-right corner.

    2

    Select the Free SSL Option

    When the dialog appears, choose Free SSL as the certificate type and click Next to continue.

    circle-info

    Choose Free SSL when you want to automatically issue and manage a certificate through Medianova’s Let’s Encrypt integration.

    3

    Fill in Certificate Details

    Enter the required information in the form:

    Field
    Description
    4

    Complete Let’s Encrypt Verification

    Medianova automatically performs domain verification using Let’s Encrypt.

    • Wait for the verification process to complete.

    • Once successful, click Confirm to finalize installation.

    5

    Assign the SSL to a CDN Resource

    After installation, assign the certificate to the desired CDN Resource:

    1. Go to CDN → CDN Resources.

    2. Open the SSL (or CNAME & SSL) tab.

    Hotlink Protection

    Prevent unauthorized use of your media files by blocking external websites from embedding or linking directly to your CDN-hosted assets.

    Hotlink Protection restricts access to your CDN Resource by verifying the Referer header in each HTTP request. When enabled, it ensures that only requests originating from your allowed domains can retrieve content from your CDN. Requests coming from unauthorized sources — such as external websites directly embedding your files — are blocked or redirected automatically.

    hashtag
    Why Use Hotlink Protection?

    Hotlink Protection helps you:

    • Protect bandwidth – Prevent others from using your CDN capacity to serve their own content.

    • Secure digital assets – Stop unauthorized sharing or embedding of your hosted media.

    • Reduce server load – Block high-traffic external sites from consuming resources.

    • Maintain brand control – Ensure your content appears only on trusted domains.

    • Prevent abuse – Stop third-party sites from monetizing your media.

    hashtag
    How Hotlink Protection Works

    Hotlink Protection checks the Referer field of every HTTP request. If the Referer does not match your whitelisted domain list, the CDN automatically denies or redirects the request.

    Action
    Description
    circle-exclamation

    Add multiple allowed domains to the whitelist for multi-site deployments (e.g., www.medianova.com, cdn.medianova.com).

    Geoblocking

    Restrict or allow access to your CDN Resources based on geographic location by configuring country-based whitelists and blacklists.

    Geoblocking allows you to control which countries can access your content through the Medianova Control Panelarrow-up-right. By enabling this feature, you can restrict or allow requests based on the visitor’s geographic origin, helping you comply with regional policies and protect your digital assets.

    circle-exclamation

    Geoblocking operates at the CDN edge, preventing unauthorized access before requests reach your origin server.

    hashtag
    Why Use Geoblocking?

    Use Geoblocking to manage access and enforce content distribution policies efficiently:

    • Compliance and licensing – Restrict access to regions where content rights do not apply.

    • Dynamic pricing models – Apply different pricing or service availability by country.

    • Security enhancement – Block known high-risk regions or malicious traffic.

    circle-exclamation

    Combine Geoblocking with IP Restriction for granular, IP-based exceptions within approved countries.

    hashtag
    How to Configure Geoblocking

    1

    Log in to the Medianova Control Panel.

    2

    Go to CDN → CDN Resources and select the resource you want to manage.

    3

    Open the Security tab.

    IP Restriction

    Control access to your CDN Resources by allowing or blocking specific IP addresses through whitelist or blacklist configurations.

    IP Restriction (Access Control List – ACL) allows you to manage which IP addresses can access your CDN Resource. You can choose between two modes: Whitelist or Blacklist, to define how access is granted or denied.

    • Whitelist Mode: Only the IP addresses you specify are allowed to access your resource. All other IPs are denied.

    • Blacklist Mode: The IP addresses you specify are denied access. All other IPs are allowed.

    circle-exclamation

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    hashtag
    Why Use IP Restriction?

    Use IP Restriction to:

    • Protect internal or staging environments from unauthorized access.

    • Restrict API access to trusted partners or corporate networks.

    • Block known malicious IP ranges or suspicious activity.

    • Ensure compliance with internal security policies.

    hashtag
    Key Features

    • Whitelist Mode – Only the IP addresses you specify are allowed to access the resource. All other traffic is blocked.

    • Blacklist Mode – The IP addresses you specify are denied access, while all other IPs are permitted.

    • Edge-Level Enforcement – Filtering occurs at the CDN edge, ensuring zero impact on origin performance.

    circle-exclamation

    Use Whitelist mode for restricted corporate APIs and Blacklist mode for public-facing applications that need selective blocking.

    Medianova’s IP Restriction system provides a simple yet powerful way to enforce access control at the CDN level. By validating requests before they reach your infrastructure, it prevents unauthorized access and improves overall performance stability. Combined with other Security features such as Rate Limiting, WAF, and Hotlink Protection, it forms a robust multi-layer defense mechanism.

    Static Content Delivery

    Deliver images, scripts, and other static assets faster and more reliably across the globe with Medianova’s Static CDN service.

    Static Content Delivery accelerates websites and applications by distributing static assets—such as images, CSS, and JavaScript files—across Medianova’s globally distributed CDN network. By caching content at the edge, end-users receive data from the nearest server, reducing latency and improving overall page load performance.

    circle-exclamation

    Static CDN is ideal for websites with large amounts of unchanging content that must be delivered consistently to users worldwide.

    hashtag
    Why Use Static CDN?

    Medianova’s Static CDN provides an optimized way to serve static assets with speed, security, and scalability:

    • Reduced Latency – Serve content from the nearest CDN edge location.

    • Improved Page Load Times – Accelerate rendering of images, scripts, and styles.

    • Lower Origin Load – Cache content at the edge to minimize backend requests.

    circle-exclamation

    Combine Static CDN with Dynamic CDN or Image Optimization to maximize performance across your entire website.

    hashtag
    Key Features

    • Edge Caching – Automatically stores and serves static content at geographically distributed edge nodes.

    • Custom Domain Support – Use your own domain (CNAME) for branded content delivery.

    • SSL/TLS Encryption – Secure asset delivery with HTTPS support.

    hashtag
    Built for Performance

    Medianova’s Static CDN combines global edge coverage, intelligent caching, and secure HTTPS delivery to optimize the delivery of static assets. Whether hosting media, websites, or web applications, this service ensures users experience faster load times and consistent performance anywhere in the world.

    Origin Response Timeout

    Learn how to configure Origin Response Timeout to control how long the CDN waits for your origin to respond.

    Origin Response Timeout defines the maximum time the CDN waits for an HTTP(S) response from your origin server. If the origin does not respond within the configured duration, the CDN returns a 504 Gateway Timeout.

    Adjusting this timeout helps maintain predictable performance and prevents long wait times caused by slow origin responses.

    You can manage Origin Response Timeout using the Medianova Control Panelarrow-up-right or APIarrow-up-right.

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.

    hashtag
    Configure Origin Response Timeout

    Follow the steps below to set the timeout duration.

    1

    Set the Timeout Duration

    Enter a timeout value between 5 seconds and 300 seconds.

    The CDN will wait for the origin response up to the duration you specify.

    2

    Save the Configuration

    hashtag
    Timeout Behavior

    • The CDN waits for the origin to respond for the configured duration.

    • If the timeout is reached, the CDN returns 504 Gateway Timeout to the client.

    • Lower values improve failover speed; higher values allow slow origins more time to respond.

    hashtag
    Recommended Settings

    • 5–30 seconds: Fast origins or latency-sensitive applications

    • 30–120 seconds: Moderate response times or variable workloads

    • 120–300 seconds: Heavy processing at the origin (reports, large queries, image generation)

    hashtag
    Troubleshooting

    Issue: Clients receive 504 responses. Cause: Origin cannot respond within the configured timeout. Fix: Increase the timeout value or optimize origin performance.

    Issue: Requests feel slow before failing. Cause: Timeout value is set too high. Fix: Reduce the timeout to a more suitable duration.

    Edge Cache Expiration

    Learn how to configure how long content remains cached on CDN edge servers.

    Edge Cache Expiration controls whether CDN edge servers cache an object and how long the cached content remains valid before it must be refreshed from the origin.

    It defines the caching behavior applied at the edge, including modes that disable caching entirely or defer expiration settings to the origin.

    You can manage Edge Cache Expiration in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    hashtag
    Configure Edge Cache Expiration

    Use this workflow to define how the CDN determines cache duration and applies expiration rules on edge servers.

    1

    Access the Edge Cache Expiration

    This feature is located under the Caching tab in any CDN Resource. This section includes the Cache Type selector and expiration time fields.

    2

    Select the Cache Type

    Choose how the CDN evaluates cache duration:

    • A value of 0 disables caching for both Edge and Origin modes.

    • Dynamic mode always bypasses caching on edge servers.

    • These settings do not impact browser caching; use for client-side caching behavior.

    hashtag
    Best Practices

    • Apply long TTL values for static assets such as images, fonts, CSS, and JavaScript.

    • Use shorter TTL values for frequently updated or dynamic endpoints.

    • Monitor edge cache hit ratios to optimize performance and origin load.

    Error Status Code Cache Expiration

    Configure how long specific HTTP error responses remain cached on CDN edge servers.

    Error Status Code Cache Expiration defines how long selected HTTP error responses (such as 404 or 500) stay valid in the CDN cache. This reduces repeated requests to the origin when the same error occurs frequently.

    You can manage Error Status Code Cache Expiration in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    hashtag
    Configure Error Status Code Cache Expiration

    hashtag
    Add an Error Status Code Definition

    Define a cache duration for specific HTTP error codes.

    1

    hashtag
    Click Add to Create a New Definition

    2

    hashtag
    Edit an Error Status Code Definition

    Modify the cache time or status code.

    1

    hashtag
    Click the Edit Icon Next to the Definition

    2

    hashtag
    Delete an Error Status Code Definition

    Remove a cache rule so that future error responses bypass CDN cache.

    hashtag
    Behaviour

    • Cached error responses remain valid until the configured cache time expires.

    • Deleting a definition does not immediately remove already cached error objects; existing cached content remains until expiration.

    • Setting a low cache duration minimizes the risk of serving error responses for extended periods.

    hashtag
    FAQ

    Does removing a definition purge already cached error responses? No. Existing cached content remains until it expires.

    Can I cache multiple error codes with different durations? Yes. Each status code can have its own cache time.

    What happens if I set the cache time to zero? A value of zero disables caching for that error status code.

    ETag Verification

    Validate cached content using the ETag response header so the CDN can detect when the origin object has changed.

    ETag Verification ensures that cached objects remain consistent with the latest version served by the origin. When enabled, the CDN evaluates the ETag header returned by the origin and refreshes the cached object when a mismatch is detected. This prevents outdated or stale content from being delivered to end users.

    You can manage ETag Verification in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    hashtag
    Configure ETag Verification

    Enable or disable ETag validation to ensure cached content remains synchronized with the origin.

    1

    Access the ETag Verification Section

    Open the ETag Verification section under the Caching tab of the selected CDN resource.

    2

    Toggle ETag Verification

    Enable or disable ETag validation using the ETag Verification toggle.

    3

    hashtag
    Behaviour

    • When enabled, the CDN compares the origin’s ETag header with the cached object to determine whether a refresh is required.

    • When disabled, cached objects are served without ETag-based validation.

    • ETag validation improves consistency but may result in more origin requests depending on header behavior.

    hashtag
    FAQ

    Does ETag Verification guarantee that the CDN always serves the latest version? Yes. When enabled, the CDN validates the cached object using the ETag header and refreshes it if the origin indicates a change.

    Does enabling ETag Verification increase origin traffic? It can. Validation requires comparing ETag values, which may trigger additional revalidation requests depending on origin behavior.

    What happens if the origin does not send an ETag header? The CDN cannot perform ETag-based validation. Normal cache expiration and revalidation rules apply.

    Range Based Caching

    Cache partial content based on byte ranges so the CDN can serve only the requested portions of large files.

    Range Based Caching allows the CDN to cache and deliver content in byte-range segments rather than requiring the entire file to be fetched or cached. This improves performance for large files such as videos, archives, or software downloads by serving only the requested portions.

    You can manage Range Based Caching in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    Select a CDN resource in the CDN section, and navigate to the Caching tab.

    hashtag
    Configure Range Based Caching

    1

    Enable Range Based Caching

    Toggle Range Based Caching to On to allow the CDN to cache partial byte-range segments.

    2

    Select Segment Size

    Choose a Segment Size value to define how large each cached byte-range segment should be. This determines how the CDN partitions and stores partial content.

    3

    Save the Configuration

    Click Submit to apply the Range Based Caching settings.

    hashtag
    Behaviour

    • The CDN caches content in fixed-size byte segments defined by Segment Size.

    • Requests for ranges within the same segment are served directly from cache.

    • Useful for video playback, downloads, and large binary files where clients request only parts of a resource.

    hashtag
    FAQ

    Does Range Based Caching improve video streaming performance? Yes. It prevents the CDN from fetching the entire file when only a portion is requested, improving responsiveness.

    What happens if I change the Segment Size? New segment size applies only to future cached segments. Existing segments remain until evicted.

    Is this feature required for byte-range requests to work? Byte-range requests work regardless, but enabling Range Based Caching ensures partial responses can come from cache instead of the origin.

    Robots.txt File

    Define how the CDN serves the robots.txt file to control how search engines crawl and index your content.

    The Robots.txt File feature determines whether search engines receive a robots.txt file from the CDN and which source the file is taken from. This allows you to enable crawling for all files or defer crawling rules to your origin.

    You can manage Robots.txt File settings in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    hashtag
    Configure Robots.txt File

    Choose how the CDN should provide the robots.txt file for the selected resource.

    1

    hashtag
    Select the Robots.txt File Mode

    Choose Disabled, Enabled, or Origin from the dropdown.

    Mode Behaviors

    Disabled — No robots.txt file is served.

    • Enabled mode always serves MN CDN’s default robots.txt content. Customers cannot upload or configure a custom robots.txt file through the Panel.

    • Origin mode delegates full control to your origin server.

    • Changes propagate immediately but may take a short time to be reflected across all PoPs.

    hashtag
    FAQ

    Does Medianova allow uploading a custom robots.txt file? No. In Enabled mode, the CDN serves a predefined robots.txt file that allows all crawling. To use a custom file, select Origin mode and host the file on your origin.

    What happens if my origin has no robots.txt file but I choose Origin mode? The CDN will return 404 Not Found, and search engines will proceed as if no robots.txt file exists.

    Does robots.txt affect CDN caching? No. It only controls search engine bot behavior and does not interact with cache rules.

    Custom Header

    Learn how to configure Custom Header rules for a CDN Resource.

    The Custom Header feature allows you to add, modify, or remove HTTP headers for both origin requests and CDN responses. This configuration enables fine-grained control over how headers are passed, overwritten, or stripped at different stages of the delivery flow.

    When Custom Header is enabled, you can define multiple header actions, each with a specific key–value pair and rule type. All rules are executed by CDN edge servers for the selected CDN Resource.

    You can configure Custom Header in the Medianova Control Panelarrow-up-right or via APIarrow-up-right

    hashtag
    Configure Custom Header

    1

    Access Custom Header

    Go to CDN → CDN Resources and select a CDN Resource. Scroll to the Custom Header section.

    2

    Enable Custom Header

    Toggle Status to enable the Custom Header feature. Verify that the rule configuration area becomes active.

    3

    Create Custom Header Rules

    Select a header action from the dropdown.

    Available Header Actions You can create header rules using the Add dropdown. Each option applies to a different stage of the request/response flow. Add Origin Request Header Adds a custom header to the request sent from CDN edge to the origin server. Add CDN Response Header Adds a custom header to responses delivered from CDN edge to the viewer. Remove CDN Response Header Removes a header from the response before it is sent to the viewer. Raw Header Creates a raw header rule with a custom directive, without binding it to request or response type logic. (Use only if you require fully custom header behavior.) Remove Origin Request Header Removes a header before the request is forwarded to the origin server.

    Enter the Key and Value for the header, if the selected action requires one.

    4

    Select Submit to save

    hashtag
    Best Practices

    • Header keys and values must follow valid HTTP header formatting rules.

    • If the same header is modified by multiple rules, CDN edge behavior follows the order of applied rules.

    • Removing headers may affect origin authentication, CORS behavior, or cache control logic.

    X-CDN Header

    Learn how the X-CDN Header adds CDN-specific information to origin requests in the Medianova Control Panel.

    The X-CDN Header feature adds an X-CDN header to requests that are forwarded from the CDN to your origin. This allows your origin to identify that the request is coming through Medianova CDN, which can be useful for logging, routing decisions, and origin-side analytics.

    circle-info

    This feature does not modify the response returned to the viewer and does not affect caching or delivery logic.

    hashtag
    How X-CDN Header Works

    You can configure X-CDN Header in the or via

    When the X-CDN Header toggle is enabled:

    • The CDN adds the X-CDN header to the origin request during the fetch operation.

    • Your origin receives every request with this header included.

    • The header allows your origin to distinguish CDN-proxied traffic from direct client traffic.

    This feature is passive and does not alter cache decisions, TTL behavior, Page Rules, or viewer-facing responses.

    hashtag
    Use Cases

    hashtag
    Origin-side analytics

    Log whether a request came through the CDN layer by checking for the X-CDN header.

    hashtag
    Conditional behavior at the origin

    Apply specific logic (e.g., rate limits, routing decisions, request tagging) based on the presence of this header.

    hashtag
    Debugging origin fetches

    Verify that requests are reaching your origin through the CDN, especially when diagnosing caching or routing flows.

    hashtag
    Notes

    • The header is inserted only on the origin request.

    • It is not visible to clients and does not appear in viewer-facing responses.

    • Header values may differ based on internal CDN configuration.

    • Enabling the header does not change caching rules, request normalization, or delivery performance.

    Origin Host Header

    Learn how to configure a custom Host header for origin requests in the Medianova Control Panel.

    The Origin Host Header feature allows you to define a custom domain to be sent in the Host header of requests forwarded to your origin. Many origin servers rely on the Host header for routing, virtual hosting, or tenant identification. When this option is enabled and a domain is provided, the CDN replaces the default host value with the one you specify.

    The feature does not modify viewer-facing responses and does not affect caching behavior.

    hashtag
    How Origin Host Header Works

    You can configure X-CDN Header in the or via

    When the feature is active:

    • The CDN overwrites the Host header in the origin request with the domain you provide.

    • The domain must be entered without http:// or https://.

    The purpose of this feature is to ensure compatibility with origins that require a specific hostname, especially in environments where multiple sites share the same origin infrastructure.

    hashtag
    Use Cases

    hashtag
    Virtual hosting environments

    Ensure the correct site is selected when multiple hostnames share the same origin.

    hashtag
    Multi-tenant systems

    Send a tenant-specific domain in the Host header for proper routing.

    hashtag
    Origin behavior validation

    Match the exact hostname your origin expects for SSL/SNI evaluation or application routing logic (when applicable to host header usage).

    hashtag
    Notes

    • Enter only the domain name (e.g., subdomain.example.com).

    • Do not include URL schemes such as http:// or https://.

    • This feature modifies only the origin-bound request

    X-Frame Options

    Learn how the X-Frame Options feature controls which sites are allowed to frame your content.

    The X-Frame Options feature adds the X-Frame-Options HTTP response header to prevent unauthorized framing of your website. This header is commonly used to mitigate clickjacking attacks by restricting how and where your content can be embedded inside an <iframe>.

    When enabled, the CDN includes the header in responses according to the configuration you provide.

    hashtag
    How X-Frame Options Works

    You can configure X-CDN Header in the or via

    When the feature is active:

    • The CDN adds an X-Frame-Options header to viewer responses.

    • If no domain is configured, the CDN sets:

      which allows framing only from the same domain.

    • If one or more domains are provided, the CDN applies:

    hashtag
    Use Cases

    hashtag
    Prevent clickjacking

    Block external sites from embedding your pages to protect users from UI redress attacks.

    hashtag
    Allow trusted partners

    Permit framing only from specific domains that require embedded content (e.g., partner dashboards, internal tools).

    hashtag
    Enforce controlled embedding behavior

    Define clear, browser-enforced restrictions on how your content is presented in external applications.

    hashtag
    Notes

    • ALLOW-FROM is not supported by all browsers. Modern security policies often prefer CSP frame-ancestors.

    • X-Frame-Options does not affect API endpoints or non-HTML content.

    • If multiple allowed domains are configured, behavior may vary by browser due to varying support levels.

    X-Content Type Options

    Learn how the X-Content-Type-Options header prevents MIME sniffing and enforces strict content-type handling in the browser.

    The X-Content-Type-Options feature adds the X-Content-Type-Options header to viewer responses. This header instructs compatible browsers not to perform MIME sniffing and to rely strictly on the Content-Type declared by the server. Disabling MIME sniffing helps reduce exposure to certain injection and cross-site scripting (XSS) vectors.

    circle-info

    The feature does not modify origin requests or CDN caching behavior.

    hashtag
    How X-Content-Type-Options Works

    You can configure X-CDN Header in the or via

    When enabled:

    • The CDN adds the following header to viewer-facing responses:

    • Browsers that support this header will not attempt to infer content types and will instead enforce the value provided by the origin.

    • MIME sniffing is disabled for resources such as scripts, stylesheets, and other content types that could be misinterpreted.

    hashtag
    Use Cases

    hashtag
    Prevent MIME sniffing

    Ensure the browser does not guess content types, avoiding scenarios where a file may be interpreted as executable code.

    hashtag
    Improve XSS resilience

    Reduce attack surfaces where incorrect content-type interpretation could lead to script execution.

    hashtag
    Enforce strict content handling

    Guarantee consistent behavior across browsers by ensuring content is processed exactly as declared.

    hashtag
    Notes

    • The header is applied only to viewer responses, not to origin-bound requests.

    • Modern browsers widely support nosniff, but legacy browsers may behave inconsistently.

    • Enabling this header does not alter your CDN caching logic.

    X-XSS Protection

    Learn how the X-XSS Protection header controls browser-side filtering of reflected Cross-Site Scripting (XSS) attacks.

    The X-XSS Protection feature adds the X-XSS-Protection header to viewer responses. This header instructs compatible browsers to enable their built-in XSS filtering mechanisms. While most modern browsers now ignore this header, the setting can still provide protection for legacy browsers that rely on it.

    The feature does not modify origin requests or affect CDN caching behavior.

    hashtag
    How X-XSS Protection Works

    You can configure X-CDN Header in the or via

    When enabled:

    • The CDN adds the following header to viewer-facing responses:

    • Browsers that still support the header will block pages that trigger reflected XSS heuristics.

    • If disabled, the CDN does not include the header, and browsers revert to their default behavior.

    This feature is primarily relevant for environments that depend on legacy browser compatibility.

    hashtag
    Use Cases

    hashtag
    Legacy browser support

    Provide reflected-XSS filtering for older browsers that still honor the header.

    hashtag
    Controlled security posture

    Ensure consistent browser behavior across mixed device environments or corporate networks with outdated browser fleets.

    hashtag
    Notes

    • Modern browsers (Chrome, Edge, Safari) ignore X-XSS-Protection and instead rely on CSP (Content-Security-Policy) for XSS mitigation.

    • This feature affects only viewer responses, not origin requests.

    • Enabling the header does not prevent stored or DOM-based XSS attacks.

    Page Rules

    Learn about Page Rules, how to manage Page Rules and the available settings.

    Page Rules trigger one or more actions on an incoming request to Medianova CDN whenever a defined URL pattern is matched.

    Page Rules are available in the Medianova Panelarrow-up-right for any CDN resource in the Page Rules tab.

    Available settings for Page Rules include Cache Type, Custom Header, Geoblocking and more.

    hashtag
    Availability

    Page Rules can be configured foror CDN resources of type Small, Dynamic, Large & VOD.

    The default number of allowed page rules depends on the package as shown below.

    Free
    Pro
    Business
    Enterprise

    hashtag
    Priority Order Matters

    Only one Page Rule will trigger per URL, that is the the matching page rule with the highest priority.

    In the Medianova Panel, Page Rules are sorted top-to-bottom from highest priority to lowest priority. For this reason, we recommend ordering your rules from most specific to least specific.

    Rate Limiting

    Control traffic flow, protect resources, and ensure fair usage across your CDN resources with Medianova’s intelligent Rate Limiting feature.

    Rate Limiting helps you maintain stable application performance by controlling how many requests a client can make in a given time frame. It protects against excessive API calls, brute-force attempts, and high-frequency requests that can degrade origin performance or service quality.

    With Medianova’s edge-level implementation, rate limits are applied directly at the CDN layer — before the traffic reaches your origin servers — ensuring both reliability and efficiency.

    Rate Limiting is available for Dynamic CDN Resources and can be configured per domain, path, or file extension through the .

    hashtag

    Configure IP Restriction

    Learn how to enable and configure IP Restriction in the Medianova Control Panel to allow or block access from specific IP addresses.

    IP Restriction enables you to define which IP addresses can access your CDN Resources by using either whitelist or blacklist rules. When configured, access control is enforced at the CDN edge, ensuring that unauthorized requests are blocked before they reach your origin server.

    You can enable IP Restriction for each CDN Resource in the .

    1

    How to Activate WAF

    Learn how to activate and configure the Web Application Firewall (WAF) for your CDN Resources in the Medianova Control Panel.

    WAF (Web Application Firewall) enhances your website’s security by inspecting and filtering incoming HTTP/HTTPS traffic. You can enable it for any Dynamic CDN Resource, select the protection mode, and create Custom Rules to detect and block malicious requests.

    circle-info

    WAF is available only for Dynamic CDN Resources. Ensure your resource is active before proceeding.

    1

    Configuration Basics

    Medianova CDN Configuration Basics document is designed to help you understand and implement the fundamental configurations necessary to leverage the full potential of Medianova's Content Delivery Network (CDN). Whether you are a web developer, content creator, or IT professional, this guide will walk you through essential concepts and steps to optimize content delivery, enhance performance, and improve user experience.

    hashtag
    Creating a Medianova CDN Resource

    To get started with Medianova CDN, follow these steps:

    Rewrite Origin URLs

    Learn how to manage Rewrite Origin URLs to modify how request paths are sent to your origin.

    Rewrite Origin URLs enables you to transform incoming paths before they are forwarded to origin servers. You can configure Match Mode, Origin URI, Target URI, and Priority to adjust how paths are rewritten for directory changes, API restructuring, or backend routing needs.

    You can manage Rewrite Origin URLs using the or .

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings

    hashtag

    Query String Caching

    Control how query strings affect CDN cache behavior for dynamic or parameterized URLs.

    Query String Caching defines how URLs containing query parameters are interpreted by the CDN cache. You can cache each query string variant separately, ignore selected query strings, or build the cache key using only specific parameters.

    You can manage Query String Caching in the or via .

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Query String Caching section under the Caching tab.

    hashtag
    Configure Query String Caching

    Enable Gzip from Origin

    Fetch gzip-compressed text-based content from your origin to improve delivery efficiency.

    Enable Gzip From Origin allows the CDN to request text-based files from your origin using the Accept-Encoding: gzip header.

    circle-info

    This feature is available for Small, Large, and Dynamic CDN Resources.

    If the origin supports gzip, the CDN stores the compressed version in cache; otherwise, it stores the uncompressed response.

    circle-info

    Stale Cache

    Serve stale cached content when the origin returns specific HTTP error responses or enters an Updating state

    Stale Cache allows CDN edge servers to deliver the last cached version of an object when the origin becomes temporarily unavailable. This includes conditions such as 500–504 errors, invalid headers, timeouts, forbidden responses, or an Updating status. Enabling Stale Cache helps maintain availability and ensures continuity of service during short-term origin instability.

    You can manage Stale Cache in the or via .

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Stale Cache.

    hashtag
    Configure Stale Cache

    Mobile Device Cache

    Define device-based caching behavior to create separate cached versions for mobile, tablet, and desktop clients.

    Mobile Device Cache allows the CDN to generate different cache entries based on the detected device type. This ensures that each device category receives appropriately formatted content without cache conflicts.

    The feature also forwards device information to your origin using the X-DEVICE and X-MOBILE headers.

    You can manage Mobile Device Cache in the

    Log in to the , select a CDN resource in the CDN section, and navigate to the Caching tab.

    CORS Header

    Learn about the CORS Header and how to enable and configure this feature.

    Cross-origin resource sharing (CORS) is a browser security mechanism that determines whether a web page can load resources from a different origin. While browsers allow cross-origin images, CSS files, scripts, iframes, and videos without restrictions, other request types — such as Ajax calls and web fonts — are blocked by default under the same-origin policy.

    CORS defines how browsers and servers evaluate cross-origin requests. Medianova CDN can send the access-control-allow-origin header in HTML responses to enable controlled cross-origin access.

    By default, Medianova CDN forwards any CORS-related headers sent by your origin. You only need to enable CORS Header if you want CDN edges to set or override this header.

    circle-info

    HTTP Strict Transport (HSTS) Protection

    Learn how HSTS Protection enforces HTTPS-only access for your CDN Resource.

    HTTP Strict Transport Security (HSTS) instructs browsers to connect to your domain only over HTTPS for a defined period of time. When enabled, the CDN adds the Strict-Transport-Security header to HTTPS responses, preventing protocol downgrade attacks and reducing the risk of session or cookie interception.

    HSTS can also extend enforcement to subdomains and optionally request inclusion in browser preload lists.

    hashtag
    How HSTS Protection Works

    Compression

    Learn all about Gzip and Brotli compression at Medianova, including which content types are compressed by default and compression of error responses.

    Gzip and Brotli compression reduces file sizes by up to 80% for common content types like HTML, CSS and JavaScript, leading to faster load times and improved user experience. This not only enhances website performance and improves SEO / Core Web Vitals, but also decreases bandwidth usage, saving CDN costs and ensuring efficient content delivery.

    hashtag
    Compression at the Edge

    Gzip compression happens at Medianova Midcache servers, which is then passed on to the Edge servers. Both the Midcache and Edge servers may cache the Gzip compressed content for faster delivery of next responses. Edge servers perform Brotli compression on-the-fly when requested by the client.

    How to Prefetch

    Perform Prefetch operations through the Control Panel or API to proactively cache files and deliver them instantly to end-users.

    Prefetch allows you to pull specific files from your origin into the CDN cache before any user requests them. Use this feature to eliminate cache misses, reduce origin load, and ensure fast delivery to the first users.

    You can initiate Prefetch via the or .

    circle-info

    Prefetch does not overwrite existing cached content. To update a file that is already cached, you must first Purge it and then Prefetch.

    Content optimization – Focus delivery to target markets, reducing unnecessary traffic.
    4

    Enable the Geoblocking toggle.

    5

    From the country list:

    • Drag or select countries to the Whitelist (allowed).

    • Drag or select countries to the Blacklist (blocked).

    6

    Click Save Changes to apply your configuration.

    7

    (Optional) Add specific IP exceptions under IP Restriction for fine-tuned control.

    circle-info

    You cannot whitelist and blacklist the same country simultaneously.

    hashtag
    Enter the Cache Time

    Enter the duration (in seconds) for how long the selected error code should remain cached.

    3

    hashtag
    Enter the Status Code

    Specify one or more HTTP status codes such as 404, 500, or 502.

    4

    hashtag
    Submit the Configuration

    Click Submit to save the definition.

    hashtag
    Update the Cache Time or Status Code
    3

    hashtag
    Submit the Changes

    Click Submit to apply updates.

    If no definition exists for a status code, the CDN forwards all such responses to the origin without caching.
    Real-time defense – Detect and mitigate attacks instantly without affecting legitimate traffic.
  • Actionable analytics – Gain visibility into threats, attack sources, and triggered rules through the Control Panel.

  • Instant Mitigation – Block or log attacks in real time with no latency impact.
  • Integrated Analytics – Visual dashboards for traffic and threat insights.

  • False Positive Control – Fine-tune rules to balance protection and accessibility.

  • Medianova Control Panelarrow-up-right

    Allow

    Serves content when the Referer is from an authorized source.

    Block

    Rejects requests from unauthorized sites.

    Redirect

    Sends unauthorized users to a specified page or image.

    arrow-up-right
    Web Application Firewallarrow-up-right
    DDoS Protectionarrow-up-right
    Rate Limitingarrow-up-right
    Geoblockingarrow-up-right
    IP Restrictionarrow-up-right
    Static CDNarrow-up-right
    Dynamic CDNarrow-up-right
    Streamingarrow-up-right
    Image Optimization & WebParrow-up-right
    API Cachingarrow-up-right
    Stook: Cloud Object Storage
    Getting Started
    Stook Integration
    Usage Guides
    Stook API
    Why Use Rate Limiting?

    Rate Limiting ensures a secure, predictable, and efficient experience for all users by:

    • Preventing abuse or overload from bots or aggressive clients.

    • Protecting login endpoints and API gateways from brute-force attacks.

    • Ensuring fair bandwidth distribution among users.

    • Preserving origin stability and avoiding unnecessary compute or database load.

    • Allowing flexible control through customized thresholds and actions.

    hashtag
    Key Features

    • Customizable Limits – Define request thresholds per second or minute to suit your application.

    • Edge-Level Enforcement – Limit requests at the CDN edge, preventing overload before it reaches your origin.

    • Burst Control Options – Configure how short bursts of requests are handled:

      • Burst – Allows short spikes within the limit window.

      • Burst + No Delay – Permits short bursts without delay enforcement.

      • None – Strict limit; requests beyond the threshold are immediately blocked.

    • IP Whitelisting – Exclude trusted IPs, monitoring tools, or partners from rate enforcement.

    • Flexible Actions – Choose to Block or Challenge clients that exceed limits.

    • Configurable HTTP Response Codes – Return 429 or 529 errors when limits are exceeded.

    • Path & Extension Support – Apply rate limits to specific endpoints (e.g., /login, /api/) or file types (e.g., .pdf, .mp4).

    hashtag
    Use Cases

    • API Protection – Prevent abuse of public APIs and ensure consistent response times.

    • Authentication Endpoints – Limit login attempts to protect user accounts.

    • Download or Media Control – Restrict large file or video download frequency to optimize CDN performance.

    • E-commerce Traffic Shaping – Manage checkout or cart requests during high-traffic campaigns.

    • Bot Mitigation – Reduce load from automated crawlers or scrapers.

    hashtag
    Built for Performance

    Medianova’s Rate Limiting operates at the edge, ensuring minimal latency and zero impact on normal user experience. By combining adaptive enforcement, path-based rules, and real-time analytics, it enables granular control over how traffic interacts with your CDN — keeping your applications fast, fair, and secure.

    circle-exclamation

    You can configure and monitor Rate Limiting directly through the Medianova Control Panel under the Security section.

    Medianova Control Panelarrow-up-right
    CIDR Range Support – Define large IP ranges using CIDR notation (e.g., 192.168.1.0/24).
  • Mutually Exclusive Modes – You can use either whitelist or blacklist mode, but not both simultaneously.

  • arrow-up-right
    High Availability – Redundant nodes ensure reliability even under heavy traffic.
  • Global Reach – Consistent performance across all geographic regions.

  • Compression & Optimization – Automatically compresses and optimizes file sizes for faster transfer.
  • Scalability – Handles spikes in user traffic seamlessly without impacting origin performance.

  • Monitoring & Analytics – Real-time reporting to track delivery performance and usage trends.

  • Medianova Static CDN – accelerating delivery of static assets through global edge caching
    Click Submit to apply the timeout value. The new timeout setting takes effect immediately.

    Submit the Configuration

    Click Submit to apply the updated validation behavior.

    A smaller segment size increases cache precision but may increase the number of stored segments.
    Use Raw Header only when standard rule types do not fit your use case.
    Custom Header configuration interface in the Headers tab

    The behavior applies to all request types because insertion occurs before the origin fetch.

    Medianova Control Panelarrow-up-right
    APIarrow-up-right
    X-CDN Header configuration area inside the Headers tab
    The configured value is applied to all origin fetches for the selected CDN Resource.
  • The behavior supports any valid domain that your origin server expects for routing or validation.

  • and does not impact the viewer response.
  • Incorrect domain entries may cause the origin to respond with errors or unexpected routing behavior.

  • Medianova Control Panelarrow-up-right
    APIarrow-up-right
    Origin Host Header field enabled with sample domain
    Regularly review threat and access logs to identify abnormal patterns.
    Anycast DNS
    Web Application Firewall (WAF)arrow-up-right
    Anycast DNS

    Headers

    Advanced Origin Settings

    Learn how Advanced Origin Settings control granular routing behavior for dynamic traffic within your CDN Resource.

    The Advanced Origin Settings feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It allows you to define rule-based origin routing for specific URLs, extensions, or directories, enabling precise control over how dynamic traffic is forwarded to different origins. You can override protocols, ports, host headers, and assign priorities to create complex multi-origin routing behaviors.

    For configuration details, match types, and examples, refer to the main Advanced Origin Settings documentation: Learn more in the Advanced Origin Settings documentation.

    Origin Response Timeout

    Learn how Origin Response Timeout controls how long the CDN waits for dynamic origin responses before returning an error.

    The Origin Response Timeout feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It defines the maximum time the CDN waits for the origin to return an HTTP(S) response. When the origin exceeds this duration, the CDN stops waiting and returns a 504 Gateway Timeout, ensuring predictable behavior for dynamic workloads and preventing long wait times caused by slow or overloaded origins.

    For configuration details, timeout behavior, and examples, refer to the main documentation: Learn more in the Origin Response Timeout documentation.

    5

    30

    50

    125

    Availability

    Yes

    Yes

    Yes

    Yes

    Number of rules

    Origin Settings

    for each allowed domain, enabling selective embedding.
  • The browser enforces the framing policy and blocks disallowed attempts.

  • This header has no effect on origin requests; it is applied only to viewer-facing responses.

  • Medianova Control Panelarrow-up-right
    APIarrow-up-right
    X-Frame Options configuration area inside the Headers tab
    Correct MIME types must still be set by your origin; this header does not correct misconfigured content types.
    Medianova Control Panelarrow-up-right
    APIarrow-up-right
    X-Content-Type-Options toggle inside the Headers tab
    Medianova Control Panelarrow-up-right
    APIarrow-up-right
    X-XSS Protection toggle inside the Headers tab
    hashtag
    Enable Mobile Device Cache
    1

    hashtag
    Enable the Setting

    Switch Mobile Device Cache to On to create separate cached versions for mobile, tablet, and desktop.

    2

    hashtag
    Submit the Configuration

    Click Submit to apply the updated caching behavior.

    hashtag
    Behaviour

    Mobile Device Cache changes how cache keys are generated and what information is forwarded to the origin.

    hashtag
    Device Classification

    The CDN classifies each request using the User-Agent header:

    • mobile

    • tablet

    • desktop

    hashtag
    Cache Key Variation

    A unique cache entry is created per device type, for example:

    hashtag
    Forwarded Headers

    Header
    Description
    Example

    X-DEVICE

    Device category detected by the CDN

    mobile / tablet / desktop

    X-MOBILE

    Whether the device is mobile

    true / false

    These headers allow your origin to serve tailored content if needed.

    • Device detection is based on User-Agent parsing and may not be accurate for all custom or rare device signatures.

    • The feature does not provide per-resolution caching (e.g., based on screen width).

    • Use this feature only if your mobile/tablet/desktop content differs meaningfully.

    hashtag
    FAQ

    hashtag
    Does Mobile Device Cache change how requests are routed to the origin?

    No. This feature affects only cache segmentation and forwards device headers. Origin routing remains unchanged.

    hashtag
    What happens if the CDN cannot identify the device type from the User-Agent?

    The request is classified as desktop by default, and the cache key is generated accordingly.

    hashtag
    Will enabling this feature create separate cached versions for each device type?

    Yes. Mobile, tablet, and desktop clients each receive their own cached version, preventing cross-device content mismatches.

    Medianova Control Panelarrow-up-right
    Medianova Control Panelarrow-up-right
    If your origin already sends a correct CORS header with HTML responses and you do not see CORS errors, you can keep CORS Header disabled.

    By default, Medianova CDN forwards the CORS header in HTML responses from your origin to browsers.

    You can configure CORS Header in the Medianova Control Panel arrow-up-rightor via the APIarrow-up-right.

    hashtag
    Enable CORS Header

    1

    hashtag
    Access CORS Header

    Go to CDN → CDN Resources and select a CDN Resource. Open the Headers tab.

    2

    hashtag
    Enable CORS Header

    By default, CORS Header is disabled. Toggle Status to enable the feature.

    Confirm that configuration fields are now active

    hashtag
    Configure CORS Header

    After enabling the feature, Medianova CDN edge servers add the access-control-allow-origin header to HTML responses based on your configuration.

    hashtag
    Allow all origins (Wildcard)

    If no domains are defined in the allow list, CDN edges return the following header:

    The wildcard * allows any origin to load cross-origin resources from the CDN.

    hashtag
    Allow specific domains

    Add domains to restrict cross-origin access to only approved origins.

    For example, if https://www.shop.com loads web fonts from https://fonts.shop.com and you want to prevent external sites from using these fonts, add fonts.shop.com to the allow list.

    When a domain is added, CDN edges respond with:

    1

    Enter a domain into the Allowed Domains field. Examples: fonts.shop.com, https://fonts.shop.com

    2

    Select Add to include the domain in the allow list.

    hashtag
    Troubleshooting

    • CORS Header applies only to HTML responses.

    • If your origin also sets access-control-allow-origin, CDN behavior depends on your Header Override configuration.

    • Browser console messages provide the most accurate diagnostics for CORS failures.

    • If you use credentials or custom headers in your requests, additional CORS headers may be required at the origin level.

    Medianova delivers content with Gzip compression, Brotli compression or no compression depending on:
    • Values of the Accept-Encoding header in the request coming into Medianova

    • Your Medianova configuration (learn how to configure Gzip and Brotli)

    hashtag
    Content types

    You can customize which content types Medianova serves compressed for Gzip and Brotli, except for content of type text/html : this is always compressed.By default, Medianova compresses the following content types:

    hashtag
    Status Codes

    For responses coming from customer origin server or CDN cache, Medianova performs compression for any status code.Some MN features like Geoblocking may cause MN CDN to serve lightweight, edge-generated error responses and these are always served uncompressed.

    hashtag
    Minimum response size for compression

    If compression is enabled for the requested content type, Medianova applies compression to responses with a minimum size of 400 bytes.

    hashtag
    Content-Length and No-Transform

    Medianova sends compressed responses without the Content-Length header to prevent browsers receiving possibly incorrect length information as a result of dynamic transformation.

    Sending Cache-Control: no-transform on the response from origin has no effect on compression.

    hashtag
    Compression at Origin

    Medianova always requests uncompressed content from the customer origin server. The CDN sends no Accept-Encoding header to the origin and expects to receive the response uncompressed and without a Content-Encoding header.

    hashtag
    FAQ

    hashtag
    Which compression level does Medianova use for Gzip and Brotli?

    MN uses compression level 6 for Gzip and 5 for Brotli. These compression levels provide an optimal balance between compression efficiency and server CPU consumption.

    hashtag
    After I disable compression, does Medianova continue to serve compressed from cache?

    Yes. When a request is first made, Medianova servers cache the content Gzip compressed. If Gzip is later disabled, the already cached Gzip version will still be served unless a purge is performed or the cached object expires.

    hashtag
    When will Medianova support Zstandard (ZSTD) compression?

    Currently, Medianova has no plans for supporting Zstandard-encoded content.

    Request/response compression at Medianova
    X-Frame-Options: SAMEORIGIN
    X-Frame-Options: ALLOW-FROM <domain>
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block
    /index.html | mobile
    /index.html | desktop
    access-control-allow-origin: *
    access-control-allow-origin: https://fonts.shop.com
    text/html
    text/plain
    text/css
    text/x-component
    text/javascript
    application/javascript
    application/x-javascript
    application/json
    text/xml
    application/xml
    application/rss+xml
    application/atom+xml
    application/rdf+xml
    application/xhtml+xml
    application/vnd.ms-fontobject
    application/x-font
    application/x-font-opentype,
    application/x-font-otf
    application/x-font-truetype
    application/x-font-ttf
    font/opentype
    font/otf
    font/ttf
    font/woff
    font/woff2
    image/svg+xml
    image/x-icon
    application/x-www-form-urlencoded
    application/dash+xml
    application/x-mpegURL
    application/octet-stream

    (Optional) Enable this option to secure all subdomains under the same domain (e.g., *.example.com).

    Domain

    Select the domain associated with your CDN Resource.

    After filling in the fields, click Add SSL to start the process.

    The new SSL certificate will appear in your SSL Management list and can now be assigned to your CDN Resources.
    circle-info

    Domain verification may take up to a few minutes depending on DNS propagation.

    circle-info

    If domain ownership cannot be verified, the process will fail. Ensure that your DNS settings are correct and that your domain points to Medianova’s CDN.

    Choose Shared SSL to apply the Free SSL certificate.

  • Click Save.

  • circle-info

    You can verify activation by opening your domain in a browser using https://. The lock icon indicates a valid SSL connection.

    SSL Name

    A name to identify the certificate in your organization.

    Medianova Control Panelarrow-up-right

    Wildcard

    Edge
    — The CDN applies the expiration time configured in the Panel. A value of
    0
    disables caching.
    Origin
    — The CDN honors cache headers sent by the origin. If no cache duration is provided, the Panel-defined value applies. A value of
    0
    disables caching.
    Dynamic
    — The CDN does not cache the content. All requests always forward to the origin regardless of origin headers or Panel settings.
    The Edge Cache Expiration section allows configuration of the Cache Type and duration settings.
    3

    Enter the expiration time

    Specify how long content should remain cached on edge servers. For Origin mode, this value is applied only when the origin provides no cache duration.

    4

    Save the configuration

    Click Submit to apply the updated caching rules across the CDN network.

    Browser Cache Rule
    Enabled
    — MN CDN serves its default robots.txt file, allowing crawlers to index all content.
    Origin
    — CDN fetches and serves the robots.txt file from your origin.
    2

    hashtag
    Save the Configuration

    Click Submit to apply the selected robots.txt behavior.

    arrow-up-right
    hashtag
    Access the IP Restriction
    1. Log in to the Medianova Control Panel.

    2. Go to CDN → CDN Resources.

    3. Select the resource where you want to apply IP restrictions.

    4. Click the Security tab.

    5. Open the IP Restriction (ACL) section.

    circle-info

    IP Restriction is available only for active CDN Resources.

    2

    hashtag
    Choose Restriction Mode

    Select one of the following modes based on your access policy:

    Mode
    Description
    circle-info

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    3

    hashtag
    Add IP Addresses or Ranges

    1. Click Add IP.

    2. Enter an IP address or subnet range in CIDR format (e.g., 192.168.0.0/24).

    3. Press Enter or click the + icon to add it to the list.

    4. Repeat for additional IPs or ranges.

    5. Click Save to apply changes.

    circle-info

    Use CIDR notation to efficiently manage large network ranges.

    4

    hashtag
    Edit or Remove Existing Entries

    • Edit: Click the Edit icon to update an IP or range.

    • Delete: Click the Delete icon to remove it.

    • Save Changes: Click Save after every modification to ensure updates are applied at the edge.

    circle-info

    hashtag
    Removing an entry from a Whitelist immediately blocks that IP from accessing your resource.

    5

    hashtag
    Verify Configuration

    Once saved, you can verify your configuration:

    • Attempt access from an allowed IP → content should load successfully.

    • Attempt access from a restricted IP → access should be denied or redirected.

    • Review logs or analytics to confirm correct enforcement.

    circle-info

    Test from different networks (VPN, mobile, or office IPs) to ensure your list is accurate.

    Medianova Control Panelarrow-up-right
    Access the WAF

    To begin configuration, log in to the Medianova Control Panelarrow-up-right and navigate to the WAF settings.

    • Go to Security → WAF in the left-hand menu.

    • Select the Dynamic CDN Resource where you want to activate WAF.

    • The WAF configuration page will open.

    circle-info

    If you haven’t created a Dynamic CDN Resource yet, go to CDN → Create CDN Resource first, then return to this section.

    2

    Choose WAF Mode

    Select how the firewall will operate for your CDN Resource.

    • Monitoring Only: Logs all requests but does not block them. Recommended for initial setup and rule tuning.

    • On: Fully active mode that filters and blocks malicious traffic in real time.

    After selecting a mode, click Save to apply the change.

    circle-info

    Start with Monitoring Only mode to observe your application’s normal request patterns before enabling full protection.

    3

    Create Your First Rule

    After activation, you can define custom rules to control how WAF handles requests. For example, you can block requests from specific IP ranges or allow trusted user agents.

    To create or manage rules, go to Managing Rules & Actions.

    circle-info

    Rule configuration is optional at activation. WAF includes predefined Managed Rules that are enabled by default.

    4

    Verify WAF Activation

    Once WAF is enabled, the Status indicator on your resource page will show “Active.” Incoming requests are now analyzed by the firewall and logged in real time.

    You can monitor activity in the Analytics → WAF Dashboard section.

    circle-info

    WAF logs and metrics may take up to a few minutes to appear after initial activation.

    hashtag
    Best Practices

    • Always start with Monitoring Only mode for new configurations.

    • Combine Managed Rules and Custom Rules for optimal coverage.

    • Review your WAF Analytics regularly to track threats and rule behavior.

    • Avoid creating overly broad rules to minimize false positives.

    Log in to www.cloud.medianova.comarrow-up-right with your username and password.
  • Click on the Create CDN Resource tab in the left menu.

  • Choose any resource type and fill in the necessary fields.

  • Create a resource and configure the necessary settings.

  • The resource you created will be in a "pending" status. Below is information about the resource statuses:

  • circle-info

    About the status of resources

    • Pending: The URL entered by the user is marked as "Pending" until the DNS resolution is complete. In this state, the domain name provided by the user has not yet been resolved to an IP address. While the DNS resolution process is ongoing, the resources are not yet accessible through the CDN.

    • Active: Once the DNS resolution for the URL is successfully completed, the resource status changes to "Active." In this state, the domain name has been resolved to an IP address, and the resource is accessible via the CDN. The resource is activated across all data centers and is optimized to provide the best performance to users.

    • Passive: If the resource becomes unavailable for any reason, the resource status changes to "Passive." In this state, the resource is inactive, and users cannot access it.

    hashtag
    Configuration

    The CDN URL and the ORIGIN URL below are examples.

    Enlarges the table by opening it in a full screen dialogOpen

    Origin URL

    CDN URL

    You must replace the existing domain on website code with the CDN URL for contents that you want to serve from CDN.

    Examples of HTML code illustrating how to configure a CDN URL with the Origin URL:

    circle-info

    Origin URL

    <img src=”http://yourdomain.com/images/logos/logo.jpg”arrow-up-right alt=”” />

    or

    <img src=”/images/logos/logo.jpg” alt=”” />

    CDN URL

    <img src=” alt=”” />

    Source codes are replaced with the CDN URL instead of the Origin URL as mentioned above.

    Thus, our CDN service becomes active on your site.

    In order to access your content, you also need to define our IPs in your firewalls. Clickarrow-up-right to access the IP list of Medianova.

    Manage Rewrite Origin URLs

    Follow the steps below to add and manage Rewrite Origin URLs for your CDN Resource.

    1

    Add a Rewrite Origin URL

    Select Add to create a new Rewrite Origin URL.

    The Add Rewrite Origin URL popup appears.

    2

    Configure Parameters

    Fill in the required fields in the popup:

    • Match Mode — Choose how the incoming path is matched. Options include:

      • All files

      • Path

    3

    Save the Configuration

    Select Add, then click Submit. Your Rewrite Origin URL is added to the list.

    hashtag
    Match Mode Behavior

    • All files: Applies to every incoming request.

    • Path: Matches only the path portion of the request URI.

    • Full Path: Matches the exact full URL path.

    • Wildcard: Enables dynamic pattern matching using wildcard symbols.

    hashtag
    Troubleshooting

    Issue: Rewrite Origin URL does not apply. Cause: Incorrect Match Mode or Origin URI format. Fix: Verify that the incoming request path matches the defined parameters.

    Issue: A different Rewrite Origin URL is applied first. Cause: Priority ordering conflict. Fix: Assign a lower priority value to the entry you want processed first.

    Issue: Origin returns 404 after rewrite. Cause: Target URI does not exist on the origin. Fix: Confirm that the target path is valid and reachable at the origin server.

    Medianova Control Panelarrow-up-right
    APIarrow-up-right

    This workflow defines the primary caching behavior for URLs containing query strings.

    1

    Select the Query String Caching Mode

    Choose one of the following options under Query String Caching:

    • On — Cache each query string variant separately.

    • Off — Ignore all query strings; all variations map to a single cached object.

    • Request URI — Cache based on the full request URI, including query parameters exactly as received.

    2

    Submit the Configuration

    Click Submit to apply the selected caching mode.

    hashtag
    Configure Ignore Specific Query Strings

    Exclude selected query string parameters so they do not create separate cached variants.

    1

    Enable Ignore Specific Query Strings

    Toggle Ignore Specific Query Strings to On.

    2

    Enter Query Strings to Ignore

    Add one or more parameters that should not affect the cache key.

    3

    Submit the Configuration

    Click Submit to save the changes.

    hashtag
    Cache Specific Query Strings Only

    Build the cache key using only selected parameters and ignore all others.

    1

    Enable Cache Specific Query Strings Only

    Toggle Cache Specific Query Strings Only to On.

    2

    Enter Query Strings to Cache

    Add parameters that should be included in the cache key.

    3

    Submit the Configuration

    Click Submit to apply the rule.

    hashtag
    Behaviour

    • On: The CDN caches each unique query string as a separate variant.

    • Off: Query strings are ignored; all variants map to a single cached object.

    • Request URI: The full request URI is used as the cache key.

    • Ignore Specific Query Strings: Excluded parameters do not contribute to the cache key.

    • Cache Specific Query Strings Only: Only the selected parameters contribute to the cache key; all others are ignored.

    hashtag
    FAQ

    Do ignored parameters count toward the cache key? No. Ignored parameters never create new cache variants.

    Can both Ignore and Cache Specific modes be enabled together? No. Only one mode can be active.

    What happens if all modes are Off? All query variations serve the same cached response.

    Does enabling On increase cache fragmentation? Yes. Each query combination creates a separate cached object.

    Medianova Control Panelarrow-up-right
    APIarrow-up-right

    This feature does not control CDN → client compression. For client-side compression, see How to Configure Gzip and Brotli.

    Enable Gzip From Origin instructs the CDN to request text-based files from your origin using:

    When enabled:

    • The CDN requests gzip-compressed content from the origin. • If the origin supports gzip, the CDN stores the compressed version in cache. • If the origin does not support gzip, the CDN stores the uncompressed response.

    This improves performance and reduces bandwidth usage between the Origin → CDN path.

    hashtag
    How It Works

    CDN requests gzip-compressed content from the origin when this feature is enabled.

    The CDN sends Accept-Encoding: gzip to the origin. If the origin supports gzip, compressed content is returned and stored in the cache. If the origin does not support gzip, the CDN caches the uncompressed response.

    circle-info

    Applies only to text-based MIME types (.js, .css, .html, .txt, .xml, .json, …). Does not apply to images. Use Image Optimization instead.

    hashtag
    Enable Gzip from Origin

    You can enable this feature via the Medianova Control Panelarrow-up-right

    1

    Open CDN Resources in the left-hand menu.

    This section lists all CDN Resources available in your account.

    2

    Select a CDN Resource.

    circle-info

    This feature is available for Small, Large, and Dynamic CDN Resources.

    3

    Go to Advanced Configuration → Origin Settings.

    The tab displays all origin-related configuration options.

    4

    Enable Gzip from Origin and click Submit.

    This action saves your configuration and activates gzip fetching for text files.

    Medianova CDN starts sending the Accept-Encoding: gzip header to your origin for eligible file types.

    hashtag
    FAQ

    Does this feature compress content for end-users? No. It only optimizes the origin → CDN transfer. Client-side compression is handled separately by Gzip Delivery and Brotli Delivery.

    What if my origin does not support gzip? The CDN will fetch and cache the uncompressed version of the file.

    Does this apply to all file types? No. The feature applies only to text-based MIME types. Images are not affected and require Image Optimization.

    Accept-Encoding: gzip
    This workflow defines which origin responses allow the CDN to serve stale cached content.
    1

    Select stale cache triggers

    Choose one or more conditions from the trigger list. Stale content will be served when any selected condition occurs.

    Supported triggers in the Medianova Control Panel:

    • error — Generic error indicator returned by the origin system.

    • timeout — The CDN did not receive a timely response from the origin.

    • invalid_header — The origin returned malformed or unexpected HTTP headers.

    • http_500 — Internal Server Error.

    • http_502 — Bad Gateway.

    • http_503 — Service Unavailable.

    • http_504 — Gateway Timeout.

    • http_403 — Forbidden.

    • http_404 — Not Found.

    • http_429 — Too Many Requests (rate limit).

    • updating — The origin is in an update/maintenance state.

    2

    Save the configuration

    Select Submit to apply all changes.

    • Stale content is served only if a cached version already exists at the edge.

    • Any selected trigger can activate stale delivery.

    • When the origin becomes healthy again, normal cache rules resume automatically.

    • Stale Cache does not refresh or regenerate content; it only delivers the most recent cached copy.

    • This feature is intended for temporary failures, not extended outages.

    hashtag
    FAQ

    What happens if no triggers are selected? Stale content is never served.

    Will Stale Cache fetch new content? No. It serves only what is already cached.

    Does enabling all triggers hide origin problems? It may delay visibility of backend issues. Select triggers based on operational strategy.

    Does TTL affect stale delivery? TTL defines freshness; stale delivery allows fallback after TTL when origin issues occur.

    Medianova Control Panelarrow-up-right
    APIarrow-up-right
    You can configure X-CDN Header in the Medianova Control Panelarrow-up-right or via APIarrow-up-right

    When HSTS Protection is enabled:

    • The CDN adds a Strict-Transport-Security header to HTTPS responses.

    • Browsers cache the policy for the duration specified in the max-age parameter.

    • HTTP requests are redirected to HTTPS before the HSTS header is evaluated.

    • Optional parameters allow extending enforcement to subdomains and requesting preload inclusion.

    • The policy remains active in the browser until the max-age period expires.

    HSTS Protection configuration options in the Headers tab

    hashtag
    HSTS Response Header Format

    Depending on your configuration, the header may include:

    hashtag
    Configuration Options

    hashtag
    Max Age (Seconds)

    Defines how long the browser must enforce HTTPS for your domain. Common values:

    • 31536000 (1 year)

    • 63072000 (2 years)

    hashtag
    Include Subdomains

    When enabled, HSTS applies to all subdomains, not only the primary domain.

    hashtag
    Preload

    Requests inclusion in browser preload lists. (Preload requires max-age ≥ 31536000 and includeSubDomains to be enabled.)

    hashtag
    Use Cases

    • Enforce HTTPS-only access for compliance or security policies.

    • Reduce risk of downgrade/MiTM attacks.

    • Strengthen browser-side enforcement for high-value applications.

    • Ensure all subdomains—including those without valid HTTP → HTTPS redirects—are protected.

    hashtag
    Notes

    • HSTS applies only to HTTPS responses; the header is not sent over HTTP.

    • Incorrect configuration may block HTTP fallback paths if subdomains or legacy systems depend on them.

    • Preload inclusion requires submitting your domain to the global HSTS preload list.

    • Changing the HSTS max-age does not immediately remove the policy from browsers; they follow previously cached durations.

    Strict-Transport-Security: max-age=<seconds>
    Strict-Transport-Security: max-age=<seconds>; includeSubDomains
    Strict-Transport-Security: max-age=<seconds>; preload
    Strict-Transport-Security: max-age=<seconds>; includeSubDomains; preload
    hashtag
    Prefetch via Control Panelarrow-up-right
    1

    hashtag
    Enter File Path

    In the Path field, enter one file path per line. Each line must point to a specific file you want to prefetch.

    Examples:

    /videos/product_launch.mp4  
    /assets/images/banner.jpg  
    /css/style.css
    circle-info

    Wildcard paths (e.g. /images/*) are not supported.

    2

    hashtag
    Execute the Prefetch

    Click Prefetch Files to initiate the operation. Medianova will send an HTTP GET request to your origin for each file and cache the response.

    Once complete, those files will be ready for instant delivery from the CDN cache.

    Medianova’s Prefetch mechanism performs controlled fetch operations that proactively warm up cache layers. This eliminates the delay caused by a first-time cache miss and reduces origin load during peak demand.

    hashtag
    Monitor Prefetch Requests

    All Prefetch operations are listed in the Prefetch Log table below. Use this view to track the status and results of your Prefetch actions.

    Column

    Description

    Status

    Indicates whether the Prefetch operation is Running, Successful, or Failed.

    Task ID

    A unique identifier assigned to each Prefetch request.

    File Path

    Type of Prefetch

    circle-info

    Click the refresh icon to reload the Prefetch Log and check the latest results.

    Medianova Control Panelarrow-up-right
    Prefetch API

    Manage Rules & Actions

    The Web Application Firewall (WAF) allows you to define Custom Rules that specify how incoming traffic is evaluated. Each rule can match certain request attributes and apply an action — such as Block, Allow, or Log Only — when conditions are met.

    circle-info

    Managed Rules are automatically maintained by Medianova’s Security Team. Custom Rules are created manually to adapt the WAF to your specific application needs.

    1

    hashtag
    Access the Rule Management

    To manage rules, log in to the :

    1. Go to Security → WAF.

    2. Select your Dynamic CDN Resource.

    3. Open the Rules & Actions tab.

    You’ll see a list of existing Custom Rules and the option to create new ones.

    circle-info

    Managed Rules are always active by default. You can combine both Managed and Custom Rules for layered protection.

    2

    hashtag
    Create a New Custom Rule

    Follow these steps to add a new rule:

    1. Click Add Rule.

    3

    hashtag
    Edit or Delete Existing Rules

    You can modify or remove existing rules at any time:

    • Edit: Click the Edit icon next to a rule, adjust the fields or actions, and click

    hashtag
    Understand Rule Actions

    Each action defines how WAF handles a matched request:

    Action
    Behavior

    Note: “Log Only” is ideal for testing or monitoring potential issues before applying stricter blocking rules.

    Handle False Positives

    Learn how to identify, analyze, and minimize false positives in the Web Application Firewall (WAF) to ensure accurate protection without disrupting legitimate traffic.

    A false positive occurs when the WAF blocks or flags a legitimate request as malicious. This can happen due to aggressive rule patterns or incomplete exceptions. Proper handling of false positives helps maintain both security and availability of your applications.

    circle-info

    False positives are common during initial WAF configuration. Always start in Monitoring Only mode to observe behavior before activating full protection.

    1

    Identify False Positives

    Use WAF logs and analytics to locate requests that were incorrectly blocked or flagged.

    1. Open the .

    2. Go to Analytics → WAF Dashboard.

    3. Review blocked requests and event logs.

    2

    Analyze Rule Behavior

    Determine which rule caused the false detection. You can identify the Rule ID or Rule Name responsible by inspecting the event details in the WAF dashboard.

    Common Cause
    Example
    3

    Adjust Rules or Add Exceptions

    After identifying the cause, fine-tune your rules to allow legitimate traffic while keeping protection active.

    You can:

    • Modify an existing rule

    4

    Validate After Adjustments

    Once changes are made, monitor the WAF dashboard again:

    1. Keep the affected rule in Log Only mode for several hours or days.

    2. Check if the same requests are still flagged.

    CNAME & SSL

    Learn how to add and configure a CNAME to map your custom domain and enable secure HTTPS delivery.

    A CNAME record (Canonical Name record) allows you to associate your custom domain — for example, cdn.yourdomain.com — with the default hostname provided by Medianova, such as yourzonename.mncdn.com.

    Using a CNAME provides consistent brand identity, simplifies DNS management, and enables secure HTTPS delivery through the Medianova Control Panelarrow-up-right.

    hashtag
    Add a CNAME

    1

    Open your CDN Resource

    From the left menu, go to CDN → CDN Resources, and click the resource for which you want to add a CNAME.

    2

    Access the CNAME & SSL tab

    Select the CNAME & SSL tab from the horizontal navigation menu. The CNAME input field appears at the top of the tab.

    3

    Enter the CNAME value

    Type your custom domain (for example, cdn.yourdomain.com) in the input field and click Submit. The CNAME is saved and applied to your selected CDN Resource.

    4

    Create the DNS mapping

    In your DNS provider’s management panel, create a CNAME record that points your custom domain to the Medianova CDN hostname.

    Example:

    After DNS propagation, requests to your domain will resolve through Medianova’s CDN edge network.

    hashtag
    Configure SSL & TLS

    1

    Select an SSL certificate.

    In the SSL Certificate section, choose one of the available options from the Select SSL Certificate dropdown:

    • Shared SSL – Use Medianova’s shared certificate.

    circle-info

    For detailed SSL & TLS configuration instructions, see .

    hashtag
    Verification and Troubleshooting

    • DNS propagation may take several minutes depending on your DNS provider’s TTL configuration.

    • CNAMEs must be unique and not used by any other services (for example, mail or web hosting).

    • If you are using a Custom SSL, ensure the certificate covers all configured CNAMEs (via CN or SAN fields).

    hashtag
    Example (HTML Integration)

    When your CNAME configuration is active, you can replace original URLs in your web assets with the CDN domain:

    Your CNAME domain (for example, cdn.yourdomain.com) now resolves to Medianova’s edge network, serving cached content from your CDN Resource.

    Your CDN Resource is now accessible through your custom domain (for example, cdn.yourdomain.com). All requests to this domain are served securely via Medianova’s edge network using the configured SSL and TLS versions.

    Browser Cache Rule

    Configure browser-side caching behavior for different resource types using Browser Cache Rules.

    Browser Cache Rule allows you to control how long different resource types remain cached in the visitor’s browser.

    This improves performance by reducing repeated network requests for static or frequently accessed files.

    You can manage Browser Cache Rules in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    hashtag
    Configure Browser Cache Rules

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    1

    Add a Browser Cache Rule

    A dialog opens for creating a new Browser Cache Rule.

    2

    Select the Type for the rule.

    Choose how the rule matches content:

    hashtag
    Edit a Browser Cache Rule

    1

    Open the options menu for the rule and select Edit.

    2

    Modify Type, Priority, or Cache Mode as required.

    3

    Select

    hashtag
    Delete a Browser Cache Rule

    1

    Open the options menu for the rule and select Delete.

    2

    Confirm the deletion to remove the rule.

    3

    Select Submit to apply the update.

    • Rules are evaluated in order of Priority, where smaller numbers indicate higher precedence.

    • Browser Cache Rules control browser-side caching only, not CDN edge caching.

    • The Apply the HTML/JSON files toggle affects all rules globally.

    hashtag
    Best Practices

    • Use file extension rules to cache static assets like .js, .css, and .png for long durations.

    • Use no cache mode for frequently updated resources (e.g., .html, .json APIs).

    SSL/TLS Encryption

    Secure your CDN traffic and applications with SSL/TLS encryption to ensure private, authenticated communication between clients and servers.

    Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide encrypted communication between clients and servers. They ensure data privacy, integrity, and authentication—protecting your website and CDN-delivered assets against interception or tampering.

    Over time, the traditional HTTP protocol evolved into HTTPS, which uses SSL/TLS encryption to secure all data exchanged between users and websites. Medianova CDN supports HTTPS by default and allows you to manage SSL certificates directly through the platform.

    circle-exclamation

    TLS is the modern version of SSL. All Medianova services use TLS 1.2 and 1.3 for enhanced security and performance.

    WAF Analytics

    Learn how to interpret the Web Application Firewall (WAF) dashboard and key analytics metrics in the Medianova Control Panel.

    The WAF Analytics Dashboard provides visibility into malicious traffic, rule performance, and blocked requests detected by the Web Application Firewall (WAF). You can monitor attacks in real time, identify their sources, and adjust your rules to improve detection accuracy.

    circle-info

    Analytics data is available when WAF is active in either On or Monitoring Only mode.

    Create Small CDN Resource

    Learn how to create a Small CDN Resource in the Medianova Control Panel for static content delivery.

    A Small CDN Resource is optimized for small-sized static assets such as images, CSS, JavaScript files, and web fonts. It delivers these assets through Medianova’s global edge network to reduce latency and minimize load on your origin servers.

    You can configure a Small CDN Resource to:

    • Fetch content directly from your own server (Origin Pull), or

    • Serve content hosted on (Origin Push

    Integrating Static CDN Resource

    Learn how to integrate your Medianova Small or Large CDN Resource with your website to deliver static assets or large media files through the CDN.

    After creating a Small or Large CDN Resource in the , you must integrate it with your website or application so that your static and media assets are delivered through the CDN instead of your origin. This guide explains how to update your asset URLs, firewall configuration, and CMS settings to ensure seamless content delivery via Medianova CDN.

    hashtag
    Prerequisites

    Prefetch

    Proactively warm up CDN caches by fetching files from your origin before user access, ensuring fast delivery and avoiding cache misses.

    Prefetch refers to the process of proactively fetching and caching specific files from your origin before any user request occurs. It warms up CDN caches so that the first users receive content instantly, avoiding slow cache misses and offloading your origin server. When you initiate a Prefetch, the CDN pulls the file from your origin and caches it across all CDN POPs. This is especially effective for the delivery of large static or media files.

    circle-info

    Prefetch does not override existing cache entries. If the file is already cached, a prefetch request will not re-fetch it from origin.

    To force a refresh, perform a Purge first, followed by Prefetch

    Purge

    Instantly invalidate outdated cache entries across all Medianova CDN cache layers to ensure the latest content is delivered globally without waiting for TTL expiration.

    Purge invalidates cached content across the Medianova CDN before its cache lifetime (TTL) expires. It ensures that updated content from your origin is immediately reflected and consistently served from all cache layers worldwide.

    When a purge is executed, the Medianova purge system distributes invalidation commands across the CDN’s cache hierarchy. Cached objects are marked as expired and fetched again from your origin upon the next user request.

    You can trigger a purge from the or via .

    hashtag

    Integrate WordPress with Medianova CDN

    Learn how to integrate WordPress with Medianova CDN to deliver static and media content faster, improve page load times, and enhance your website’s overall performance.

    WordPress is one of the world’s most widely used content management systems (CMS), offering flexibility through open-source development, easy setup, and extensive theme and plugin support. With Medianova CDN, your WordPress site’s static assets—such as images, scripts, and videos—are served from the nearest CDN edge node instead of your origin server, ensuring faster delivery to global users.

    circle-info

    We recommend backing up your WordPress files and database before starting the integration.

    Integrate Magento with Medianova CDN

    Learn how to integrate your Magento-based e-commerce website with Medianova CDN to improve load speed and ensure high-performance content delivery.

    Medianova provides CDN solutions for leading e-commerce companies in Türkiye to enhance performance, scalability, and customer experience. If your website is built on Magento, you can configure a CDN integration to serve static and media content faster through Medianova’s global edge network.

    circle-info

    Before starting, we recommend backing up your Magento files and database.

    hashtag

    Medianova IP Blocks

    Obtain Medianova’s CDN IP address ranges for firewall allowlisting.

    Medianova’s CDN uses specific IP address ranges to fetch content from your origin servers. If your origin server uses a firewall or IP-based access controls, you must allow all addresses listed below to ensure reliable access from Medianova edge servers. This allows the CDN to retrieve and deliver your content securely and efficiently.

    hashtag
    Available Formats

    Format
    URL

    Whitelist

    Only the IP addresses you add will be allowed. All others will be blocked.

    Blacklist

    The IP addresses you add will be blocked. All others will be allowed.

    Created At

    Time when the Prefetch was initiated.

    Duration

    Total time the operation took to complete.

    Result

    Summary of the Prefetch

    Enter a Rule Name for easy identification.

  • Select a Field (parameter) from the dropdown — such as:

    • Request Method (GET, POST, etc.)

    • Client IP

    • Request URI

    • User Agent

    • Referrer

  • Choose an Operator, such as equals, contains, or matches.

  • Enter the Value to match.

  • (Optional) Add additional conditions using the And operator.

  • Select an Action to perform when the rule conditions are met:

    • Block – Reject the request and log the event.

    • Allow – Permit the request to proceed to origin.

    • Log Only – Record the request for review without blocking.

  • Click Save to apply the rule.

  • circle-info

    You can chain up to three conditions in a single rule. Complex logic combinations are not supported.

    circle-info

    Use “Log Only” for testing before switching to “Block” to minimize false positives.

    Save
    .
  • Delete: Click the Delete icon to permanently remove the rule.

  • Reorder (if supported): Drag and drop to change rule evaluation priority.

  • circle-info

    Review logs frequently to ensure that new or modified rules behave as expected.

    Block

    Immediately rejects the request with an error response.

    Allow

    Lets the request pass to the origin server.

    Log Only

    Records the event for analysis without blocking traffic.

    Medianova Control Panelarrow-up-right

    Look for requests that match normal user or API behavior but are classified as threats.

    circle-info

    Pay special attention to repetitive blocks from trusted IPs or common API endpoints — they are typical indicators of false positives.

    Strict User Agent filtering

    Blocking “curl” used in automated internal scripts

    Missing whitelist entry

    Internal monitoring IPs not excluded

    Outdated rule condition

    Old regex pattern still matching new endpoint

    circle-info

    Custom Rules take precedence over Managed Rules. If both apply, the Custom Rule’s action will execute.

    Adjust the Field, Operator, or Value for more precise matching.
  • Example: Change “contains /api” to “equals /api/admin”.

  • Change the rule action

    • Temporarily switch from Block to Log Only to monitor.

  • Add an exception rule

    • Allow requests from a specific IP, URI, or User Agent.

  • Whitelist internal services

    • Add known internal IPs (monitoring tools, API clients) to an allowlist.

  • circle-info

    Apply changes incrementally and review logs after each update to confirm resolution.

    If no false alerts occur, switch the rule back to Block mode.

    circle-info

    Do not disable Managed Rules globally to avoid temporary false positives. Always isolate and fix the specific rule causing the issue.

    Overly broad request URI match

    Blocking /api/v1/ instead of /api/v1/admin

    Medianova Control Panelarrow-up-right
    yourresourcename.mncdn.com/images/logos/logo.jpg”arrow-up-right
    http://yourdomain.comarrow-up-right
    yourresourcename.mncdn.comarrow-up-right

    All Files — Applies rule to all content.

  • Full Path — Applies to an exact URL path.

  • Directory — Applies to all content under a directory (for example: /images/).

  • File Extension — Applies to file types (for example: .jpg, .css, .js).

  • 3

    Set the Priority

    Select Priority to determine the rule evaluation order.

    4

    Select the Cache Mode.

    • Origin — Uses caching headers from the origin.

    • No Cache — Disables browser caching.

    • Cache — Forces caching for a defined duration.

    5

    Select Add to create the rule.

    6

    Configure HTML/JSON Application

    Enable or disable Apply the HTML/JSON files to define whether rules also apply to .html and .json responses.

    7

    Select Submit to apply

    Submit
    to save the changes.
    When Cache Mode = Origin, browser caching behavior follows origin headers; No Cache forces revalidation; Cache overrides browser behavior with a fixed duration.

    Assign high priority to specific full path or directory rules if they should override global rules.

    The 'Add Browser Cache Rule' dialog box appears after clicking Add.

    Full Path

  • Wildcard

  • Origin URI — Enter the incoming request path to match.

  • Target URI — Enter the new path that requests will be rewritten to.

  • Priority — Lower values are evaluated first when multiple Rewrite Origin URLs exist.

  • Enable Gzip from Origin

    Advanced Configuration

    Rewrite Origin URLs

    Learn how Rewrite Origin URLs modify request paths before forwarding dynamic traffic to origin servers.

    The Rewrite Origin URLs feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It rewrites incoming request paths based on defined match rules, allowing you to adjust backend routing for APIs, directory changes, or custom origin mappings. You can configure match modes, origin and target URIs, and rule priority to control how dynamic requests are transformed before reaching the origin.

    For configuration details, supported match modes, and examples, refer to the main documentation: Learn more in the Rewrite Origin URLs documentation.

    Enable Gzip from Origin

    Learn how Enable Gzip from Origin optimizes dynamic traffic by requesting gzip-compressed content from your origin.

    The Enable Gzip from Origin feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It instructs the CDN to include Accept-Encoding: gzip when requesting eligible text-based content from your origin. If the origin supports gzip, the CDN stores the compressed response; otherwise, it stores the uncompressed version. This reduces bandwidth usage on the origin → CDN path and improves overall delivery efficiency for dynamic workloads.

    For configuration details, supported MIME types, and examples, refer to the main documentation: Learn more in the Enable Gzip from Origin documentation.

    SNI
    – Use your organization’s uploaded certificate.
  • Custom SNI – Apply a specific SSL from your list.

  • Disabled – Turn off HTTPS for the resource.

  • 2

    Apply the changes.

    Click Submit to save the configuration. The selected SSL certificate will secure all CNAMEs assigned to this resource.

    3

    Configure TLS versions.

    At the bottom of the tab, enable supported TLS versions (recommended: TLS 1.2 and TLS 1.3). Click Submit to confirm.

    TLS 1.1 is deprecated and should remain disabled for security compliance.
  • To verify your configuration, run:

    The response should resolve to your Medianova CDN hostname.

  • SSL & TLS Encryptionarrow-up-right
    CNAME
    nslookup cdn.yourdomain.com
    cdn.yourdomain.com  CNAME  yourzonename.mncdn.com
    <!-- Origin URL -->
    <img src="http://yourdomain.com/images/logo.jpg" alt="">
    
    <!-- CDN URL -->
    <img src="http://cdn.yourdomain.com/images/logo.jpg" alt="">
    hashtag
    Why SSL/TLS Matters
    • Confidentiality: Encrypts all client–server communications.

    • Integrity: Prevents data alteration or man-in-the-middle attacks.

    • Authentication: Confirms your site’s identity through trusted Certificate Authorities (CAs).

    • Trust & SEO: HTTPS improves user confidence and search engine ranking.

    hashtag
    Supported SSL Certificate Types

    Medianova CDN supports all common SSL/TLS certificates. Choose the one that fits your infrastructure and domain structure.

    Certificate Type
    Description
    Recommended For

    Domain Validation (DV)

    Validates domain ownership only. Simple and fast to issue.

    Blogs, small websites

    Organization Validation (OV)

    Confirms both domain and company identity.

    Corporate or business sites

    circle-exclamation

    For setups serving multiple domains or subdomains, consider Wildcard or SAN-supported certificates to simplify management.

    Two-Layer Encryption Flow

    hashtag
    How SSL/TLS Works on Medianova CDN

    1. A user requests your content via HTTPS.

    2. The CDN edge node presents a valid SSL/TLS certificate.

    3. Encrypted communication is established between the client and the edge server.

    4. The edge communicates securely with your origin server (if origin SSL is configured).

    5. Data is delivered end-to-end through encrypted channels.

    hashtag
    Best Practices

    • Always use HTTPS for all CDN-enabled resources.

    • Prefer TLS 1.3 for stronger encryption and faster handshakes.

    • Keep certificates renewed before expiration to avoid service disruption.

    • Use Wildcard or SAN certificates to simplify certificate management.

    • Avoid mixed-content warnings by ensuring all assets (images, scripts) load over HTTPS.

    hashtag
    ‏‏‏‏‏‏‏‏

    hashtag
    Accessing the Dashboard

    You can access the WAF analytics from the Medianova Control Panelarrow-up-right. Navigate to Analytics → WAF, then select the CDN Resource for which WAF is enabled. The dashboard displays real-time charts, tables, and logs that visualize threat activity, blocked requests, and triggered rules.

    circle-info

    Metrics update automatically at short intervals, though the refresh rate may vary depending on your resource’s traffic volume.

    hashtag
    Key Metrics and Visualizations

    1. Attack Histogram

    Shows the number of attacks over time, helping you detect spikes or recurring patterns. You can filter by URL to analyze specific endpoints under attack.

    Use it for: spotting attack trends and determining peak hours of malicious traffic.

    2. Threats

    Displays the total number of requests that triggered WAF rules versus total incoming requests. Includes summary values such as:

    • Total: All detected threats since activation

    • Today: Threats detected in the last 24 hours

    • This Month / Last Month: Periodic comparison

    Use it for: measuring overall WAF effectiveness and identifying sudden spikes that may signal an attack.

    3. Top Client IPs

    Lists the IP addresses triggering the most WAF rules. A pie chart provides a quick visual overview of threat sources.

    Use it for: detecting potential attackers or regions generating malicious traffic.

    circle-info

    Repeated offenders can be blocked or rate-limited via Custom Rules.

    4. Top Request URIs

    Shows the URLs most frequently targeted by suspicious or blocked requests.

    Use it for: identifying vulnerable endpoints or popular attack targets. If a specific path (e.g., /login, /api/v1/auth) appears repeatedly, consider applying additional rule protections.

    5. Top User Agents

    Lists browsers, bots, or automated clients generating flagged requests.

    Use it for: distinguishing legitimate traffic from malicious bots. Unusual or outdated User Agents may indicate automated attack tools.

    6. Rule Activity

    Displays which WAF rules are triggered most often, showing their frequency and relative impact.

    Column
    Description

    Rule ID / Name

    Identifier of the triggered rule.

    Triggers

    Number of times the rule matched incoming requests.

    Last Triggered

    Most recent occurrence time.

    Use it for: assessing rule efficiency and identifying potential false positives. Frequently triggered rules may need refinement or condition adjustments.

    7. Activity Log (Last 300 Requests)

    Shows detailed information about the most recent flagged requests, including:

    • Timestamp

    • IP address

    • Request URI

    • User Agent

    • Triggered Rule

    Use it for: investigating incidents and validating rule accuracy. Regular review helps fine-tune your security posture.

    hashtag
    Best Practices

    • Review WAF analytics at least weekly to identify trends.

    • Watch for repeated attacks from the same IPs or regions.

    • Use the Threats and Rule Activity metrics to detect false positives or over-triggered rules.

    • Adjust or refine rules based on recurring attack patterns.

    • Combine analytics data with logs from your origin server for deeper context.

    arrow-up-right

    ).

    hashtag
    When to use a Small CDN Resource

    Use a Small CDN Resource only for static assets.

    For large files, video content, or downloadable media, use Large & VOD Streaming Resources instead.

    hashtag
    Create a Small CDN Resource

    circle-exclamation

    Unsupported file extensions Small CDN Resources do not support the following file extensions. Requests for these file types return 403 Forbidden responses. 3gp, 3gpp, aac, asf, asx, avi, f4v, flv, m2p, m4a, m4v, midi, mov, mp3, mp4, mpeg, mpg, ogg, ogv, wav, wm

    If your content includes any of these extensions, create a Large & VOD Streaming Resource instead.

    1

    Access the Create CDN Resource page.

    From the left menu, navigate to CDN → Create CDN Resource.

    2

    Select the resource type.

    In Select CDN Resource Type, choose Small.

    Selecting Small CDN Resource in the creation form.
    circle-info

    This option is optimized for static content such as images, CSS, and JavaScript files.

    3

    Enter general information.

    • Enter a CDN Resource Name. This name appears in your default CDN hostname (for example, example.mncdn.com).

    • (Optional) Enter a CDN Resource Label for internal reference.

    4

    Select the origin type

    Option 1: My Origin (Origin Pull)

    Medianova fetches content directly from your server when users request files.

    1. Select My Origin.

    5

    Create the resource.

    The new resource appears in the CDN Resources list.

    Configuration and availability are indicated by status icons:

    • Config Status: A green icon confirms that the configuration is valid.

    6

    (Optional) Configure your custom domain (CNAME).

    If you want to serve content using your own domain (for example, cdn.yourdomain.com) instead of the default hostname (example.mncdn.com), configure a CNAME record.

    circle-info

    To use your own domain instead of the default CDN hostname, add a CNAME under the CNAME & SSL tab of your CDN Resource. For detailed steps, see

    • Use Small only for static assets. For large files, video, or downloadable content, use Large & VOD Streaming instead.

    • Config Status and Resource Status icons confirm that your setup is complete.

    • If configuration fails, verify origin accessibility and port settings.

    hashtag
    Validate CDN delivery

    After creating the resource, test CDN connectivity using the following command:

    • Replace example.mncdn.com with your CDN URL. Use the Custom CNAME if it is configured.

    • Use a URL path that returns 200 OK.

    • This command sends a GET request to the CDN.

    • The output shows:

      • Remote IP address

      • HTTP request and response headers

    • The response body is intentionally discarded.

    If validation fails, verify that the origin server is reachable and that the configured port is accessible from the CDN.

    hashtag
    Troubleshooting

    • If configuration fails, verify origin accessibility and port settings.

    • Ensure DNS updates (especially Custom CNAME) have propagated before testing.

    • For SSL errors, confirm that the certificate matches the domain and is active.

    Stook Object Storage
    curl -svo /dev/null "https://example.mncdn.com/" --compressed
    A Small CDN Resource or Large CDN Resource already created in the Medianova Control Panel
  • Access to your website’s HTML, CSS, JS, or CMS configuration.

  • Ability to modify firewall rules on your origin server.

  • circle-info

    For websites with both static and video content, you can use separate CDN Resources (Small + Large) under the same account and domain structure.

    1

    hashtag
    Identify assets for CDN delivery

    List all assets that can benefit from CDN acceleration:

    • For Small CDN Resource: images, CSS, JavaScript, fonts, and similar static content.

    • For Large CDN Resource: videos, downloadable files, or other large media assets.

    2

    hashtag
    Update URLs in HTML code

    Replace existing URLs with the corresponding CDN URLs.

    Before
    After
    3

    hashtag
    Update CSS file references

    Update references inside CSS files (e.g., images, fonts, or icons).

    4

    hashtag
    Update JavaScript file references

    Ensure that all script sources are loaded from the CDN.

    Before
    After
    5

    hashtag
    Check relative paths

    Confirm that relative paths continue to work correctly after switching to CDN URLs. Adjust directory structures if required.

    6

    hashtag
    Verify all resources

    Open your website and confirm that assets load from CDN URLs.

    circle-info

    7

    hashtag
    Update CMS or framework settings

    If you use a CMS (WordPress, Drupal, Joomla, etc.), configure its CDN or performance plugin to automatically replace static URLs with CDN URLs.

    8

    hashtag
    Allow Medianova IPs in your firewall

    Add Medianova’s CDN IP ranges to your origin’s firewall allowlist to permit content fetches from edge servers. See

    circle-exclamation

    9

    hashtag
    Test in all environments

    Test both staging and production environments to ensure the CDN works correctly and does not break content delivery.

    10

    hashtag
    Monitor and optimize performance

    Use to monitor cache hits, latency, and traffic volume. Refine cache rules or resource paths if needed.

    11

    hashtag
    Review SEO and canonical tags

    When assets move to CDN URLs, update sitemaps and if required. Ensure that canonical tags still point to your main domain to prevent duplicate content indexing.

    Medianova Control Panelarrow-up-right
    .

    You can initiate Prefetch operations from the Medianova Control Panelarrow-up-right or via the API.

    hashtag
    When to Use Prefetch

    Use Prefetch to:

    • Preload content before a scheduled event, campaign, or content release

    • Ensure large static files (e.g., videos, software downloads) load instantly

    • Avoid cache-miss latency for the first user(s)

    • Offload your origin by serving assets from CDN edge locations

    hashtag
    How Prefetch Works

    1. You submit one or more file paths via the Medianova Control Panel or APIarrow-up-right.

    2. Medianova CDN initiates an HTTP GET request to your origin for each file.

    3. If the file is not already cached, it is fetched and stored across CDN edge locations.

    4. The file is then available to be served instantly to users from cache.

    circle-info

    Prefetch attempts to populate the file across all CDN edge caches to reduce latency globally.

    hashtag
    Prefetch Propagation & Behavior

    When you initiate a Prefetch, the CDN issues an HTTP GET request to your origin and stores the file in cache across all CDN POPs (Points of Presence). This ensures that the file is readily available globally, without waiting for actual user traffic to trigger cache population.

    Unlike Purge, which invalidates cached content, Prefetch only populates caches if the file is not already cached. If the file already exists in cache, Prefetch will not re-fetch it from origin.

    Behavior

    Description

    Single-file fetching

    Each Prefetch request targets one specific file path

    CDN-wide propagation

    Files are cached across all POPs

    TTL adherence

    Cache duration respects the file's Cache-Control or configured TTL settings

    Prefetch Type

    Medianova supports single-file Prefetch, which allows fetching and caching a specific file from your origin.

    Type

    Description

    Example

    Single File Prefetch

    Fetches and caches one specific file from your origin.

    /videos/intro.mp4

    circle-info

    Wildcard operations are not supported. Each Prefetch request must target a single file path.

    hashtag
    Best Practice Highlights

    • Prefetch only frequently accessed static files, such as videos, images, or large downloads.

    • Use Purge + Prefetch together to refresh caches after file updates.

    • Schedule Prefetch operations during off-peak hours to minimize origin load.

    • Avoid prefetching non-cacheable or dynamic resources.

    • Verify operation results in the Prefetch Logs section.

    circle-info

    Monitor your Prefetch efficiency using MN Logz Analytics.

    When to Purge Cached Content

    Use purge whenever:

    • Updated HTML, CSS, JS, images, or video files must be reflected immediately.

    • Outdated or sensitive content needs to be removed from CDN caches.

    • New deployments or configuration changes require instant cache refresh.

    • Consistency across all cache layers is required after a content update.

    circle-info

    Combine purge operations with shorter TTL values for dynamic or frequently changing content.

    hashtag
    Types of Purge

    Medianova supports multiple purge methods to give you flexibility and control:

    Type
    Description
    Example

    Single File Purge

    Removes one specific file from all CDN caches.

    /images/banner.jpg

    Wildcard Purge

    Removes multiple files using pattern matching.

    /images/*

    circle-info

    Wildcard purge operations are recursive and affect all subdirectories. To use wildcard patterns, the Wildcard Purge Suffix option must be enabled under CDN Settings.

    hashtag
    How Purge Works

    1. A purge request is initiated via the Medianova Control Panel or API.

    2. Medianova’s purge system distributes invalidation commands to all cache layers.

    3. Cached objects matching the path are marked as invalid and no longer served.

    4. On the next user request, the CDN retrieves the fresh content from the origin and re-caches it.

    circle-info

    Cache propagation completes rapidly, depending on node density, region count, and network conditions.

    hashtag
    Purge Propagation & Behavior

    Purge requests propagate through all layers of Medianova’s caching infrastructure extremely quickly – typically completing across our global network in under 5 seconds – ensuring that outdated content is swiftly replaced with fresh content worldwide.

    Behavior
    Description

    Instant Global Invalidation

    Cache invalidations propagate rapidly across all CDN cache layers.

    Parallel Distribution

    Purge commands are broadcast concurrently to all cache nodes for faster execution.

    Independent Caches

    Each CDN node manages its local cache separately; purge ensures global synchronization.

    circle-info

    A full purge (/*) removes all cached files for that resource and should be used only when necessary.

    hashtag
    Best Practices

    • Purge only what’s needed. Avoid full purges to reduce cache refill load.

    • Use specific paths instead of broad wildcard patterns whenever possible.

    • Automate with API purge to clear cache after deployments or content updates.

    • Monitor purge logs to verify completion (see Manage Purge).

    • Coordinate with TTL strategy. If content changes often, use shorter cache durations.

    Medianova Control Panelarrow-up-right
    API
    hashtag
    Prerequisites
    • Access to your WordPress Admin Panel

    • A Medianova CDN Resource created in the Medianova Control Panelarrow-up-right

    • Optional: Separate CDN resources for static images (Small Resource) and large media files such as videos (Large Resource)

    hashtag
    Integration Steps

    1

    hashtag
    Create a CDN Resource

    • Log in to the Medianova Control Panel.

    • Create a Small Resource for static assets (e.g., .jpg, .png) and a Large Resource for video files (e.g., .mp4). → Copy the CDN URLs of your created resources; they will be used in plugin configuration.

    2

    hashtag
    Install the Medianova CDN Plugin

    • Log in to your WordPress Admin Panel.

    3

    hashtag
    Configure the Plugin

    • After activation, go to Settings → CDN Medianova from the left menu.

    hashtag
    Tips and Best Practices

    • To include multiple file extensions, separate them with commas (,). Example: jpg, png, gif, svg

    • You can view your CDN Resource URLs in the Medianova Control Panel under CDN → Resources or by visiting Medianova CDN Integration Docsarrow-up-right.

    hashtag
    Troubleshooting

    Problem
    Cause
    Solution

    CDN URLs not applied to static files

    Plugin not configured or cache not cleared

    Recheck the CDN URLs in plugin settings and clear the WordPress cache.

    Site shows mixed content warnings

    HTTPS not enabled on CDN resource

    Configure Shared SSL or Custom SSL in the Medianova Control Panel before enabling HTTPS.

    Prerequisites
    • An active Medianova CDN Resource

    • Access to your Magento Admin Panel (Administrator role)

    • Optional: A configured Shared SSL or Custom SSL in the Medianova Control Panelarrow-up-right if HTTPS is required

    hashtag
    Integration Steps

    1

    hashtag
    Create a CDN Resource

    • Log in to the Medianova Control Panel.

    • Create a new CDN Resource for your Magento domain. → Once created, copy the Zone URL (for example: https://example.mncdn.com).

    2

    hashtag
    Access Magento Configuration

    • Log in to your Magento Admin Panel.

    3

    hashtag
    Configure Base URLs

    • Open the Base URLs section.

    4

    hashtag
    Save and Clear Cache

    • Click Save Config to apply the changes.

    hashtag
    Verify Integration

    After completing these steps, Magento will deliver static and media files via Medianova CDN.

    circle-info

    To confirm integration, check the HTML source code of your website. All asset URLs should begin with your CDN Zone domain (for example: https://example.mncdn.com).

    hashtag
    Optional: Configure HTTPS

    If your Magento site uses HTTPS, repeat the Base URL configuration steps for the Secure section as well.

    circle-info

    Ensure that you have configured Shared SSL or Custom SSL in the Medianova Control Panel before enabling HTTPS.

    hashtag
    Troubleshooting

    Problem
    Cause
    Solution

    CDN URLs not visible in HTML

    Magento cache not refreshed

    Go to System → Cache Management and flush all caches.

    Mixed content warning (HTTP/HTTPS)

    HTTPS not configured properly in Medianova

    Configure Shared SSL or Custom SSL before updating secure URLs.

    Description

    JSON

    Structured format with separate IPv4 and IPv6 lists. Useful for automation and API integrations.

    Plain Text

    Simple text file where each IP block is listed on a separate line. Suitable for manual import or quick reference.

    CSV

    Comma-separated values file suitable for importing IP blocks into spreadsheets or scripts.

    circle-exclamation

    Only allow traffic from Medianova’s IP ranges to reach your origin server (block all other sources). This practice secures your origin by preventing direct attacks and bypass attempts. Also ensure you include every address (both IPv4 and IPv6) in the allowlist. If any Medianova IP is omitted or blocked, the CDN cannot retrieve content from your origin.

    Configure Rate Limiting

    Rate Limiting helps manage client request traffic by defining thresholds on how many requests a user or IP can make within a specified time window. This feature operates at the CDN edge, preventing excessive traffic from reaching your origin servers and maintaining stable performance.

    circle-info

    Rate Limiting is available only for Dynamic CDN Resources in the Medianova Control Panelarrow-up-right.

    1

    Access the Rate Limiting

    To begin configuration, log in to the Medianova Control Panel and follow these steps:

    1. Navigate to Security → Rate Limiting.

    2. Select the Dynamic CDN Resource where you want to enable Rate Limiting.

    3. The configuration panel for that resource will open.

    circle-info

    If you don’t have a Dynamic CDN Resource yet, create one under CDN → Create CDN Resource, then return to the Security section.

    2

    Enable Rate Limiting

    Toggle the Rate Limiting option to On to activate the feature. Once enabled, you can define custom thresholds and actions for your selected resource.

    circle-info

    Disabling Rate Limiting immediately removes active enforcement rules but retains your configuration for future use.

    3

    Set Request Limits

    Specify the number of requests allowed per client within a given time interval.

    Field
    Description
    4

    Choose Rate Limit Option

    Define how bursts of traffic are handled when the limit is reached. Select one of the following modes from the dropdown:

    Option
    Description
    5

    Configure IP Whitelisting (Optional)

    Add trusted IP addresses or networks that should bypass rate enforcement.

    • Click Add Whitelist Entry.

    • Enter the IP address or range (e.g., 192.168.0.0/24

    6

    Define Actions for Exceeded Limits

    Specify what happens when a user exceeds the defined rate limit.

    Action
    Description
    7

    Save and Apply Configuration

    After defining all parameters, click Save to activate your Rate Limiting settings. The configuration takes effect immediately at the CDN edge.

    circle-info

    Test your configuration with real traffic or API calls to ensure it behaves as expected.

    8

    Verify and Monitor

    To confirm that Rate Limiting is working:

    • Send multiple requests exceeding your threshold to trigger enforcement.

    • Check the response code (429 or

    hashtag
    Path & Extension Based Rate Limiting

    Some parts of your application may require different rate limits — for example, to protect login endpoints or limit access to downloadable files — without affecting the entire CDN resource.

    With Path & Extension Based Rate Limiting, you can define request thresholds that apply only to specific URL paths (such as /login or /api/) or file types (like .pdf, .jpg, or .mp4). These rules are managed under the Page Rules section in the Medianova Control Panel and allow more granular control over how traffic is handled at the edge.

    Use this feature when you need to:

    • Apply stricter limits to sensitive routes such as /auth/, /checkout, or /login.

    • Restrict access to large media or document files.

    • Combine global rate limits with

    Learn more: See for configuration steps and advanced examples.

    Dynamic Content Acceleration

    Accelerate personalized, database-driven, or API-based content with Medianova’s Dynamic CDN. Cache dynamic responses at the edge to reduce origin load and deliver faster user experiences.

    Dynamic Content Acceleration delivers time-sensitive and user-specific content faster by intelligently caching dynamic responses at the CDN edge. Unlike static assets, dynamic content (such as personalized dashboards, API responses, or search results) is generated for each request, which can increase server load. Medianova’s microcaching technology allows these responses to be cached for very short durations — even a few seconds — dramatically improving responsiveness while keeping data up to date.

    This feature is available for Dynamic CDN Resources and can be managed through the Medianova Control Panelarrow-up-right.

    hashtag
    Why Use Dynamic CDN?

    Dynamic content caching enhances both speed and efficiency for high-traffic applications. It helps you:

    • Reduce origin load – Serve frequent requests directly from CDN edge nodes.

    • Improve page responsiveness – Cache HTML and API responses for short durations.

    • Lower bandwidth costs – Decrease redundant origin requests.

    circle-exclamation

    Use Dynamic CDN for applications where content changes often but not on every request — such as product listings, search results, or pricing data.

    hashtag
    Key Features

    • Microcaching – Cache dynamic responses for seconds or minutes to optimize performance.

    • Full Page Caching (FPC) – Cache entire HTML pages to reduce origin queries.

    • API Caching – Store API responses for repetitive or frequent calls.

    hashtag
    How It Works

    1. The origin server generates dynamic content in response to user requests.

    2. The Dynamic CDN edge caches the response for a short, configurable duration (e.g., 5 seconds).

    3. Repeated requests within that duration are served instantly from the edge cache.

    circle-check

    A product API returning inventory counts can be cached for 10 seconds — enough to handle hundreds of identical requests without stressing your database.

    hashtag
    Important Configurations

    Setting
    Description
    circle-exclamation

    Setting cache time too low may reduce cache efficiency, while setting it too high can risk serving outdated data. Start small and adjust gradually based on analytics.

    hashtag
    Best Practices

    • Exclude personalized or transactional pages (like /checkout or /profile) from caching.

    • Cache short-lived API responses to improve responsiveness.

    • Regularly monitor cache hit ratios to fine-tune TTLs and rules.

    Integrate CakePHP with Medianova CDN

    Learn how to integrate CakePHP with Medianova CDN to deliver static assets such as images, CSS, and JavaScript files faster and improve website performance.

    CakePHP is an open-source PHP framework based on the MVC (Model-View-Controller) pattern, similar to Zend, Laravel, and Symfony. This guide explains how to configure Medianova CDN for CakePHP version 2.4 and later, enabling your application to serve static content from the nearest CDN edge node instead of the origin server.

    circle-info

    Before starting the integration, back up your CakePHP project files and database.

    hashtag
    Prerequisites

    • A configured CDN Resource.

    • A running CakePHP 2.4+ application

    • Write access to your ./Config/bootstrap.php file

    hashtag
    Integration Steps

    1

    hashtag
    Create a CDN Resource

    • Log in to the .

    hashtag
    Troubleshooting

    Problem
    Cause
    Solution

    Integrate Phalcon with Medianova CDN

    Learn how to integrate Phalcon, a high-performance PHP framework, with Medianova CDN to serve static assets efficiently and enhance website performance.

    Phalcon is an open-source PHP framework designed for speed and efficiency. Unlike traditional PHP frameworks, Phalcon is implemented as a C extension, providing exceptional execution performance with MVC architecture support.

    This guide explains multiple integration methods for connecting Phalcon-based applications with Medianova CDN to deliver static files (CSS, JS, images) from the nearest CDN edge.

    circle-info

    Before integration, back up your project files and database.

    hashtag
    Prerequisites

    • A configured CDN Resource

    • Access to the Phalcon project source code

    • PHP 7.4 or later (recommended)

    hashtag
    Integration Methods

    1

    hashtag
    Use setStaticBaseUri

    The simplest way to integrate your Phalcon application with Medianova CDN is by defining a static base URI. This approach ensures that dynamic content stays on your origin, while static files (CSS, JS, images) are delivered via CDN.

    circle-info

    hashtag
    Troubleshooting

    Problem
    Cause
    Solution

    Create Dynamic Resource

    circle-info

    Aksela can integrate support for CNAME records, allowing domain mapping to another hostname instead of an IP address. However, some DNS providers do not support CNAME records at the root domain (example.com → ddd.mncdn.com) due to DNS standards. In such cases, only subdomains (e.g., www.example.comarrow-up-right → ddd.mncdn.com) can use CNAME records.

    Example: Supported (Subdomain CNAME):

    • www.example.com → example.mncdn.com

    • cdn.example.com → example.mncdn.com

    Not Supported by Some DNS Providers (Root Domain CNAME):

    • example.com → ddd.mncdn.com

    For root domains, ANAME or ALIAS records (if supported by the DNS provider) can be an alternative solution to achieve similar functionality.

    Aksela is a micro-caching platform developed by Medianova. Micro caching ensures that your content can be cached even for seconds. It serves static & dynamic content and API requests on your website through edge servers closest to end users.

    By laying between the origin server and the end user, Aksela both increases performance and provides an additional layer of security. In addition to the security measures provided by Aksela, WAF (Web Application Firewall) can be provided as an additional security service.

    1. You can access the by logging in with your username and password at

    1. Click on “CDN → Create CDN Resource” option from the menu on the left side of the panel.

    1. In the next screen, Dynamic CDN Resource is selected from the “Start building your CDN”

    1. Fill in the requested information for Dynamic CDN Resource.

    circle-info

    Your Origin URL and Website URL cannot be identical. To differentiate your Origin URL from your Website URL, you can follow one of the two following methods:

    • Login to your DNS hosting provider’s client panel and add an A record that points your origin address (different than the Website URL) on your DNS server. This will be the origin URL for Aksela to retrieve your site’s content.

    5 . When all the information is filled in correctly, the Dynamic CDN Resource is created by clicking the “Create CDN Resource” button. It will take a few minutes to be active on all edge servers. (When the “ping ” command is run, getting a response from an IP address means that the CDN Resource is active).

    Origin SNI Request

    Learn how to configure Origin SNI Request to ensure secure SSL/TLS connections between the CDN and your origin server.

    Origin SNI Request enables the CDN to send the correct Server Name Indication (SNI) value when establishing SSL/TLS connections with your origin. This ensures that the origin server selects the appropriate SSL certificate, especially when hosting multiple domains on the same IP address.

    Enabling this feature improves compatibility and prevents certificate mismatch errors during HTTPS communication.

    You can manage Origin SNI Request using the Medianova Control Panelarrow-up-right or APIarrow-up-right.

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.

    hashtag
    Configure Origin SNI Request

    Follow the steps below to enable and configure Origin SNI Request for your CDN Resource.

    1

    Enable Origin SNI Request

    Toggle Origin SNI Request to On.

    The domain input field becomes active.

    2

    Enter the SNI Domain

    hashtag
    How SNI Works

    During an SSL/TLS handshake, the CDN includes the SNI extension, which specifies the domain name requested by the client. This allows the origin server to:

    • Select the correct SSL certificate

    • Support multiple domains on a shared IP

    • Avoid certificate mismatch errors

    hashtag
    When to Enable Origin SNI Request

    Use this setting when:

    • Your origin serves multiple HTTPS domains from the same IP

    • The origin requires SNI to present the correct SSL certificate

    • You encounter HTTPS 421 or certificate mismatch errors

    hashtag
    What Happens if the Setting is Disabled

    If SNI is not sent:

    • The origin may return the wrong SSL certificate

    • HTTPS validation may fail

    • Dynamic requests may intermittently fail under multi-domain hosting setups

    hashtag
    Troubleshooting

    Issue: HTTPS requests fail with certificate mismatch. Cause: The origin returned the default certificate instead of the certificate for the requested domain. Fix: Enable Origin SNI Request and enter the correct domain.

    Issue: Origin returns 421 Misdirected Request. Cause: The origin requires SNI to route the request to the correct virtual host. Fix: Ensure the SNI domain matches the vhost configuration on the origin.

    Issue: Requests fail after enabling SNI. Cause: Incorrect domain entered in the Origin SNI Request Domain field. Fix: Confirm that the domain matches a valid certificate installed on the origin.

    How to Configure Gzip and Brotli

    Step-by-step instructions for how to enable and configure Gzip compression and Brotli compression.

    circle-info

    We recommend to always turn on Gzip and Brotli compression for small object delivery and dynamic content acceleration. All modern browsers support these content encodings and clients not supporting compression will receive the uncompressed version. Learn more about compression at Medianova.

    In the Medianova Panelarrow-up-right, select the appropriate CDN resource, navigate to the Optimization tab and select Text Optimization.

    The page shows two content blocks, one for Brotli Compression and one for Gzip Compression:

    The following steps apply to both Brotli Compression and Gzip Compression.

    1

    Toggle the Status to ON

    Click the Status toggle to turn on compression.

    circle-info

    Changing the toggle does not immediately change the CDN's behavior. You need to click Submit to push the updated config to the CDN

    2

    Shared Cache

    Define whether a CDN resource uses its own cache or shares a common cache structure across multiple accounts using the Domain Cache Key.

    Shared Cache allows multiple accounts or domains to use the same cache structure by applying a Domain Cache Key. When set to Share, identical content is cached only once and served across participating accounts, improving efficiency and reducing redundant origin requests. When set to Default, each account maintains its own isolated cache.

    You can manage Shared Cache in the Medianova Control Panelarrow-up-right or via APIarrow-up-right.

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.

    hashtag
    Configure Shared Cache

    1

    hashtag
    Select the Cache Status

    Choose one of the following options:

    • Default — Each account maintains a separate cache structure.

    hashtag
    Behaviour

    • When set to Share, CDN edge nodes use the same cache namespace for resources that match the Domain Cache Key.

    • Cache hits increase across accounts that serve identical content.

    • Changing the status does not purge existing cache; behavior changes apply to future caching operations.

    hashtag
    FAQ

    Does enabling Shared Cache expose content from one customer to another? No. Shared Cache only applies where explicit Domain Cache Key alignment exists and is intentionally configured.

    Does switching from Default to Share purge existing cache? No. Existing cached content expires naturally according to its TTL.

    When should Shared Cache be enabled? It is beneficial when multiple accounts deliver the same static assets (e.g., white-label platforms, partner domains).

    Create Large CDN Resource

    Learn how to create a Large CDN Resource in the Medianova Control Panel for large file delivery, video-on-demand (VOD), or streaming content caching.

    A Large CDN Resource is designed for large-sized objects such as video files, audio files, archives, and executable downloads. It provides optimized caching and delivery behavior for large payloads while reducing load on origin servers.

    Depending on your use case, you can configure one of the following delivery modes:

    • Large Content Caching for static large files

    • VOD Content Caching

    Advanced Origin Settings

    Define advanced origin routing rules by matching requests to specific origins based on URI patterns, protocols, domains, ports, and priority.

    Advanced Origin Settings allow you to configure granular origin-routing behavior for specific URIs, file types, or directories. By defining rule-based conditions, you can route selected traffic to different origins, override ports, set custom host headers, or assign priorities for complex routing environments.

    You can manage Advanced Origin Settings in the or via .

    Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Origin Settings tab.

    Advanced Origin Settings use rule-based logic. Each rule defines what request pattern to match and how the CDN should route that traffic.

    Aksela Test Steps

    1. The IP address of the CDN URL shared with you by the Medianova Technical Sales team or created via a Free trial can be found as follows.

    • The CDN URL is pinged by opening the Command Prompt. (CDN URL = <zone_name>.mncdn.com)

    Example: ping <zone_name>.mncdn.com

    Redirect Handle From Origin

    Learn how Redirect Handle From Origin manages origin-generated redirects and applies custom header logic for dynamic traffic.

    The Redirect Handle From Origin feature for Dynamic Content Acceleration operates the same way as in Static Content Delivery. It allows the CDN to process selected 3xx redirect responses returned by your origin and apply custom request or response headers. This provides consistent redirect behavior for dynamic workloads and ensures greater control over how clients receive redirected responses.

    For configuration details, supported redirect codes, and examples, refer to the main documentation: Learn more in the .

    Share — Cache is shared across accounts using the Domain Cache Key.

    2

    hashtag
    Submit the Configuration

    Click Submit to apply the selected cache status.

    When set to Default, each account's cache becomes isolated again.

    Origin-safe

    No effect if the file is already cached unless purged first

    Full CDN Resource Purge

    Clears all cached files for a specific CDN Resource.

    /*

    Auto Revalidation

    After purge, next requests trigger fresh pulls from the origin.

    In the left-hand menu, go to Plugins → Add New.

  • In the search bar, type Medianova and press Enter.

  • Install the Medianova CDN plugin and click Activate.

  • Enter your CDN URLs, specify the folders to include, and list file extensions to exclude.

  • Click Save Changes to apply your configuration.

  • CDN plugin not found in search

    Outdated WordPress version

    Update WordPress to the latest version and try again.

    Medianova CDN IP ranges (JSON)arrow-up-right
    Medianova CDN IP ranges (Text)arrow-up-right
    Medianova CDN IP ranges (CSV)arrow-up-right
    Redirect Handle From Origin documentation
    Scale efficiently – Handle large traffic spikes with consistent response times.
  • Balance freshness and performance – Configure cache rules to keep data relevant without overloading the origin.

  • Edge-based Caching – Execute caching at CDN edge locations to minimize latency.
  • Custom Page Rules – Exclude sensitive or real-time pages such as checkout or admin panels.

  • Granular Cache Control – Configure individual TTLs (cache durations) for different endpoints.

  • Once the TTL expires, the CDN refreshes the data from the origin to ensure freshness.

    Combine Dynamic CDN with Rate Limiting and WAF for performance and protection.

  • Use Compression and WebP Optimization to further reduce load times.

  • Cache Time (TTL)

    Determines how long dynamic responses are cached before being refreshed. Shorter TTLs maintain freshness; longer TTLs improve performance.

    Page Rules

    Define which paths should or should not be cached (e.g., exclude /checkout, /admin, or highly dynamic pages).

    API Endpoints

    Apply caching selectively to repetitive API calls (e.g., product listings, autocomplete, or pricing).

    Medianova Dynamic CDN
    Example:
    Origin URL - yourdomain.com
  • Fill in the Origin URL field using the IP address information instead of a URL. In that case, the Website URL has to be filled in the Origin Set header. This can be configured in CDN Resources → Headers settings, after Aksela CDN Resource is created.

    • Example: Origin URL - https://IP.IP.IP.IP Origin Set Header - yourdomain.com

  • Medianova Control Panelarrow-up-right
    cloud.medianova.comarrow-up-right
    example.mncdn.comarrow-up-right
    Provide the Origin SNI Request Domain:
    • Enter the domain name that should be included as the SNI value during SSL/TLS handshake.

    • Ensure this domain corresponds to a valid SSL certificate installed on your origin server.

    3

    Save the Configuration

    Click Submit to apply your settings. Origin SNI Request is now enabled for the CDN Resource.

    Extended Validation (EV)

    Highest validation level; displays organization name in browser UI.

    E-commerce, financial platforms

    Wildcard SSL

    Secures a domain and all its subdomains (e.g., *.yourdomain.net).

    Multi-subdomain services

    SAN (Subject Alternative Name)

    Covers multiple domains under a single certificate.

    Multi-domain architectures

    Code Signing SSL

    Used by developers to verify the integrity of software or drivers.

    Application signing, APIs

    Update the content types (optional)

    The page now shows a list of content types (or: MIME typesarrow-up-right) that are served compressed by default. You can add content types by typing the content-type in the Add Content Type field and clicking the + button.

    Remove a content type by clicking the small x icon to the right of the content-type.

    3

    Submit the changes

    Click the Submit button to push the updated config to the CDN.

    The period within which requests are counted (e.g., per second, per minute).

    circle-info

    Start with conservative thresholds and gradually adjust them based on traffic analytics.

    Permits short bursts instantly, without waiting for enforcement delay.

    None

    Strict enforcement. Requests exceeding the limit are immediately blocked.

    circle-info

    “Burst” modes are useful for high-traffic APIs or login pages where short spikes are expected.

    ).
  • Click Save to apply.

  • circle-info

    Whitelist internal monitoring systems or administrative users to prevent accidental blocking.

    Sends a verification challenge to the client before allowing further requests.

    You can also define the HTTP response code to be returned:

    • 429 — Too Many Requests

    • 529 — Custom throttling response

    circle-info

    Use Challenge mode only if you have challenge verification integrated on your frontend (e.g., CAPTCHA).

    529
    ).
  • Review request logs and metrics in Analytics → Rate Limiting Dashboard.

  • circle-info

    Metric visibility may take a few minutes after activation depending on traffic volume.

    path-level overrides
    for flexible traffic management.

    Request Limit

    The maximum number of requests allowed (e.g., 100).

    Burst

    Allows short spikes within the limit window before throttling begins.

    Block

    Rejects the request and returns an error response (default).

    Path & Extension Based Rate Limiting

    Time Interval

    Burst + No Delay

    Challenge

    Click Add and complete the Origin Settings:
    • Domain or IP

    • HTTP Port / HTTPS Port

    • Protocol

    • Host Header

    • (Optional) Origin SNI Request, Priority, and Weight if you add multiple origins.

    Option 2: Stook Object Storage (Origin Push)

    Medianova hosts your files on Stook Object Storage.

    1. Select Stook Object Storage.

    2. In Stook Bucket/Path, choose an existing Bucket and optional Subfolder.

    3. (Optional) Add a CDN Resource Label for internal tracking.

    Resource Status: A blue toggle indicates that the resource is active and enabled.
    for CDN Resource.
    CNAME

    <img src="https://yourdomain.com/images/example.jpg" alt="Example Image">

    <img src="https://CDN_URL/images/example.jpg" alt="Example Image">

    <script src="/scripts/example.js"></script>

    <script src="https://CDN_URL/scripts/example.js"></script>

    Use browser DevTools → Network tab to verify requests.
    If your origin firewall blocks Medianova IPs, CDN requests will fail. Always verify your allowlist configuration.
    Medianova IP Blocks
    MNLogz Analytics
    robots.txt
    /* Before */
    background-image: url('/images/background.jpg');
    
    /* After */
    background-image: url('https://CDN_URL/images/background.jpg');

    In the left-hand menu, go to Stores → Configuration.

  • Under the General section, select Web.

  • In the Base URL for Static View Files field, enter your Zone URL followed by /static/. Example: https://example.mncdn.com/static/
  • In the Base URL for User Media Files field, enter your Zone URL followed by /media/. Example: https://example.mncdn.com/media/

  • Navigate to System → Cache Management.
  • Select all cache types, click Submit, and then choose Flush Magento Cache.

  • Slow asset delivery

    Zone caching disabled

    Check the Zone settings in the Medianova Control Panel and ensure caching is active.

    Create a new CDN Resource for your application.
  • Copy your Resource URL (for example: https://example.mncdn.com/).

  • 2

    hashtag
    Define CDN Base URLs

    • Open the configuration file: &#xNAN;./Config/bootstrap.php

    • Add the following variables to define Medianova CDN paths for your assets:

    circle-info

    Replace <CDN_RESOURCE_URL> with your actual CDN Resource address, such as https://example.mncdn.com/.

    3

    hashtag
    Use the HTML Helper for Images

    Use the HtmlHelper::image() function to generate image URLs automatically through the CDN.

    <?php echo $this->Html->image('medianova-logo.png', ['alt' => 'Medianova Logo']); ?>

    Output:

    <img src="https://example.mncdn.com/img/medianova-logo.png" alt="Medianova Logo" />
    4

    hashtag
    Use the HTML Helper for CSS Files

    To load your CSS files from the CDN, use the HtmlHelper::css() function:

    <?php echo $this->Html->css('style.css'); ?>

    Output:

    <link rel="stylesheet" type="text/css" href="https://example.mncdn.com/css/style.css" />
    5

    hashtag
    Use the HTML Helper for JavaScript Files

    To load JavaScript assets from the CDN, use the HtmlHelper::script() function:

    <?php echo $this->Html->script('script.js'); ?>

    Output:

    <script type="text/javascript" src="https://example.mncdn.com/js/script.js"></script>
    6

    hashtag
    Verify Integration

    • Save your configuration and clear the CakePHP cache.

    • Open your website in a browser and view the HTML source (Ctrl + U).

    • Confirm that image, CSS, and JS assets are loaded from your Medianova CDN Resource.

    circle-info

    Example: https://example.mncdn.com/css/style.css

    HTTPS not enabled on CDN resource.

    Enable Shared SSL or Custom SSL in the Medianova Control Panel before using secure URLs.

    Assets still load from the origin server

    CDN URLs not defined or configuration not reloaded.

    Check the bootstrap.php entries and clear the CakePHP cache.

    Assets missing or 404 errors

    Incorrect CDN path or directory mismatch.

    Verify that your img, css, and js directories match the structure in your CDN Resource.

    Medianova Control Panelarrow-up-right

    Mixed content warning (HTTP/HTTPS)

    Replace <CDN_Resource_URL> with your actual CDN Resource URL (for example: https://example.mncdn.com/).

    2

    hashtag
    Use Asset Collections with Conditional CDN Prefix

    For more granular control, you can configure your asset collections to automatically switch between development and production environments.

    <?php
    
    $css = $this->assets->collection('header');
    $scripts = $this->assets->collection('footer');
    
    if ($config->environment == 'development') {
        $css->setPrefix('/');
        $scripts->setPrefix('/');
    } else {
        $cdnURL = 'https://<CDN_ZONE_URL>/';
        $css->setPrefix($cdnURL);
        $scripts->setPrefix($cdnURL);
    }
    
    $css->addCss('css/bootstrap.min.css')
        ->addCss('css/custom.css');
    
    $scripts->addJs('js/jquery.js')
        ->addJs('js/bootstrap.min.js');
    
    circle-info

    This method allows you to automatically use local assets in development and CDN-prefixed URLs in production.

    3

    hashtag
    Direct CDN Path in Asset Definition

    You can also directly define CDN-prefixed URLs when adding assets to your project.

    <?php
    $cdnURL = 'https://<CDN_ZONE_URL>/';
    $this->assets
         ->addCss($cdnURL . 'css/custom.css', false);
    4

    hashtag
    Verify CDN Integration

    After applying one of the methods above:

    1. Deploy your changes to the web server.

    2. Open your website in a browser.

    3. View the HTML source (Ctrl + U) and confirm that static file URLs begin with your CDN Resource domain.

    circle-info

    Example: https://example.mncdn.com/css/bootstrap.min.css

    HTTPS not enabled on CDN resource.

    Enable Shared SSL or Custom SSL in the before using HTTPS URLs.

    <?php
    
    $url = new Phalcon\Mvc\Url();
    
    // Dynamic URIs remain on your origin server
    $url->setBaseUri('/');
    
    // Static resources go through Medianova CDN
    $url->setStaticBaseUri('https://<CDN_ZONE_URL>/');
    

    Assets are still served from the origin

    The CDN prefix is not applied in code.

    Verify that setStaticBaseUri() or $css->setPrefix() includes your correct CDN Resource URL.

    Invalid asset paths

    The CDN prefix or local directory structure is incorrect.

    Check the path structure inside your assets directory and ensure the CDN path matches the file hierarchy.

    SSL-related warnings

    for media that requires adaptive streaming preparation
  • Streaming Content Caching for already packaged streaming protocols or live ingest with RTMP Push

  • Use a Large CDN Resource when delivering:

    • Large static files (for example, video files, audio files, .zip, .exe)

    • Video-on-demand content requiring adaptive streaming formats

    • Packaged streaming protocols such as HLS or DASH

    • Live streams pushed with RTMP Push and delivered over HTTP-based streaming protocols

    circle-info

    Do not use Large CDN Resources for small static assets such as images, CSS, or JavaScript files. Use Small CDN Resources for those use cases.

    hashtag
    Create a Large CDN Resource

    circle-exclamation

    Large CDN Resources do not support the following file extensions. Requests for these file types return 403 Forbidden responses.

    aspx, ashx, bmp, css, cur, gif, htm, html, ico, jpeg, jpg, js, pdf, php, png, psb, psd, svg, swf, swz, tif, tiff, txt, webp, woff, xml, eot, otf, ttf, jpr

    1

    Access the Create CDN Resource page.

    From the left menu, go to CDN → Create CDN Resource.

    2

    Select the resource type.

    In Select CDN Resource Type, choose Large, VOD & Streaming.

    Three configuration tabs appear:

    • Large Content Caching

    • VOD Content Caching

    • Streaming Content Caching

    3

    Configure delivery mode

    Choose the configuration tab that matches your content type.

    4

    Large Content Caching

    Use Large Content Caching for static large files such as videos, music, .zip, and .exe.

    • CDN Resource Name – Enter a short, descriptive name for your resource. → This name will appear in your default CDN hostname (for example, example.mncdn.com).

    5

    VOD Content Caching

    Use VOD Content Caching if you plan to deliver video content and need automatic packaging for streaming protocols.

    • CDN Resource Name – Provide a name for the VOD resource.

    • Source of Your Files

    6

    Streaming Content Caching

    Use Streaming Content Caching for packaged streaming protocols such as HLS, DASH, and Microsoft Smooth Streaming. It also supports RTMP Push for live stream ingest.

    • CDN Resource Name – Enter a short, descriptive name for your resource. → This name will appear in your default CDN hostname (for example, example.lg.mncdn.com).

    7

    Create the resource.

    1. Review the configuration.

    2. Click Create CDN Resource.

    The resource appears in the CDN Resources list.

    8

    (Optional) Configure your custom domain (CNAME).

    If you want to serve content using your own domain (for example, cdn.yourdomain.com) instead of the default hostname (example.mncdn.com), configure a CNAME record.

    circle-info

    To use your own domain, add a CNAME under the CNAME & SSL tab of your CDN Resource. For detailed steps, see

    • Use Large Content Caching for large, static files, VOD Content Caching for media that needs adaptive packaging, and Streaming Content Caching for packaged streaming protocols or live ingest with RTMP Push.

    • Config Status and Resource Status icons confirm that setup is complete.

    • If configuration fails, verify origin connectivity and port settings.

    hashtag
    Validate CDN delivery

    After creation, verify connectivity using the following command:

    • Replace example.mncdn.com with your CDN URL. Use the Custom CNAME if configured.

    • Use a URL path that returns 200 OK.

    A successful response confirms that the resource is active and accessible through Medianova’s edge network.

    hashtag
    Troubleshooting notes

    • If configuration fails, verify origin connectivity and port settings.

    • Ensure DNS changes (especially Custom CNAME records) have fully propagated before testing.

    • For SSL errors, confirm that the certificate matches the domain and is active.

    curl -svo /dev/null "https://example.mncdn.com/" --compressed
    hashtag
    Add an Origin Rule

    This workflow creates a new rule for routing selected requests to a specific origin configuration.

    1

    Open the Add Rule Dialog

    Select Add in the Advanced Origin Settings section to create a new routing rule.

    2

    Select the URI Match Mode

    Choose whether the rule should match an Exact Path, Prefix, File Extension, or Regex pattern.

    3

    Define the URI Match Rule

    Enter the URI, directory, extension, or expression that determines which requests will use this origin rule.

    4

    Select the Protocol

    Choose whether the CDN forwards requests using HTTP, HTTPS, or Same as Request.

    5

    Enter the Domain or IP

    Specify the origin host that the CDN should forward matched traffic to.

    6

    Configure HTTP and HTTPS Ports

    Enter the port numbers the CDN should use when communicating with the origin.

    7

    Set the Host Header

    Define a custom Host header if the origin requires a different hostname than the request URL.

    8

    Assign Priority

    Choose a priority value to control which rule applies if multiple rules match the same request.

    9

    Save the Rule

    Select Add to save the rule to the rule list.

    10

    Submit the Configuration

    Click Submit to apply all rule changes to the CDN resource.

    hashtag
    Edit an Origin Rule

    1

    Select the Rule To Edit

    Choose an existing rule from the list in the Advanced Origin Settings section.

    2

    Modify the Required Fields

    Update match conditions, origin host, ports, or priority values.

    3

    Save the Updated Rule

    Click Submit to apply the updated configuration.

    hashtag
    Delete an Origin Rule

    1

    Remove the Rule

    Select the delete icon next to the rule you want to remove.

    2

    Confirm Deletion

    Submit the change to finalize the removal.

    hashtag
    Behaviour

    Advanced Origin Settings follow a priority-based evaluation model:

    • Highest priority wins. Lower numeric values represent higher priority.

    • If multiple rules match the incoming request, the CDN applies the rule with the highest priority.

    • If no rules match, the CDN uses the default origin configuration.

    Routing decisions consider:

    • URI match pattern

    • Origin protocol selection

    • Domain/IP

    • Ports

    • Host header

    This allows precise routing for APIs, media directories, file extensions, or multi-origin deployments.

    hashtag
    FAQ

    What happens if multiple rules match the same request?

    The rule with the highest priority (lowest priority number) is applied.

    Do regex or prefix rules impact performance?

    Regex rules are more expensive than prefix or extension matches. Use them only when necessary.

    What if no Advanced Origin rule matches the request?

    The request is sent to the default origin defined in the main Origin Settings section.


    hashtag
    Streaming Content Caching

    For Streaming Content Caching resources, Advanced Origin Settings use a different structure based on Origin Groups and URI Match Rules.

    Instead of defining individual origin rules directly, you first create origin groups containing one or more origins, then create URI match rules that route traffic to those groups.

    Advanced Origin Settings for Streaming Content Caching – Origin Groups and URI Match Rules sections

    The page has two sections:

    • Origin Groups – Define groups of origins for load balancing and failover.

    • URI Match Rules – Assign URI patterns to origin groups to route traffic.

    circle-info

    You must create at least one origin group before you can add URI match rules.

    hashtag
    Create an Origin Group

    You can create up to 50 origin groups, and each group can contain up to 25 origins.

    1

    Open the Add Origin Group Dialog

    Click Add group in the Origin Groups section.

    Add Origin Group Settings dialog
    2

    Configure the Origin Group

    Fill in the following fields:

    • Group Name – Enter a descriptive name for the group.

    • Protocol – Choose HTTP, HTTPS, or Same as Request.

    • Domain or IP – Specify the origin server address.

    • HTTP Port / HTTPS Port – Enter the port numbers for origin communication.

    • Host Header – (Optional) Define a custom Host header if the origin requires it.

    • Weight – Set a weight value for traffic distribution within the group.

    • Priority – Choose Primary or Backup to define failover behavior.

    Click Add to add the origin to the group.

    3

    Submit Origin Groups

    After adding all origins, click Submit groups to save the configuration.

    You can add more origins to the same group or create additional groups by clicking Add group again.

    hashtag
    Add a URI Match Rule

    After creating origin groups, define URI match rules to route traffic to the appropriate group.

    1

    Open the Add Rule Dialog

    Click Add rule in the URI Match Rules section.

    Add Rule dialog – select match mode, enter rule, and assign an origin group
    2

    Configure the Rule

    Fill in the following fields:

    • URI Match Mode – Choose File Extension, Exact Path, Prefix, or Regex.

    • URI Match Rule – Enter the pattern to match (for example, .m3h8 for HLS manifest files).

    • Origin Group – Select the origin group that should handle matched requests.

    Click Add to create the rule.

    3

    Submit URI Match Rules

    You can reorder rules by dragging the handle icon (≡) on the left side of each rule — the rule at the top has the highest priority.

    Click Submit rules to apply the URI match rules to the CDN resource.

    Medianova Control Panelarrow-up-right
    APIarrow-up-right

    The IP address retrieved above is written to the “host” file of your computer.

    • Open the Run tab by pressing the Windows key + R.

    • Type system32 in the search bar and click ok.

    • On the screen that opens, navigate to the drivers folder and open it.

    • Navigate to the etc folder in the “drivers” folder and open it.

    • Right-click on your “host” file and choose open with. Edit it with one of the applications such as Notepad or Notepad++.

    • Add the IP address you obtained in the first step and the website you want to reach using this IP address and save the file as shown below.

    • Clear the browser cache. Make a request to the page by typing yourdomain.comarrow-up-right in the address bar. After opening the page, right-click on an empty area and select inspect. The Network tab will open. Verify that the .html file comes from Medianova when you see the MNCDN description under the Server tab.

    arrow-up-right

    Upload and Manage SSL Certificates

    Learn how to upload and manage SSL certificates in the Medianova Control Panel.

    SSL/TLS certificates enable encrypted HTTPS communication between users and CDN Resources. You can upload your own certificate, use Medianova’s shared SSL, or activate a free certificate provided by Let’s Encrypt.

    circle-info

    TLS is the modern version of SSL. All Medianova services support TLS 1.2 and TLS 1.3 by default.

    1

    Access the SSL Management Page

    To start managing SSL certificates, open the and navigate to the SSL Management section.

    • Go to CDN → SSL Management in the left-hand menu.

    • Review the list of existing certificates in your organization.

    • Click Add New SSL to begin adding a certificate.

    2

    Add a New SSL Certificate

    When adding a certificate, you will be asked to choose the SSL type and format.

    Choose SSL Type

    Option
    Description
    3

    Assign SSL to a CDN Resource

    After uploading or creating your certificate, assign it to a specific CDN Resource.

    • Go to CDN → CDN Resources.

    • Open the SSL tab (or CNAME & SSL for Small and Large resources).

    4

    Manage and Validate SSL Certificates

    From the SSL Management page, you can:

    • Edit SSL Name – Rename an existing certificate.

    • Replace SSL – Upload a new certificate to replace an expired one.

    Redirect Handle From Origin

    Learn how to manage Redirect Handle From Origin to control how 3xx redirect responses from your origin are processed by the CDN.

    Redirect Handle From Origin allows the CDN to modify request or response headers when the origin returns a 3xx redirect.

    You can select which redirect codes to handle and optionally add or modify headers sent during redirection.

    This provides greater control over origin-driven redirects and ensures consistent client behavior.

    You can manage Redirect Handle From Origin using the Medianova Control Panelarrow-up-right or the APIarrow-up-right.

    In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings

    hashtag
    Redirect Handle From Origin

    Follow the steps below to enable and configure redirect handling for your CDN Resource.

    1

    Enable Redirect Handling

    Toggle Status to On.

    Additional configuration options become active.

    2

    Select Redirect Codes to Handle

    hashtag
    Redirect Handling Logic

    When the origin returns a selected 3xx status code:

    1. CDN intercepts the response.

    2. CDN adds or modifies headers based on your configuration.

    3. The redirect is returned to the client with the updated headers.

    hashtag
    Header Processing

    • Request Header Key / Value modifies the header sent from CDN → Origin.

    • Add Header Key / Value appends additional headers in redirection processing.

    hashtag
    Status Toggle

    • When On, CDN evaluates redirect codes and applies your header settings.

    • When Off, CDN forwards redirect responses without modification.

    hashtag
    Troubleshooting

    Issue: Redirect handling does not apply. Cause: Status toggle is disabled or no redirect codes are selected. Fix: Enable Status and choose at least one code under Handle Origin Redirection Error.

    Issue: Headers are not appearing in redirected responses. Cause: Header Key or Value fields are empty. Fix: Ensure both fields are filled before selecting Add.

    Issue: Redirect behavior is inconsistent. Cause: Origin and CDN redirect configurations conflict. Fix: Review origin redirect rules and ensure the CDN's configured headers do not override necessary behavior.

    How to Purge

    Learn how to invalidate cached content instantly across all Medianova CDN

    You can manage Purge operations in the Medianova Control Panelarrow-up-right or via API.

    Log in to the Medianova Control Panel, select a CDN Resource in the CDN section, and navigate to the Purge tab.

    hashtag
    Purge Cached Files

    Purge instantly invalidates cached content across all Medianova CDN cache layers. Use this feature when updated content is not yet reflected or when outdated assets need to be refreshed.

    1

    hashtag
    Enter File Path

    In the Path field, type the exact file or directory path you want to purge. You can specify multiple paths by entering one per line.

    Example:

    2

    hashtag
    Use Wildcards

    You can use the * symbol to purge multiple files within a directory.

    Examples:

    3

    hashtag
    Execute the Purge

    Click Purge Files to start the invalidation. Medianova CDN will distribute the purge request to all cache layers and mark the specified objects as expired. The next request will automatically fetch the latest version from your origin.

    Medianova’s purge mechanism rapidly invalidates content across every cache layer (from edge nodes to core caches), usually finishing propagation within seconds under normal conditions. This near-immediate purge completion means users around the world see the updated content almost instantly after you purge.

    hashtag
    Monitor Purge Requests

    All recent purge operations are listed in the Purge Log table below. Use this view to track the status of your requests.

    Column
    Description
    circle-info

    Click the refresh icon to reload the log and check the latest results.

    Analytics

    Static CDN is primarily used for delivering fixed content, such as images, CSS files, and JavaScript files. These resources are typically unchanged, which allows for faster delivery through a CDN. The Static CDN Analytics section provides key metrics that help monitor, analyze, and optimize the performance of static content delivery. These metrics focus on the caching effectiveness, the amount of traffic being served from the cache versus the origin server, and the overall bandwidth usage.

    hashtag
    Traffic

    • Total Traffic: This chart displays the total amount of traffic delivered during a selected time range. Users can view the traffic over a

    Path & Extension Based Rate Limiting

    hashtag
    Overview

    Path & Extension Based Rate Limiting allows you to define traffic limits based on specific URL paths and/or file extensions (e.g., /api , /login, .pdf, .jpg). This enables targeted protection for sensitive endpoints or static resources by enforcing custom request limits per rule.

    Manage Page Rules

    Learn how to add, edit, clone and delete page rules in the Medianova Panel.

    You can manage Page Rules in the or via .

    Log in to the , select a CDN resource in the CDN section and navigate to the Page Rules tab.

    hashtag
    Turn on Page Rules

    By default, Page Rules is disabled. Click the Status toggle to turn on Page Rules.

    Medianova Control Panelarrow-up-right
    Open Handle Origin Redirection Error and choose one or more redirect status codes that the CDN should process.

    These codes determine which 3xx responses from your origin will trigger redirect handling logic. When a selected code is returned by the origin, the CDN applies your configured header settings and processes the redirect instead of simply passing it through unchanged.

    Supported redirect codes:

    • 301 — Permanent redirect

    • 302 — Temporary redirect

    • 303 — See Other

    • 307 — Temporary redirect (method is preserved)

    • 308 — Permanent redirect (method is preserved)

    The CDN will apply your redirect-handling configuration only to the selected status codes, giving you granular control over how different redirect types are processed.

    3

    Configure Request Headers (Optional)

    Enter a Request Header Key and Request Header Value if you want to include or modify request headers when a redirect occurs.

    Examples:

    • Request Header Key: User-Agent

    • Request Header Value: Custom-UA

    If you do not need to change request headers, leave these fields empty.

    4

    Add Custom Headers (Optional)

    Use Add Header Key and Add Header Value to specify additional headers that should be appended during redirect handling.

    Examples:

    • Add Header Key: X-Debug-Redirect

    • Add Header Value: true

    These headers are included in redirected requests or responses depending on your configuration.

    5

    Save the Configuration

    Select Add to register your header definitions. Then click Submit to apply the Redirect Handle From Origin settings. Redirect handling is now active for your CDN Resource.

    Origin group with added origins – click Submit groups to save
    URI match rules list – drag the ≡ handle to reorder priority, then click Submit rules to apply

    /images/* — removes all files and subdirectories inside /images/

  • /images/im* — removes files starting with “im”

  • Time the purge was initiated.

    URLs

    Number of URLs affected.

    Running / Successful / Failed

    Summary of the operation result.

    Status

    Shows whether the purge is Running, Successful, or Failed.

    Task ID

    A unique identifier for each purge operation.

    File Type

    Type of purge

    Created At

    <?php
    Configure::write('App.imageBaseUrl', 'https://<CDN_ZONE_URL>/img/');
    Configure::write('App.cssBaseUrl',   'https://<CDN_ZONE_URL>/css/');
    Configure::write('App.jsBaseUrl',    'https://<CDN_ZONE_URL>/js/');
    /myimages/subfolder/image.png
    /assets/css/*

    Source of Your Files

    • My Origin (Origin Pull) – Medianova fetches content directly from your server.

      • Click Add and complete:

        • Domain or IP

        • HTTP Port / HTTPS Port

        • Protocol

        • Host Header

        • (Optional) Origin SNI Request, Priority, Weight if multiple origins exist.

    • Stook Object Storage (Origin Push) – Medianova hosts your files.

      • Choose your Stook Bucket / Path.

      • (Optional) Add a CDN Resource Label.

  • My Origin (Origin Pull) – Specify your Origin URL (for example, https://www.example.com).

  • Stook Object Storage (Origin Push) – Choose a Stook Bucket/Path.

  • (Optional) Enable Medianova VOD Packaging to automatically prepare your MP4 files for streaming protocols (HLS, DASH).

  • Set FTP Password and Confirm Password to upload files if required.

  • CDN Resource Label – (Optional) Add a label for identification.

  • Source of Your Files

    My Origin (Origin Pull)

    Select My Origin to pull content from your own server.

    • Click Add and complete:

      • Domain or IP

      • HTTP Port / HTTPS Port

      • Protocol

      • Host Header

      • (Optional) Origin SNI Request, Priority, Weight if multiple origins exist.

    RTMP Push

    Select RTMP Push to push live streams directly from an encoder.

    • RTMP Username Username used by the streaming encoder

    • RTMP Password Password used by the streaming encoder

    RTMP streams pushed to Medianova servers are delivered via HTTP-based streaming protocols.

    After you create the resource, use to define SMIL streams and quality profiles.

  • CDN Resource Label – (Optional) Add a label for identification.

  • Configuration and availability are shown by status icons:
    • Config Status A green icon confirms that the configuration is valid.

    • Resource Status A blue toggle indicates that the resource is active and enabled.

    for CDN Resource.
    Select Large, VOD & Streaming resource type
    Select the Large, VOD & Streaming resource type.
    CNAME

    Free SSL

    Use a free SSL certificate automatically issued by Medianova (Let’s Encrypt).

    Click Next after selecting the desired option.

    circle-info

    Choose Free SSL for quick setups. Use Own SSL for organization-validated certificates or wildcard support.

    Own SSL Setup

    If you selected Own SSL, choose a certificate format and provide the required information.

    Choose Certificate Format

    Format
    Description

    Domain SSL

    Extract an existing certificate directly from your domain if HTTPS is enabled.

    .crt / .pem / .key (Paste Content)

    Paste your certificate, private key, and CA chain into the input fields.

    .crt / .pem / .key (Upload File)

    Upload the certificate and private key files directly from your device.

    circle-info

    Ensure that your certificate and private key match. Uploading mismatched pairs will result in an error.

    Field Descriptions

    Field
    Description

    SSL Name

    Internal display name for your SSL certificate.

    Domain Name

    Domain or wildcard domain to secure.

    Certificate (.crt)

    Public certificate file for HTTPS validation.

    Free SSL Setup

    If you selected Free SSL, fill in the following details:

    Field
    Description

    SSL Name

    A name to identify the certificate in your organization.

    Wildcard

    Toggle this option to secure all subdomains under the same domain.

    Domain

    Select the CDN domain to apply the certificate.

    Click Add Free SSL to issue and install your certificate automatically.

    circle-info

    Free SSL certificates are valid for 90 days and are automatically renewed by Medianova.

    circle-info

    Free SSLs are ideal for fast deployment or non-critical environments.

    • Select one of the following options:

      • SNI (Own SSL): Use your uploaded SSL certificate.

      • Shared SSL: Use Medianova’s shared certificate.

    • Click Save to apply the changes.

    circle-info

    Resource tab names differ by product type.

    Small/Large Resources: CNAME & SSL

    Streaming/VOD/Dynamic: SSL

    Delete – Remove unused or expired certificates.

    circle-info

    Always upload the complete certificate chain (Leaf + Intermediate + Root) to avoid browser trust warnings.

    Component
    Description

    Leaf Certificate

    The primary certificate for your domain.

    Intermediate Certificates

    Bridge between the leaf and the root authority.

    Root Certificate

    Trusted by browsers and operating systems.

    Full Chain = Leaf + Intermediate (+ Root)
    circle-info

    Uploading only the leaf certificate may cause incomplete validation. Always include the full chain.

    Own SSL

    Medianova Control Panelarrow-up-right

    Upload your own SSL/TLS certificate issued by a Certificate Authority (CA).

    custom time range
    or compare it with the
    previous time range
    to understand the trends and fluctuations in traffic. A significant increase in traffic indicates that the content is being accessed more frequently, which can be beneficial for scaling infrastructure and improving cache efficiency.
    • Traffic in Time: This chart provides insights into traffic variations over time. By analyzing traffic patterns, you can identify spikes in demand, possibly caused by promotions, seasonal events, or viral content. It also helps determine when content delivery peaks, assisting in optimizing server performance during high-traffic periods.

    • Cached vs Non-Cached: This chart compares traffic served from the cache versus traffic retrieved from the origin server. High cache traffic indicates that most of the data is being served efficiently from the CDN, reducing load on the origin server and speeding up delivery to end-users. A low cache hit ratio might indicate a need for better cache configuration or optimization.

    • Cached Data: This chart shows the breakdown of cached data into hits, updating, and stale categories:

      • Hits: Content successfully retrieved from the cache.

      • Updating: Content that is currently being updated in the cache.

      • Stale: Content served from the cache that is outdated because the origin server did not respond in time. These metrics are crucial for understanding cache freshness and the efficiency of the content delivery process.

    • Non-Cached Data: This chart shows the amount of data retrieved from the origin server, broken down into miss and expired categories:

      • Miss: Content that was not found in the cache and had to be fetched from the origin server.

      • Expired: Cached content that has expired and needs to be fetched again from the origin server. A higher proportion of non-cached data suggests that caching is not being utilized effectively, which could lead to higher latency and bandwidth usage.

    hashtag
    Bandwidth

    • Bandwidth: This chart shows the total bandwidth used for delivering static content. High bandwidth usage might indicate large file sizes or a high volume of requests, which can be optimized through compression, better cache utilization, or content delivery strategies.

    • Cached vs Non-Cached: This chart compares the bandwidth used for cached versus non-cached data. Ideally, cached data should consume most of the bandwidth, as it reduces the need for repetitive fetching from the origin server, resulting in faster load times and reduced network strain.

    hashtag
    Requests

    • Total Requests: This chart displays the total number of requests made for static content. A high number of requests indicates active content consumption, which is useful for monitoring content popularity and server load.

    • Hits vs Misses: This chart compares the number of requests that resulted in a cache hit versus a cache miss. A higher hit ratio is ideal, as it indicates that the CDN is effectively serving content from the cache, reducing the need to contact the origin server.

    • Request Hits: This chart shows detailed information on hits, broken down into hit, updating, stale, and revalidated categories:

      • Updating: The content is in the process of being updated.

      • Stale: The content is outdated and served while awaiting a response from the origin server.

      • Revalidated: The cached content has been successfully revalidated with the origin server and is now fresh. These metrics provide insights into the cache's efficiency and freshness.

    • Request Misses: This chart shows detailed information on misses, broken down into miss and expired categories:

      • Miss: The content was not found in the cache and was fetched from the origin server.

      • Expired: The cached content expired and had to be retrieved from the origin server again. Analyzing this data helps in understanding the reasons for cache misses and optimizing cache configurations.

    hashtag
    Tier Filter

    A Tier Filter dropdown is available next to the All Resources selector. This filter defines which CDN layers are included in the request data.

    Option
    Description

    Edge only (default)

    Displays requests from end users. Excludes internal CDN tiers.

    All

    Displays total requests from Edge + Mid + Origin layers. May include repeated counts of the same request across tiers.

    Tooltips appear on hover for desktop and via an info icon on mobile. The selected filter is also reflected in exported reports.

    Example report titles: Requests - Edge only Requests - All

    API parameter: tier=edge or tier=all (default = edge)

    hashtag
    Status Codes

    • Total Requests: This chart displays the total number of requests, helping you track overall activity and performance.

    • Status Code Structure: This chart compares the distribution of different HTTP status codes:

      • 2xx: Successful responses (e.g., 200 OK).

      • 3xx: Redirects (e.g., 301, 302).

      • 4xx: Client errors (e.g., 404, 403).

      • 5xx: Server errors (e.g., 500, 502). Monitoring these status codes helps identify potential issues in content delivery and client-side or server-side errors.

    • Successful Responses (2xx): This chart shows the distribution of successful responses, particularly focusing on the 200 OK code and other 2xx codes. High 2xx responses indicate that the CDN is successfully delivering content.

    • Redirects (3xx): This chart displays the distribution of redirect codes (301, 302, etc.). Redirects can indicate changes in content location, which should be minimized for optimal performance.

    • Client Errors (4xx): This chart shows errors on the client side, such as 403 (Forbidden), 404 (Not Found), and 429 (Too Many Requests). A high number of client errors suggests that users are requesting unavailable content or facing access issues.

    • Server Errors (5xx): This chart shows server-side errors, such as 500 (Internal Server Error), 502 (Bad Gateway), and 504 (Gateway Timeout). These errors indicate issues on the origin server and require attention to ensure smooth content delivery.

    hashtag
    Tier Filter

    Status code metrics also reflect the selected Tier Filter. You can view codes for Edge only or include All CDN tiers. When All is selected, totals may increase because the same request can appear multiple times across tiers.

    Exported reports and visual charts indicate the active filter in their titles. API parameter: tier=edge or tier=all (default = edge)

    hashtag
    Error Logs

    Error logs provide a detailed record of requests that resulted in errors. By selecting a specific error code, users can view logs that include the request path, method, protocol, and hit status. The logs are invaluable for identifying patterns and resolving recurring issues in content delivery.

    hashtag
    Tier Filter

    The Tier Filter applies to all error log data. Users can toggle between Edge only and All, depending on whether they want to see only end-user–level errors or logs from all CDN layers.

    circle-check

    Selecting Edge only isolates actual user errors, while All shows cumulative errors from Edge, Mid, and Origin.

    API parameter: tier=edge or tier=all Default: edge

    Path & Extension Based Rate Limiting is available under Page Rules for Small, Large and Dynamic accounts. It remains OFF by default and must be explicitly enabled per rule, even when global Rate Limiting is ON.

    hashtag
    Activation Requirements

    • Rate Limiting must be enabled globally under the Security tab.

    • Path & Extension Based Rate Limiting is disabled by default, even when Rate Limiting is ON.

    • Rules are created under the Page Rules section of the panel.

    • You can define different rate limits for each path or file type, separate from the base rule.

    • Whitelist IPs are managed from a single global pool; no separation exists between general Rate Limiting and Path & Extension Based Rate Limiting.

    hashtag
    Rule Behavior

    Each Path & Extension Based Rate Limiting rule inherits global Rate Limiting settings (request limit, burst, time window, etc.), but allows you to scope limits to a specific path or file extension.

    hashtag
    Configuration Fields

    Field
    Description

    Path

    Target path (e.g., /api/login)

    File Extension

    Target extensions (e.g., .pdf, .jpg, .html)

    Request Limit

    Requests per second/minute (inherited from global config)

    circle-info

    If the account's default Cache Type is dynamic or edge, you must explicitly define the same Cache Type in the Page Rule when applying Path & Extension Based Rate Limiting; otherwise, caching for that path or extension will fall back to origin, and response behavior will rely on origin headers.

    hashtag
    How to Configure

    1. Navigate to the Page Rules section in the Medianova panel.

    2. Click Add Rule.

    3. In the rule editor, define:

      • Path (e.g., /login)

      • File Extensions (e.g., .pdf, .jpg)

    4. Select and enable Rate Limiting toggle inside the rule.

    5. Set:

      • Request Limit (100–1000)

      • Time Window (Per Second or Per Minute)

    6. If your account’s default Cache Type is dynamic or edge, add the same Cache Type field to this rule explicitly.

    circle-info

    Page Rules are processed in order, from top to bottom. If multiple rules match the same path or file, only the first matching rule is applied. Make sure your rate limiting rule is placed before broader or less restrictive rules.

    hashtag
    Example Rule

    This rule limits .pdf file requests under /reports to 100 per minute, allowing 20 additional burst requests before applying the rate limit.

    hashtag
    Use Cases

    • Limit file downloads by extension: Apply rate limits to .pdf, .zip, .jpg files regardless of path.

    • Protect API endpoints by path: Limit access to paths like /api/auth, /api/login, /checkout.

    • Combine path + extension filtering: Limit requests to /reports/*.pdf or /downloads/*.zip.

    • Restrict access to static assets: Control access to large files or images under /media/ or /static/.

    • Prevent scraping of product/category pages: Apply limits to paths like /products/, /categories/.

    • Rate-limit search endpoints: Protect /search or /filter paths from abuse.

    hashtag
    Limitations

    • Path & Extension Based Rate Limiting is disabled by default and must be activated per rule

    • Only functional when resource Rate Limiting is enabled

    • Whitelisted IPs cannot be scoped per rule

    • Request Limit Range: 100 - 1000

    Path: /reports
    File Extensions: .pdf
    Request Limit: 100
    Time Window: Per Minute
    Burst: 20
    Page Rules start screen

    The screen now shows a Create Page Rule button, enabling you to get started with your first page rule.

    hashtag
    File Path and File Extension

    Page Rules match on a combination of file path and file extension.

    Field
    Available options

    File Path

    Directory, wildcard and regex pattern

    File Extensions

    Any, one or more

    Directory is recursive (unless using the Exact Match setting), meaning /dir/ matches all URLs for files in the /dir/ directory and its subdirectories.

    Wildcard is for example * to match on any URL path and /*/images/ matches URLs in any second-level images directory.

    When using regex pattern, only the * . / () [] $ symbols are supported. You cannot use other symbols, including ? ! + ^.

    hashtag
    Add a Page Rule

    1

    Click the Create Page Rule button

    A new window appears containing a form to create a page rule. The form requires specifying a File Path and one or more File Extension entries, and allows for selecting and configuring Page Rules settings.

    Create a Page Rule screen
    2

    Set the File Path and File Extensions

    3

    Select and Configure Settings

    From the drop down menu, select a setting and click the Add a Setting button. Configure the setting using the options that appear below the drop down menu.

    Repeat this step if you want the page rule to trigger multiple actions.

    4

    Deploy to CDN

    Push the page rule to the CDN by clicking the Create button.

    hashtag
    View Page Rule Details

    Find the page rule in the table, click the three dots and select Page Rule Details. The new window shows the status of every setting and details for each setting.

    Page rule details screen

    hashtag
    Clone a Page Rule

    If you want to create a new page rule that is very similar to an existing rule, the easiest way is to clone the existing rule, and then apply changes to the clone.

    1

    Select the Page Rule to Clone

    Find the page rule in the table, click the three dots and select Clone Page Rule. A new window appears for editing the cloned rule:

    Clone a Page Rule screen
    2

    Set the File Path and File Extensions

    Set a combination of file path and file extensions that is different from the rule you just cloned.

    3

    Deploy to CDN

    Push the new page rule to the CDN by clicking the Clone button.

    hashtag
    Edit a Page Rule

    Change the page rule in three steps:

    1

    Select the Page Rule to Edit

    Find the page rule in the table, click the three dots and select Edit Page Rule. A new window appears for editing the rule.

    2

    Change the File Path and File Extensions

    circle-info

    If you only want to change page rule settings, do not edit the file path and file extensions

    3

    Change Page Rule Settings

    From the drop down menu, select a setting you want to change and click the Add a Setting button. Configure the setting using the options that appear below the drop down menu.

    Repeat this step if you want to change another setting.

    4

    Deploy to CDN

    Push the page rule to the CDN by clicking the Update button.

    hashtag
    Delete a Page Rule

    Find the page rule in the table, click the three dots, select Delete Page Rule and click Yes, Delete in the confirmation window. This triggers an immediate update to CDN servers.

    Medianova Panelarrow-up-right
    APIarrow-up-right
    Medianova Panelarrow-up-right

    FAQs

    chevron-rightHow does Medianova’s DDoS protection work?hashtag

    Medianova’s DDoS protection works through integrated strategies like rate limiting, IP blocking, geoblocking, Anycast DNS, Origin Shield, and WAF integration to prevent overload, block threats, and protect your origin server.

    chevron-rightDoes CDN Reduce DDoS Attacks?hashtag

    Yes, a CDN reduces DDoS attacks by distributing traffic across multiple servers, using Anycast DNS, rate limiting, and shielding the origin server. It minimizes the attack impact and improves resilience.
    chevron-rightDo I need to manually activate DDoS protection on Medianova?hashtag

    Medianova’s Always-On DDoS Protection is active by default, providing automatic protection for your web assets against common DDoS attack types, including DNS Query Floods, SlowLoris, HTTPS GET requests, and HTTPS POST requests. No additional activation or manual configuration is required.

    chevron-rightWhat types of SSL certificates are supported by Medianova CDN?hashtag

    Medianova CDN supports a wide range of SSL certificates, including:

    • Wildcard SSL Certificates

    • SAN-supported SSL Certificates

    • Code Signing SSL Certificates

    • Domain SSL, Organization Validated SSL, and Extended SSL Certificates

    chevron-rightHow can I upload and manage SSL Certificates?hashtag

    Yes, it is possible. For detailed instructions, please refer to the "How to Upload and Manage SSL Certificates" documentation.

    chevron-rightWhat file formats are supported for SSL certificates?hashtag

    Medianova supports standard SSL certificate formats, including .crt for certificates and .key for private keys.

    chevron-rightCan I add multiple SSL certificates to my organization?hashtag

    Yes, you can add multiple SSL certificates to your organization. Each certificate can be associated with different resources or domains.

    chevron-rightHow can I use Free SSL?hashtag

    Yes, you can use Free SSL. For detailed steps, please refer to the "How Can I Use Free SSL?" documentation.

    chevron-rightDoes Medianova support TLS 1.3?hashtag

    Yes, Medianova CDN supports TLS 1.3, the latest version of the TLS protocol, which offers enhanced security and faster performance compared to its predecessors.

    chevron-rightWhat are the differences between “SNI” and “Shared SSL”?hashtag

    SNI (Server Name Indication): This option allows you to use your own SSL certificate uploaded via the panel for a specific CDN Resource.

    Shared SSL: If you don’t have your own SSL certificate, Medianova provides a shared SSL option that can be used for secure connection

    chevron-rightCan I edit an uploaded SSL certificate?hashtag

    You can only rename an SSL certificate in the SSL Management menu. Other edits, such as updating the certificate or private key, are not allowed. If changes are needed, delete the existing certificate and upload a new one.

    chevron-rightHow do I delete an SSL certificate?hashtag

    To delete an SSL certificate:

    1. Go to “CDN → SSL Management”.

    2. Click on the “Delete” option next to the certificate.

    3. Confirm the action in the pop-up window that appears.

    chevron-rightWhat is a Private Key, and why is it important?hashtag

    The Private Key is a critical part of the SSL certificate that ensures secure communication. It is based on asymmetric encryption and must be kept secret:

    • The Private Key stays on the web server and is never shared.

    • The Public Key is shared openly to establish secure communication.

    chevron-rightWhat happens if I don’t own an SSL certificate?hashtag

    If you don’t have your own SSL certificate, you can:

    • Use the “Shared SSL” option provided by Medianova.

    • Utilize the “Free SSL” option, which generates a certificate through Let’s Encrypt.

    chevron-rightWhat is the difference between "Monitoring Only" and "On" modes in WAF?hashtag
    • Monitoring Only: In this mode, WAF monitors all incoming traffic for potential threats without blocking any traffic. It provides insights into your security posture and allows you to fine-tune rules before enforcing them.

    • On: In this mode, WAF actively filters and blocks malicious traffic, providing full protection for your web assets.

    chevron-rightCan I view real-time threats blocked by WAF?hashtag

    Yes, the WAF service provides real-time monitoring and logging of blocked threats, which can be viewed under Analytics → WAF in the panel.

    chevron-rightCan I configure WAF for Dynamic CDN Resources?hashtag

    Yes, you can configure the WAF for Dynamic CDN Resources. When creating a Dynamic CDN Resource, follow the steps to activate and configure the WAF as per your security requirements.

    chevron-rightHow do I create a custom rule in WAF?hashtag

    To create a custom rule in WAF, please refer to the "How to Activate WAF" documentation for detailed guidance.

    chevron-rightHow can I handle false positives in WAF?hashtag

    To handle false positives in WAF, enable Monitoring-Only mode to analyze traffic. Disable the specific rule causing the issue or create custom rules to prevent it, ensuring security remains intact.

    chevron-rightCan I edit or delete a custom rule in WAF?hashtag

    Yes, you can edit or delete custom rules by clicking the Edit or Delete icons and submitting the changes.

    chevron-rightHow can I configure Rate Limiting?hashtag

    To configure Rate Limiting, please refer to the "Rate Limiting" documentation for detailed steps, where you will find instructions on how to log in, select resources, and configure settings in the Security tab.

    chevron-rightHow do I set the request limits?hashtag

    Under the Request Limit section, specify the maximum number of requests allowed per second or minute.

    Adjust the values based on your traffic volume and server capacity.

    chevron-rightWhat is the difference between the "Burst" and "Burst + No Delay" options?hashtag

    Burst allows a burst of requests but applies throttling once the threshold is exceeded.

    Burst + No Delay allows a burst of requests without any initial delay, providing quicker responsiveness before applying throttling.

    chevron-rightWhat is the "Burst Value" and how is it used?hashtag

    The Burst Value defines the threshold for the burst limit when the Burst or Burst + No Delay option is selected. It specifies how many requests are allowed in a burst before throttling is applied.

    chevron-rightWhat HTTP status codes can be configured for Rate Limiting?hashtag

    You can choose one of the following HTTP status codes to return when the rate limit is exceeded:

    • 429 Too Many Requests: Indicates that the client has exceeded the allowed number of requests within the specified time window.

    • 529 Site Overloaded: Used when the server is overloaded and unable to process requests due to excessive traffic.

    chevron-rightHow can I define actions for excessive requests?hashtag
    • Block: Deny requests that exceed the rate limit.

    • Challenge: Present a CAPTCHA to validate the request.

    chevron-rightHow can I enable Hotlink Protection for my CDN Resource?hashtag

    To enable Hotlink Protection, please refer to the "Hotlink Protection" documentation for detailed instructions on configuring it in the Medianova Control Panelarrow-up-right.

    chevron-rightHow do I whitelist domains for Hotlink Protection?hashtag

    In the Hotlink Protection section, you can add whitelisted domains that are allowed to access your CDN resources.

    These domains will be granted permission to link to or embed your resources.

    chevron-rightWhat happens if a request comes from a non-whitelisted domain?hashtag

    If a request comes from a non-whitelisted domain (i.e., a blacklisted or unauthorized source), the server will:

    • Block access to the resource.

    • Optionally, you can configure the server to redirect the request to a specific page or serve a placeholder image.

    chevron-rightHow can I disable Hotlink Protection?hashtag

    If you want to disable Hotlink Protection, simply toggle the Hotlink Protection option to Off in the Security menu of your selected CDN Resource.

    chevron-rightWhat is the difference between Whitelist and Blacklist?hashtag

    Whitelist: Only devices with IP addresses listed in the whitelist are allowed access to the designated resources. All other IP addresses are denied access.

    Blacklist: Devices with IP addresses listed in the blacklist are denied access to the resources. All other devices are allowed access.

    chevron-rightWhat happens if an IP address is not in the Whitelist or Blacklist?hashtag

    If Whitelist is selected, only the listed IP addresses will have access, and all other IP addresses will be denied.

    If Blacklist is selected, all IP addresses except those in the blacklist will have access to the resources

    chevron-rightWhy would I use the Whitelist option?hashtag

    You would use the Whitelist option if you want to grant access to specific, trusted IP addresses (e.g., business partners, internal network) and deny all other requests.

    chevron-rightWhy would I use the Blacklist option?hashtag

    The Blacklist option is useful if you want to block specific IP addresses that are known for malicious activity or unwanted access, while allowing all other devices to access the resources.

    chevron-rightWhat happens if I make changes to the IP Restriction ACL settings?hashtag

    After making changes to the IP Restriction ACL settings, click Save Changes to apply the new access control policy. The changes will immediately take effect.

    chevron-rightHow do I enable Geoblocking on Medianova Control Panel?hashtag

    To enable Geoblocking, please refer to the "Geoblocking" documentation for detailed steps on configuring country-based restrictions in the Medianova Control Panel.

    chevron-rightCan I update my Geoblocking settings after enabling it?hashtag

    Yes, you can update your whitelist and blacklist at any time. Simply move the countries between the whitelist and blacklist boxes, and click Save Changes to apply the updates.

    chevron-rightCan I block or allow specific IP addresses using Geoblocking?hashtag

    Yes, in addition to country-based restrictions, you can also manage IP-based restrictions. Scroll to the IP Restriction section at the bottom of the page to whitelist or blacklist specific IP addresses.

    chevron-rightHow do I add or remove countries from the whitelist or blacklist?hashtag

    To add a country, drag it from the country list on the left to either the Whitelist or Blacklist pane.

    To remove a country, simply drag it out of the whitelist or blacklist pane and into the country list.

    chevron-rightCan I apply Geoblocking to a specific CDN resource?hashtag

    Yes, Geoblocking can be applied to individual CDN resources. You can configure the settings for each CDN resource separately.

    chevron-rightCan I enable Geoblocking without using the IP Restriction section?hashtag

    Yes, you can enable Geoblocking without using the IP Restriction section. The IP Restriction section is optional and can be used for more granular control over access.

    Set FTP Password and Confirm Password for uploads.
    Stream Management

    .pfx (Personal Information Exchange)

    Upload a .pfx file containing your certificate, key, and chain. Provide a password if required.

    Private Key

    Private key matching the certificate.

    Certificate Password

    Password for encrypted key or .pfx file.

    CA Chain / Intermediate Certificates

    Certificates linking your domain to the root authority.

    Burst
    value (optional)

    Burst

    Number of extra allowed requests before enforcing limits

    HTTP Response Codes

    The HTTP protocol defines a standardized set of status codes to communicate the outcome of a client’s request. These codes indicate at which stage the request stands or why it may have failed. They fall into five primary categories:

    Category
    Description

    1xx Informational

    Indicates that the request was received and the process is continuing.

    2xx Success

    hashtag
    1xx Informational

    These codes indicate that the request was received and the process is continuing. They do not finalize the HTTP transaction — the client must wait for or send more data.

    Code
    Meaning

    hashtag
    2xx Success

    These codes indicate that the client’s request was successfully received, understood, and accepted.

    Code
    Meaning

    hashtag
    3xx Redirection

    These codes indicate that further action needs to be taken by the client in order to complete the request. Usually involves following a different URI.

    Code
    Meaning

    hashtag
    4xx Client Error

    These codes indicate that the client seems to have made an error. The server understood the request, but it cannot or will not process it due to something that is perceived to be a client problem.

    Code
    Meaning

    hashtag
    5xx Server Error

    These codes indicate that the server failed to fulfill a valid request. The problem is on the server side, not the client's.

    Code
    Meaning

    hashtag
    References

    • RFC 7231: HTTP/1.1 Semantics and Content (core HTTP methods, standard status codes)

    • RFC 7235: HTTP/1.1 Authentication (401 Unauthorized, 407 Proxy Authentication Required and authentication mechanisms)

    • RFC 6585: Additional HTTP Status Codes (defines 429 Too Many Requests

    204 No Content

    The server successfully processed the request and is not returning any content. Useful for operations that do not need to change the current page (like clearing a form via JS).

    205 Reset Content

    The server processed the request successfully, but asks the client to reset the document view (like clearing form inputs).

    206 Partial Content

    The server is delivering only part of the resource due to a Range header sent by the client. Used for resumable downloads or streaming.

    207 Multi-Status

    (WebDAV) Conveys information about multiple resources, returning XML that contains multiple status codes.

    208 Already Reported

    (WebDAV) Used inside a DAV: propstat response element to avoid repeatedly enumerating the same internal members.

    304 Not Modified

    Indicates that the resource has not been modified since the version specified by the If-Modified-Since or If-None-Match headers. Client can use cached version.

    307 Temporary Redirect

    The resource resides temporarily at a different URI, and the client should repeat the request using the same method. Unlike 302, it guarantees the same method (POST stays POST).

    308 Permanent Redirect

    The resource has been permanently moved to a new URI. The client should use the new URI and repeat the request with the same method. POST stays POST.

    404 Not Found

    The server can not find the requested resource. This is the most common client error.

    405 Method Not Allowed

    The method specified in the request (e.g. POST, GET, DELETE) is not allowed for the resource.

    406 Not Acceptable

    The requested resource is capable of generating only content not acceptable according to the Accept headers sent by the client.

    407 Proxy Authentication Required

    The client must authenticate itself with the proxy before the request can be served.

    408 Request Timeout

    The client did not produce a request within the time that the server was prepared to wait.

    409 Conflict

    The request could not be completed due to a conflict with the current state of the resource. Typical in REST APIs when there is a version conflict.

    410 Gone

    The requested resource is no longer available and will not be available again. Typically used to indicate intentionally removed resources.

    411 Length Required

    The server refuses to accept the request without a defined Content-Length header.

    412 Precondition Failed

    One or more conditions given in the request header fields evaluated to false when tested on the server.

    413 Content Too Large

    The request entity is larger than limits defined by the server. (Previously called Payload Too Large).

    414 URI Too Long

    The URI provided was too long for the server to process. Often happens with overly large query strings.

    415 Unsupported Media Type

    The media format of the requested data is not supported by the server (e.g., sending XML where JSON is expected).

    416 Range Not Satisfiable

    The range specified by the Range header field in the request can't be fulfilled; the requested range is outside the size of the target resource.

    417 Expectation Failed

    The server cannot meet the requirements of the Expect request-header field.

    418 I'm a teapot

    Defined in RFC 2324, returned by teapots requested to brew coffee. Not actually used in production systems.

    421 Misdirected Request

    The request was directed at a server that is not able to produce a response (commonly seen in HTTP/2 multiplexed connections).

    422 Unprocessable Content

    The server understands the content type of the request and the syntax is correct but was unable to process the contained instructions. (Common in REST validation errors).

    423 Locked

    The resource that is being accessed is locked. (WebDAV).

    424 Failed Dependency

    The request failed due to failure of a previous request. (WebDAV).

    425 Too Early

    Indicates that the server is unwilling to risk processing a request that might be replayed. Used in early TLS handshake.

    426 Upgrade Required

    The server refuses to perform the request using the current protocol but might be willing if the client upgrades to a different protocol (e.g., switch to TLS/1.2).

    428 Precondition Required

    The server requires the request to be conditional. Intended to prevent the 'lost update' problem.

    429 Too Many Requests

    The user has sent too many requests in a given amount of time (rate limiting).

    431 Request Header Fields Too Large

    The server is unwilling to process the request because its header fields are too large.

    444 No Response

    The server closes the connection without sending any HTTP response to the client. Typically used to drop malicious or unwanted requests silently. Logged in access.log as 444.

    451 Unavailable For Legal Reasons

    The server is denying access to the resource as a consequence of a legal demand (for example, geo-blocking or copyright takedown).

    494 Request Header Too Large

    The client sent HTTP headers that exceed the server’s configured maximum (large_client_header_buffers). The server closes the connection.

    495 SSL Certificate Error

    The server failed to verify the client’s SSL certificate during the handshake (invalid or untrusted client cert).

    496 SSL Certificate Required

    The server expected a client SSL certificate (mutual TLS), but the client did not provide one.

    497 HTTP Request Sent to HTTPS Port

    The client sent a plain HTTP request to an HTTPS port (like port 443). The server detects this mismatch.

    499 Client Closed Request

    The client closed the connection before the server could send a response. This code appears in access.log; it is not sent back to the client.

    504 Gateway Timeout

    The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server it needed to access.

    505 HTTP Version Not Supported

    The server does not support the HTTP protocol version used in the request (like HTTP/1.0 vs HTTP/2).

    506 Variant Also Negotiates

    Transparent content negotiation for the request results in a circular reference. Very rare.

    507 Insufficient Storage

    The server is unable to store the representation needed to complete the request (typically in WebDAV scenarios).

    508 Loop Detected

    The server detected an infinite loop while processing a request (also seen in WebDAV collections).

    510 Not Extended

    Further extensions to the request are required for the server to fulfill it. Very uncommon.

    511 Network Authentication Required

    The client needs to authenticate to gain network access, often used by captive portals (Wi-Fi login pages).

    ,
    431 Request Header Fields Too Large
    ,
    511 Network Authentication Required
    )
  • RFC 4918: HTTP Extensions for WebDAV (defines WebDAV-specific codes like 207 Multi-Status, 422 Unprocessable Entity, 423 Locked, 424 Failed Dependency, 507 Insufficient Storage, 508 Loop Detected)

  • RFC 8470: HTTP 103 Early Hints (specifies 103 Early Hints for resource preloading)

  • Indicates that the request was successfully received, understood, and accepted.

    3xx Redirection

    Instructs the client to perform additional actions to complete the request (typically follow a different URL).

    4xx Client Error

    Indicates that the error is due to something the client sent (invalid request, missing auth, etc.).

    5xx Server Error

    Indicates that the server failed to fulfill a valid request.

    100 Continue

    The server has received the initial request headers and the client should proceed to send the request body (used with Expect: 100-continue).

    101 Switching Protocols

    The server agrees to switch protocols as requested by the client (for example upgrading from HTTP to WebSocket).

    102 Processing

    (WebDAV) The server has received and is processing the request, but no response is available yet. Prevents client timeouts on long operations.

    103 Early Hints

    200 OK

    The standard response for successful HTTP requests. The actual response depends on the request method (GET returns a resource, POST might return confirmation, etc).

    201 Created

    The request was successful and resulted in the creation of a new resource. Often includes a Location header pointing to the new resource.

    202 Accepted

    The request has been accepted for processing, but the processing is not complete. Typically used for async workflows.

    203 Non-Authoritative Information

    300 Multiple Choices

    Indicates multiple options for the resource that the client may follow (for example, different file formats). Rarely used in practice.

    301 Moved Permanently

    The resource has been permanently moved to a new URI. Clients should update their references. Future requests should use the new URL.

    302 Found

    The resource resides temporarily under a different URI. The client should continue to use the original URI for future requests. (Most common for standard redirects, but technically should use 303/307).

    303 See Other

    400 Bad Request

    The server could not understand the request due to invalid syntax (malformed JSON, missing required parameters, invalid query strings, etc).

    401 Unauthorized

    Authentication is required and has failed or has not yet been provided. The client should provide valid authentication credentials.

    402 Payment Required

    Reserved for future use. Intended to be used for digital payment systems but rarely implemented.

    403 Forbidden

    500 Internal Server Error

    A generic error message indicating an unexpected condition was encountered and the server cannot fulfill the request. No more specific message is suitable.

    501 Not Implemented

    The server does not support the functionality required to fulfill the request (e.g. an unsupported HTTP method).

    502 Bad Gateway

    The server, while acting as a gateway or proxy, received an invalid response from the upstream server.

    503 Service Unavailable

    Used to return some response headers before the final HTTP message, typically to allow the client to start preloading resources (via Link headers) while the server prepares the final response.

    The server successfully processed the request but is returning information from another source (like a proxy or transformation) that might not be exactly the original.

    The server directs the client to get the requested resource at another URI using a GET request, typically after a POST.

    The client does not have access rights to the content. Unlike 401, authentication will not help; it is an explicit refusal.

    The server is currently unable to handle the request due to temporary overload or scheduled maintenance. Usually a temporary condition.

    Integrating Dynamic CDN Resource

    1. Click on the CDN Resource menu, select the CDN Resource you created and move to the Caching menu.

    1. First you need to configure the Cache Settings at the bottom of the page. Cache Type field provides two options.

      1. If you would like to use the cache time defined on the origin with the cache-control header, you can select “Origin”. If you would like to set custom cache time, you can select “Edge”.

      2. When you select Edge, you should set the cache time, which indicates the maximum age of your cached content. Then you should also specify if you would like to cache dynamic content such as your HTML files and click the Save Changes button.

    1. Next, you need to check your Query String Caching settings. You can leave the Query String setting disabled, if you would like to cache your files by ignoring query strings; or you can enable it to treat each query string as a cacheable item.

    1. If “Cache Dynamic Pages” option under Cache Settings has been enabled at Step 4.1, that means all HTML files served by your origin and all resources (CSS, images, JavaScript) found in HTML files, will be cached and served through Medianova CDN.

    However, it is recommended to exclude some of the HTML files which contain private information (such as account details, credit card information on check out page etc.). Below are two options to disallow caching, either by defining paths or by using cookies.

    a. Page Rule Cache Type: Go to the Page Rules menu and select dynamic cache type for the desired paths and/or extensions.

    b. Disallow Caching by Using Cookies: Go to the Caching menu and enter Cookie Key & Cookie Value to bypass caching under “Disallow Cookie Base Cache” setting.

    1. Go to the SSL menu and upload your SSL certificate.

    1. You can test your Aksela account before redirecting your Website URL to your CDN URL, and serving traffic through our platform.

    2. To start testing, first you need to find the IP address of the CDN URL. In order to do that, you can ping your CDN URL on Command prompt.

    Example: ping cdnresource_name.mncdn.com

    b. Then, you need to add this IP address to your hosts file.

    - Open the Run tab by pressing Windows key + R.

    - Type system32 in the search bar and click ok.

    - On the screen, go to the “drivers” folder and then to the “etc” folder.

    - Under the “etc” folder, you can right-click on your “hosts” file and select open and edit with application such as Notepad or Notepad++.

    - Please add the IP address you obtained in the first step and the website you want to reach using this IP address to the file and save it.

    c. Clear your browser cache. Make a request to the page by typing yourdomain.com in the address bar. On the page that opens, right-click on an empty area and select “inspect”. Go to the “Network” tab and find your Website URL within the list of requests. Click on it and and display the information in the “Headers -> Response Headers” area. Seeing “MNCDN” next to the “Server” field shows that the .html file is served from Medianova.

    1. After completing the test successfully, login to your DNS hosting provider’s client panel and add a CNAME record for redirecting your Site URL to the CDN URL you have created.

      yourdomain.com IN CNAME cdnresource_name.mncdn.com

    2. Your traffic is now served through Medianova Aksela.