Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Medianova is a global provider of Content Delivery Network (CDN) and cloud security services designed to accelerate and secure digital experiences. With over 50 data centers across 21 countries, it helps businesses deliver fast, reliable websites, applications, and APIs while ensuring high performance and robust security.
1. CDN (Content Delivery Network) A CDN optimizes content delivery by distributing it across multiple servers around the world. Medianova's CDN service ensures that content such as images, stylesheets, and scripts are delivered efficiently by caching static assets at strategically located servers. This minimizes latency and improves page load times for users.
2. Static CDN The Static CDN service is specifically designed to optimize the delivery of static content. By caching assets globally, it ensures that users receive content from the nearest server, drastically reducing load times and enhancing performance. Integration is simple, with users needing only to update asset URLs and configure settings via the Medianova platform.
3. Dynamic Content Caching Dynamic content, generated per user request, can be resource-intensive. Medianova's microcaching system allows for caching dynamic content (e.g., API responses or web pages) for brief periods, thus reducing server load and improving page speeds. This helps reduce bandwidth costs while enhancing the user experience.
4. Live Streaming Medianova provides high-quality live streaming with adaptive streaming technology. This ensures optimal video quality across devices, from desktop to mobile, while maintaining seamless playback. The platform integrates with major social media platforms for broader reach. Security features, including encryption and access controls, ensure that content is protected and accessible only to authorized users.
5. Private CDN For organizations requiring greater control, the Private CDN offers flexible, secure, and high-performance content delivery. It provides businesses with tailored solutions that allow enhanced security and content distribution management.
6. Image Optimization Medianova offers real-time image optimization. This feature allows on-the-fly image transformations such as resizing, cropping, and watermarking through simple URL calls. It also supports responsive images, ensuring that content is tailored for different devices and screen sizes, contributing to faster load times and better user experiences.
7. Stook - Cloud Object Storage Stook is Medianova's cloud object storage solution that enables businesses to store, manage, and retrieve data quickly and reliably. It is S3-compatible and eliminates the traditional barriers of egress and transaction fees, making it a cost-effective choice for scalable storage needs.
8. SSL Encryption Secure Socket Layer (SSL) ensures encrypted communication between a server and a client. Websites with SSL certificates are considered secure, and this encryption is critical for e-commerce platforms, where security is a primary concern for users.
9. Medianova WAF (Web Application Firewall) Medianova's WAF actively monitors all incoming web traffic to detect and block malicious patterns before they can affect web assets. With predefined Managed Rules, enabling these rules offers immediate protection against various security threats.
10. DDoS Protection Medianova's DDoS protection system is always active, offering continuous defense against common attack types, such as DNS Query Floods, SlowLoris, and HTTP floods. It includes several mitigation strategies, including rate limiting, IP blocking, and geoblocking, ensuring minimal disruption to services during attacks.
Medianova combines advanced caching, acceleration, and security features to help businesses create fast, reliable, and secure digital solutions. With global infrastructure, robust security, and easy integration, Medianova empowers businesses to deliver superior user experiences while ensuring high performance and protection against a wide range of threats.

Security

Performance

Storage
Protect your applications and APIs from volumetric and protocol-based attacks with Medianova’s multi-layer, always-on DDoS mitigation system.
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic by overwhelming a target system or network with excessive requests. Medianova’s DDoS Protection automatically detects and mitigates these attacks without requiring any manual activation. From rate limiting to IP and Geo blocking, Medianova ensures uninterrupted availability even under heavy attack conditions.
Medianova integrates several protection layers designed to stop attacks before they impact your services.
Your DDoS protection is active by default. There is no need for additional setup — your web assets are continuously monitored and protected against common attack types such as:
DNS Query Floods
Slowloris Attacks
HTTPS GET / POST Floods
Medianova’s global distributes thousands of requests across multiple servers. This prevents traffic overload on a single endpoint and mitigates large-scale network floods.
Anycast DNS not only improves security but also reduces latency by routing users to the nearest edge location.
You can reduce the risk of DDoS threats by concealing your origin IP before an attack begins. Medianova provides an extra layer of protection through Secure Cloud, limiting exposure of your origin infrastructure and filtering harmful traffic before it reaches your servers.
Warning: Exposing your origin IP directly allows attackers to bypass DDoS mitigation layers.
Edge-level rate limiting and Geo-based filtering restrict malicious or excessive traffic patterns. This ensures that legitimate users maintain access while harmful requests are dropped early in the network path.
When combined with Medianova’s , DDoS Protection forms a complete multi-layer defense system. This integration protects not only against volumetric attacks but also against application-layer threats, such as bot floods or malicious payloads targeting web applications.
Conceal your origin IP using Secure Cloud or Origin Shield.
Combine DDoS Protection with WAF for enhanced multi-layer defense.
Keep critical DNS zones under to distribute load globally.
Regularly review threat and access logs to identify abnormal patterns.
Medianova DDoS Protection delivers continuous and intelligent protection against both volumetric and application-layer attacks. By combining global Anycast DNS distribution, adaptive rate limiting, and origin shielding, Medianova ensures your online services remain fast, secure, and always available.
You can try Medianova for 1 month without needing a credit card or any commitments. Your account will be activated automatically. If you need more features or help, our sales team is ready to assist you.
The trial includes important features like Static CDN and Dynamic CDN, which make sure your website content loads faster by delivering it from the closest server. The Web Application Firewall (WAF) lets you create custom security rules to protect your site from harmful traffic. You also get Standard DDoS Protection to keep your website safe from attacks that try to overload it with too much traffic.
The Global Anycast DNS feature improves your site’s DNS performance by directing traffic to the nearest server, which helps reduce loading times. The Purge feature allows you to quickly remove outdated content from all servers so your website shows updates instantly. You can also use page rules to control how your content is cached, forwarded, and secured, giving you more control over how the CDN handles your site.
For more advanced features and support, you can explore our premium packages for better options suited to your needs.
Visit the .
Fill in the fields for your name, email address, and password.
Click the Next button.
Enter the verification code sent to your email.
Your Free Trial has now started successfully.
Static CDN
Dynamic CDN
Web Application Firewall
DDoS Protection
For additional support, contact us at .
For your CDN resource, select Website. Make sure that the Origin URL and the Website URL are different.
The package will be displayed as Free Trial. Click the Proceed to Purchase button.
Finally, fill in your billing address and click the Complete Purchase button.
Purge

Learn how to extract .crt and .key files from a .pfx certificate using OpenSSL.
A .pfx (PKCS#12) file contains your public certificate, private key, and intermediate certificates bundled together.
This guide explains how to extract the certificate (.crt) and private key (.key) using a simple Bash script with OpenSSL.
Before you begin:
A valid .pfx file provided by the customer.
The password for the .pfx file.
OpenSSL installed on your local machine.
(Optional) Rename the file for clarity using this format:
domain.pfx — for example: medianova_com.pfx.
This procedure automates the extraction of certificate and key files from .pfx bundles.
You can now use the generated .crt and .key files to upload your own SSL certificate in the Medianova Control Panel.
Secure your CDN traffic and applications with SSL/TLS encryption to ensure private, authenticated communication between clients and servers.
Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide encrypted communication between clients and servers. They ensure data privacy, integrity, and authentication—protecting your website and CDN-delivered assets against interception or tampering.
Over time, the traditional HTTP protocol evolved into HTTPS, which uses SSL/TLS encryption to secure all data exchanged between users and websites. Medianova CDN supports HTTPS by default and allows you to manage SSL certificates directly through the platform.
TLS is the modern version of SSL. All Medianova services use TLS 1.2 and 1.3 for enhanced security and performance.
Confidentiality: Encrypts all client–server communications.
Integrity: Prevents data alteration or man-in-the-middle attacks.
Authentication: Confirms your site’s identity through trusted Certificate Authorities (CAs).
Trust & SEO: HTTPS improves user confidence and search engine ranking.
Medianova CDN supports all common SSL/TLS certificates. Choose the one that fits your infrastructure and domain structure.
For setups serving multiple domains or subdomains, consider Wildcard or SAN-supported certificates to simplify management.
A user requests your content via HTTPS.
The CDN edge node presents a valid SSL/TLS certificate.
Encrypted communication is established between the client and the edge server.
The edge communicates securely with your origin server (if origin SSL is configured).
Always use HTTPS for all CDN-enabled resources.
Prefer TLS 1.3 for stronger encryption and faster handshakes.
Keep certificates renewed before expiration to avoid service disruption.
Use Wildcard or SAN certificates to simplify certificate management.
The HTTP protocol defines a standardized set of status codes to communicate the outcome of a client’s request. These codes indicate at which stage the request stands or why it may have failed. They fall into five primary categories:
1xx Informational
Indicates that the request was received and the process is continuing.
2xx Success
Indicates that the request was successfully received, understood, and accepted.
3xx Redirection
Instructs the client to perform additional actions to complete the request (typically follow a different URL).
4xx Client Error
These codes indicate that the request was received and the process is continuing. They do not finalize the HTTP transaction — the client must wait for or send more data.
These codes indicate that the client’s request was successfully received, understood, and accepted.
These codes indicate that further action needs to be taken by the client in order to complete the request. Usually involves following a different URI.
These codes indicate that the client seems to have made an error. The server understood the request, but it cannot or will not process it due to something that is perceived to be a client problem.
These codes indicate that the server failed to fulfill a valid request. The problem is on the server side, not the client's.
RFC 7231: HTTP/1.1 Semantics and Content (core HTTP methods, standard status codes)
RFC 7235: HTTP/1.1 Authentication
(401 Unauthorized, 407 Proxy Authentication Required and authentication mechanisms)
RFC 6585: Additional HTTP Status Codes
(defines 429 Too Many Requests, 431 Request Header Fields Too Large
Restrict or allow access to your CDN Resources based on geographic location by configuring country-based whitelists and blacklists.
Geoblocking allows you to control which countries can access your content through the . By enabling this feature, you can restrict or allow requests based on the visitor’s geographic origin, helping you comply with regional policies and protect your digital assets.
Geoblocking operates at the CDN edge, preventing unauthorized access before requests reach your origin server.
Define how the CDN serves the robots.txt file to control how search engines crawl and index your content.
The Robots.txt File feature determines whether search engines receive a robots.txt file from the CDN and which source the file is taken from. This allows you to enable crawling for all files or defer crawling rules to your origin.
You can manage Robots.txt File settings in the or via .
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.
Choose how the CDN should provide the robots.txt file for the selected resource.
Prevent unauthorized use of your media files by blocking external websites from embedding or linking directly to your CDN-hosted assets.
Hotlink Protection restricts access to your CDN Resource by verifying the Referer header in each HTTP request. When enabled, it ensures that only requests originating from your allowed domains can retrieve content from your CDN. Requests coming from unauthorized sources — such as external websites directly embedding your files — are blocked or redirected automatically.
Hotlink Protection helps you:
Control access to your CDN Resources by allowing or blocking specific IP addresses through whitelist or blacklist configurations.
IP Restriction (Access Control List – ACL) allows you to manage which IP addresses can access your CDN Resource. You can choose between two modes: Whitelist or Blacklist, to define how access is granted or denied.
Whitelist Mode: Only the IP addresses you specify are allowed to access your resource. All other IPs are denied.
Blacklist Mode: The IP addresses you specify are denied access. All other IPs are allowed.
The Advanced Origin Settings feature provides a flexible and efficient way to configure content routing for dynamic resources. It allows you to define specific rules for routing requests to your origin server based on criteria such as URIs, protocols, domains, ports, and more. This functionality is particularly valuable for delivering dynamic content where precision and adaptability are crucial.
Optimized Routing for Dynamic Content: Ensures requests for frequently changing or personalized content are routed efficiently to the origin server.
Obtain Medianova’s CDN IP address ranges for firewall allowlisting.
Medianova’s CDN uses specific IP address ranges to fetch content from your origin servers. If your origin server uses a firewall or IP-based access controls, you must allow all addresses listed below to ensure reliable access from Medianova edge servers. This allows the CDN to retrieve and deliver your content securely and efficiently.
Learn how to configure Origin Response Timeout to control how long the CDN waits for your origin to respond.
Origin Response Timeout defines the maximum time the CDN waits for an HTTP(S) response from your origin server. If the origin does not respond within the configured duration, the CDN returns a 504 Gateway Timeout.
Adjusting this timeout helps maintain predictable performance and prevents long wait times caused by slow origin responses.
You can manage Origin Response Timeout using the or .
In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.
Learn how to configure a custom Host header for origin requests in the Medianova Control Panel.
The Origin Host Header feature allows you to define a custom domain to be sent in the Host header of requests forwarded to your origin. Many origin servers rely on the Host header for routing, virtual hosting, or tenant identification.
When this option is enabled and a domain is provided, the CDN replaces the default host value with the one you specify.
The feature does not modify viewer-facing responses and does not affect caching behavior.
You can configure X-CDN Header in the or via
Step-by-step instructions for how to enable and configure Gzip compression and Brotli compression.
In the , select the appropriate CDN resource, navigate to the Optimization tab and select Text Optimization.
The page shows two content blocks, one for Brotli Compression and one for Gzip Compression:
The following steps apply to both Brotli Compression and Gzip Compression.
Secure digital assets – Stop unauthorized sharing or embedding of your hosted media.
Reduce server load – Block high-traffic external sites from consuming resources.
Maintain brand control – Ensure your content appears only on trusted domains.
Prevent abuse – Stop third-party sites from monetizing your media.
Hotlink Protection checks the Referer field of every HTTP request. If the Referer does not match your whitelisted domain list, the CDN automatically denies or redirects the request.
Allow
Serves content when the Referer is from an authorized source.
Block
Rejects requests from unauthorized sites.
Redirect
Sends unauthorized users to a specified page or image.
Add multiple allowed domains to the whitelist for multi-site deployments (e.g., www.medianova.com, cdn.medianova.com).
Use Geoblocking to manage access and enforce content distribution policies efficiently:
Compliance and licensing – Restrict access to regions where content rights do not apply.
Dynamic pricing models – Apply different pricing or service availability by country.
Security enhancement – Block known high-risk regions or malicious traffic.
Content optimization – Focus delivery to target markets, reducing unnecessary traffic.
Combine Geoblocking with IP Restriction for granular, IP-based exceptions within approved countries.
Log in to the Medianova Control Panel.
Go to CDN → CDN Resources and select the resource you want to manage.
Open the Security tab.
Enable the Geoblocking toggle.
From the country list:
Drag or select countries to the Whitelist (allowed).
Drag or select countries to the Blacklist (blocked).
Click Save Changes to apply your configuration.
(Optional) Add specific IP exceptions under IP Restriction for fine-tuned control.
The page now shows a list of content types (or: MIME types) that are served compressed by default. You can add content types by typing the content-type in the Add Content Type field and clicking the + button.
Remove a content type by clicking the small x icon to the right of the content-type.

Define whether a CDN resource uses its own cache or shares a common cache structure across multiple accounts using the Domain Cache Key.
Shared Cache allows multiple accounts or domains to use the same cache structure by applying a Domain Cache Key. When set to Share, identical content is cached only once and served across participating accounts, improving efficiency and reducing redundant origin requests. When set to Default, each account maintains its own isolated cache.
You can manage Shared Cache in the Medianova Control Panel or via API.
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.
When set to Share, CDN edge nodes use the same cache namespace for resources that match the Domain Cache Key.
Cache hits increase across accounts that serve identical content.
Changing the status does not purge existing cache; behavior changes apply to future caching operations.
When set to Default, each account's cache becomes isolated again.
Does enabling Shared Cache expose content from one customer to another? No. Shared Cache only applies where explicit Domain Cache Key alignment exists and is intentionally configured.
Does switching from Default to Share purge existing cache? No. Existing cached content expires naturally according to its TTL.
When should Shared Cache be enabled? It is beneficial when multiple accounts deliver the same static assets (e.g., white-label platforms, partner domains).
SAN (Subject Alternative Name)
Covers multiple domains under a single certificate.
Multi-domain architectures
Code Signing SSL
Used by developers to verify the integrity of software or drivers.
Application signing, APIs
Data is delivered end-to-end through encrypted channels.
Avoid mixed-content warnings by ensuring all assets (images, scripts) load over HTTPS.
Domain Validation (DV)
Validates domain ownership only. Simple and fast to issue.
Blogs, small websites
Organization Validation (OV)
Confirms both domain and company identity.
Corporate or business sites
Extended Validation (EV)
Highest validation level; displays organization name in browser UI.
E-commerce, financial platforms
Wildcard SSL
Secures a domain and all its subdomains (e.g., *.yourdomain.net).

Multi-subdomain services
The server is delivering only part of the resource due to a Range header sent by the client. Used for resumable downloads or streaming.
207 Multi-Status
(WebDAV) Conveys information about multiple resources, returning XML that contains multiple status codes.
208 Already Reported
(WebDAV) Used inside a DAV: propstat response element to avoid repeatedly enumerating the same internal members.
The resource has been permanently moved to a new URI. The client should use the new URI and repeat the request with the same method. POST stays POST.
The requested resource is capable of generating only content not acceptable according to the Accept headers sent by the client.
407 Proxy Authentication Required
The client must authenticate itself with the proxy before the request can be served.
408 Request Timeout
The client did not produce a request within the time that the server was prepared to wait.
409 Conflict
The request could not be completed due to a conflict with the current state of the resource. Typical in REST APIs when there is a version conflict.
410 Gone
The requested resource is no longer available and will not be available again. Typically used to indicate intentionally removed resources.
411 Length Required
The server refuses to accept the request without a defined Content-Length header.
412 Precondition Failed
One or more conditions given in the request header fields evaluated to false when tested on the server.
413 Content Too Large
The request entity is larger than limits defined by the server. (Previously called Payload Too Large).
414 URI Too Long
The URI provided was too long for the server to process. Often happens with overly large query strings.
415 Unsupported Media Type
The media format of the requested data is not supported by the server (e.g., sending XML where JSON is expected).
416 Range Not Satisfiable
The range specified by the Range header field in the request can't be fulfilled; the requested range is outside the size of the target resource.
417 Expectation Failed
The server cannot meet the requirements of the Expect request-header field.
418 I'm a teapot
Defined in RFC 2324, returned by teapots requested to brew coffee. Not actually used in production systems.
421 Misdirected Request
The request was directed at a server that is not able to produce a response (commonly seen in HTTP/2 multiplexed connections).
422 Unprocessable Content
The server understands the content type of the request and the syntax is correct but was unable to process the contained instructions. (Common in REST validation errors).
423 Locked
The resource that is being accessed is locked. (WebDAV).
424 Failed Dependency
The request failed due to failure of a previous request. (WebDAV).
425 Too Early
Indicates that the server is unwilling to risk processing a request that might be replayed. Used in early TLS handshake.
426 Upgrade Required
The server refuses to perform the request using the current protocol but might be willing if the client upgrades to a different protocol (e.g., switch to TLS/1.2).
428 Precondition Required
The server requires the request to be conditional. Intended to prevent the 'lost update' problem.
429 Too Many Requests
The user has sent too many requests in a given amount of time (rate limiting).
431 Request Header Fields Too Large
The server is unwilling to process the request because its header fields are too large.
444 No Response
The server closes the connection without sending any HTTP response to the client. Typically used to drop malicious or unwanted requests silently. Logged in access.log as 444.
451 Unavailable For Legal Reasons
The server is denying access to the resource as a consequence of a legal demand (for example, geo-blocking or copyright takedown).
494 Request Header Too Large
The client sent HTTP headers that exceed the server’s configured maximum (large_client_header_buffers). The server closes the connection.
495 SSL Certificate Error
The server failed to verify the client’s SSL certificate during the handshake (invalid or untrusted client cert).
496 SSL Certificate Required
The server expected a client SSL certificate (mutual TLS), but the client did not provide one.
497 HTTP Request Sent to HTTPS Port
The client sent a plain HTTP request to an HTTPS port (like port 443). The server detects this mismatch.
499 Client Closed Request
The client closed the connection before the server could send a response. This code appears in access.log; it is not sent back to the client.
Transparent content negotiation for the request results in a circular reference. Very rare.
507 Insufficient Storage
The server is unable to store the representation needed to complete the request (typically in WebDAV scenarios).
508 Loop Detected
The server detected an infinite loop while processing a request (also seen in WebDAV collections).
510 Not Extended
Further extensions to the request are required for the server to fulfill it. Very uncommon.
511 Network Authentication Required
The client needs to authenticate to gain network access, often used by captive portals (Wi-Fi login pages).
511 Network Authentication RequiredRFC 4918: HTTP Extensions for WebDAV
(defines WebDAV-specific codes like 207 Multi-Status, 422 Unprocessable Entity, 423 Locked, 424 Failed Dependency, 507 Insufficient Storage, 508 Loop Detected)
RFC 8470: HTTP 103 Early Hints
(specifies 103 Early Hints for resource preloading)
Indicates that the error is due to something the client sent (invalid request, missing auth, etc.).
5xx Server Error
Indicates that the server failed to fulfill a valid request.
100 Continue
The server has received the initial request headers and the client should proceed to send the request body (used with Expect: 100-continue).
101 Switching Protocols
The server agrees to switch protocols as requested by the client (for example upgrading from HTTP to WebSocket).
102 Processing
(WebDAV) The server has received and is processing the request, but no response is available yet. Prevents client timeouts on long operations.
103 Early Hints
Used to return some response headers before the final HTTP message, typically to allow the client to start preloading resources (via Link headers) while the server prepares the final response.
200 OK
The standard response for successful HTTP requests. The actual response depends on the request method (GET returns a resource, POST might return confirmation, etc).
201 Created
The request was successful and resulted in the creation of a new resource. Often includes a Location header pointing to the new resource.
202 Accepted
The request has been accepted for processing, but the processing is not complete. Typically used for async workflows.
203 Non-Authoritative Information
The server successfully processed the request but is returning information from another source (like a proxy or transformation) that might not be exactly the original.
204 No Content
The server successfully processed the request and is not returning any content. Useful for operations that do not need to change the current page (like clearing a form via JS).
205 Reset Content
The server processed the request successfully, but asks the client to reset the document view (like clearing form inputs).
300 Multiple Choices
Indicates multiple options for the resource that the client may follow (for example, different file formats). Rarely used in practice.
301 Moved Permanently
The resource has been permanently moved to a new URI. Clients should update their references. Future requests should use the new URL.
302 Found
The resource resides temporarily under a different URI. The client should continue to use the original URI for future requests. (Most common for standard redirects, but technically should use 303/307).
303 See Other
The server directs the client to get the requested resource at another URI using a GET request, typically after a POST.
304 Not Modified
Indicates that the resource has not been modified since the version specified by the If-Modified-Since or If-None-Match headers. Client can use cached version.
307 Temporary Redirect
The resource resides temporarily at a different URI, and the client should repeat the request using the same method. Unlike 302, it guarantees the same method (POST stays POST).
400 Bad Request
The server could not understand the request due to invalid syntax (malformed JSON, missing required parameters, invalid query strings, etc).
401 Unauthorized
Authentication is required and has failed or has not yet been provided. The client should provide valid authentication credentials.
402 Payment Required
Reserved for future use. Intended to be used for digital payment systems but rarely implemented.
403 Forbidden
The client does not have access rights to the content. Unlike 401, authentication will not help; it is an explicit refusal.
404 Not Found
The server can not find the requested resource. This is the most common client error.
405 Method Not Allowed
The method specified in the request (e.g. POST, GET, DELETE) is not allowed for the resource.
500 Internal Server Error
A generic error message indicating an unexpected condition was encountered and the server cannot fulfill the request. No more specific message is suitable.
501 Not Implemented
The server does not support the functionality required to fulfill the request (e.g. an unsupported HTTP method).
502 Bad Gateway
The server, while acting as a gateway or proxy, received an invalid response from the upstream server.
503 Service Unavailable
The server is currently unable to handle the request due to temporary overload or scheduled maintenance. Usually a temporary condition.
504 Gateway Timeout
The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server it needed to access.
505 HTTP Version Not Supported
The server does not support the HTTP protocol version used in the request (like HTTP/1.0 vs HTTP/2).
206 Partial Content
308 Permanent Redirect
406 Not Acceptable
506 Variant Also Negotiates
Replace domain.pfx with your actual filename (e.g., medianova_com.pfx).
Choose Disabled, Enabled, or Origin from the dropdown.
Disabled — No robots.txt file is served. Enabled — MN CDN serves its default robots.txt file, allowing crawlers to index all content. Origin — CDN fetches and serves the robots.txt file from your origin.
Enabled mode always serves MN CDN’s default robots.txt content. Customers cannot upload or configure a custom robots.txt file through the Panel.
Origin mode delegates full control to your origin server.
Changes propagate immediately but may take a short time to be reflected across all PoPs.
Does Medianova allow uploading a custom robots.txt file? No. In Enabled mode, the CDN serves a predefined robots.txt file that allows all crawling. To use a custom file, select Origin mode and host the file on your origin.
What happens if my origin has no robots.txt file but I choose Origin mode?
The CDN will return 404 Not Found, and search engines will proceed as if no robots.txt file exists.
Does robots.txt affect CDN caching? No. It only controls search engine bot behavior and does not interact with cache rules.
Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.
Use IP Restriction to:
Protect internal or staging environments from unauthorized access.
Restrict API access to trusted partners or corporate networks.
Block known malicious IP ranges or suspicious activity.
Ensure compliance with internal security policies.
Whitelist Mode – Only the IP addresses you specify are allowed to access the resource. All other traffic is blocked.
Blacklist Mode – The IP addresses you specify are denied access, while all other IPs are permitted.
Edge-Level Enforcement – Filtering occurs at the CDN edge, ensuring zero impact on origin performance.
CIDR Range Support – Define large IP ranges using CIDR notation (e.g., 192.168.1.0/24).
Mutually Exclusive Modes – You can use either whitelist or blacklist mode, but not both simultaneously.
Use Whitelist mode for restricted corporate APIs and Blacklist mode for public-facing applications that need selective blocking.
Medianova’s IP Restriction system provides a simple yet powerful way to enforce access control at the CDN level. By validating requests before they reach your infrastructure, it prevents unauthorized access and improves overall performance stability. Combined with other Security features such as Rate Limiting, WAF, and Hotlink Protection, it forms a robust multi-layer defense mechanism.
Flexible Matching Rules: Define custom routing rules based on URI patterns, protocols, or domain structures to align with complex backend logic.
Enhanced Performance: Reduces latency and improves response times for real-time content by fine-tuning origin configuration.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Origin Settings tab.
Navigate to the Advanced Origin Settings section in the Medianova Cloud Panel.
Click the Add button to open the configuration popup.
Fill in the following fields:
URI Match Mode: Select the matching mode for URIs (e.g., exact match, prefix, or regex).
URI Match Rule: Define the URI pattern based on the selected mode.
Protocols: Choose between HTTP, HTTPS, or Same as Request to determine how the traffic should be routed.
Domain or IP: Enter the domain or IP address of the origin server.
HTTP Port: Specify the HTTP port to use for connections.
HTTPS Port: Specify the HTTPS port to use for secure connections.
Host Header: Provide a custom host header if required for the origin server.
Priority: Assign a priority level to this rule to determine its precedence in case of multiple matching configurations.
Click the Add button.
Click the Submit button.
JSON
Structured format with separate IPv4 and IPv6 lists. Useful for automation and API integrations.
Plain Text
Simple text file where each IP block is listed on a separate line. Suitable for manual import or quick reference.
CSV
Comma-separated values file suitable for importing IP blocks into spreadsheets or scripts.
Only allow traffic from Medianova’s IP ranges to reach your origin server (block all other sources). This practice secures your origin by preventing direct attacks and bypass attempts. Also ensure you include every address (both IPv4 and IPv6) in the allowlist. If any Medianova IP is omitted or blocked, the CDN cannot retrieve content from your origin.
Follow the steps below to set the timeout duration.
The CDN waits for the origin to respond for the configured duration.
If the timeout is reached, the CDN returns 504 Gateway Timeout to the client.
Lower values improve failover speed; higher values allow slow origins more time to respond.
5–30 seconds: Fast origins or latency-sensitive applications
30–120 seconds: Moderate response times or variable workloads
120–300 seconds: Heavy processing at the origin (reports, large queries, image generation)
Issue: Clients receive 504 responses. Cause: Origin cannot respond within the configured timeout. Fix: Increase the timeout value or optimize origin performance.
Issue: Requests feel slow before failing. Cause: Timeout value is set too high. Fix: Reduce the timeout to a more suitable duration.
When the feature is active:
The CDN overwrites the Host header in the origin request with the domain you provide.
The domain must be entered without http:// or https://.
The configured value is applied to all origin fetches for the selected CDN Resource.
The behavior supports any valid domain that your origin server expects for routing or validation.
The purpose of this feature is to ensure compatibility with origins that require a specific hostname, especially in environments where multiple sites share the same origin infrastructure.
Ensure the correct site is selected when multiple hostnames share the same origin.
Send a tenant-specific domain in the Host header for proper routing.
Match the exact hostname your origin expects for SSL/SNI evaluation or application routing logic (when applicable to host header usage).
Enter only the domain name (e.g., subdomain.example.com).
Do not include URL schemes such as http:// or https://.
This feature modifies only the origin-bound request and does not impact the viewer response.
Incorrect domain entries may cause the origin to respond with errors or unexpected routing behavior.
Control how query strings affect CDN cache behavior for dynamic or parameterized URLs.
Query String Caching defines how URLs containing query parameters are interpreted by the CDN cache. You can cache each query string variant separately, ignore selected query strings, or build the cache key using only specific parameters.
You can manage Query String Caching in the Medianova Control Panel or via API.
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Query String Caching section under the Caching tab.
This workflow defines the primary caching behavior for URLs containing query strings.
Exclude selected query string parameters so they do not create separate cached variants.
Build the cache key using only selected parameters and ignore all others.
On: The CDN caches each unique query string as a separate variant.
Off: Query strings are ignored; all variants map to a single cached object.
Request URI: The full request URI is used as the cache key.
Ignore Specific Query Strings: Excluded parameters do not contribute to the cache key.
Do ignored parameters count toward the cache key? No. Ignored parameters never create new cache variants.
Can both Ignore and Cache Specific modes be enabled together? No. Only one mode can be active.
What happens if all modes are Off? All query variations serve the same cached response.
Does enabling On increase cache fragmentation? Yes. Each query combination creates a separate cached object.
Learn how to configure Origin SNI Request to ensure secure SSL/TLS connections between the CDN and your origin server.
Origin SNI Request enables the CDN to send the correct Server Name Indication (SNI) value when establishing SSL/TLS connections with your origin. This ensures that the origin server selects the appropriate SSL certificate, especially when hosting multiple domains on the same IP address.
Enabling this feature improves compatibility and prevents certificate mismatch errors during HTTPS communication.
You can manage Origin SNI Request using the Medianova Control Panel or API.
In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings.
Follow the steps below to enable and configure Origin SNI Request for your CDN Resource.
During an SSL/TLS handshake, the CDN includes the SNI extension, which specifies the domain name requested by the client. This allows the origin server to:
Select the correct SSL certificate
Support multiple domains on a shared IP
Avoid certificate mismatch errors
Use this setting when:
Your origin serves multiple HTTPS domains from the same IP
The origin requires SNI to present the correct SSL certificate
You encounter HTTPS 421 or certificate mismatch errors
If SNI is not sent:
The origin may return the wrong SSL certificate
HTTPS validation may fail
Dynamic requests may intermittently fail under multi-domain hosting setups
Issue: HTTPS requests fail with certificate mismatch. Cause: The origin returned the default certificate instead of the certificate for the requested domain. Fix: Enable Origin SNI Request and enter the correct domain.
Issue: Origin returns 421 Misdirected Request. Cause: The origin requires SNI to route the request to the correct virtual host. Fix: Ensure the SNI domain matches the vhost configuration on the origin.
Issue: Requests fail after enabling SNI. Cause: Incorrect domain entered in the Origin SNI Request Domain field. Fix: Confirm that the domain matches a valid certificate installed on the origin.
Control traffic flow, protect resources, and ensure fair usage across your CDN resources with Medianova’s intelligent Rate Limiting feature.
Rate Limiting helps you maintain stable application performance by controlling how many requests a client can make in a given time frame. It protects against excessive API calls, brute-force attempts, and high-frequency requests that can degrade origin performance or service quality.
With Medianova’s edge-level implementation, rate limits are applied directly at the CDN layer — before the traffic reaches your origin servers — ensuring both reliability and efficiency.
Rate Limiting is available for Dynamic CDN Resources and can be configured per domain, path, or file extension through the Medianova Control Panel.
Rate Limiting ensures a secure, predictable, and efficient experience for all users by:
Preventing abuse or overload from bots or aggressive clients.
Protecting login endpoints and API gateways from brute-force attacks.
Ensuring fair bandwidth distribution among users.
Preserving origin stability and avoiding unnecessary compute or database load.
Customizable Limits – Define request thresholds per second or minute to suit your application.
Edge-Level Enforcement – Limit requests at the CDN edge, preventing overload before it reaches your origin.
Burst Control Options – Configure how short bursts of requests are handled:
API Protection – Prevent abuse of public APIs and ensure consistent response times.
Authentication Endpoints – Limit login attempts to protect user accounts.
Download or Media Control – Restrict large file or video download frequency to optimize CDN performance.
E-commerce Traffic Shaping – Manage checkout or cart requests during high-traffic campaigns.
Medianova’s Rate Limiting operates at the edge, ensuring minimal latency and zero impact on normal user experience. By combining adaptive enforcement, path-based rules, and real-time analytics, it enables granular control over how traffic interacts with your CDN — keeping your applications fast, fair, and secure.
You can configure and monitor Rate Limiting directly through the Medianova Control Panel under the Security section.
Learn how to configure how long content remains cached on CDN edge servers.
Edge Cache Expiration controls whether CDN edge servers cache an object and how long the cached content remains valid before it must be refreshed from the origin.
It defines the caching behavior applied at the edge, including modes that disable caching entirely or defer expiration settings to the origin.
You can manage Edge Cache Expiration in the Medianova Control Panel or via API.
Use this workflow to define how the CDN determines cache duration and applies expiration rules on edge servers.
Choose how the CDN evaluates cache duration:
Edge — The CDN applies the expiration time configured in the Panel. A value of 0 disables caching.
Origin — The CDN honors cache headers sent by the origin. If no cache duration is provided, the Panel-defined value applies. A value of 0 disables caching.
Dynamic — The CDN does not cache the content. All requests always forward to the origin regardless of origin headers or Panel settings.
A value of 0 disables caching for both Edge and Origin modes.
Dynamic mode always bypasses caching on edge servers.
These settings do not impact browser caching; use for client-side caching behavior.
Apply long TTL values for static assets such as images, fonts, CSS, and JavaScript.
Use shorter TTL values for frequently updated or dynamic endpoints.
Monitor edge cache hit ratios to optimize performance and origin load.
Cache partial content based on byte ranges so the CDN can serve only the requested portions of large files.
Range Based Caching allows the CDN to cache and deliver content in byte-range segments rather than requiring the entire file to be fetched or cached. This improves performance for large files such as videos, archives, or software downloads by serving only the requested portions.
You can manage Range Based Caching in the Medianova Control Panel or via API.
Select a CDN resource in the CDN section, and navigate to the Caching tab.
The CDN caches content in fixed-size byte segments defined by Segment Size.
Requests for ranges within the same segment are served directly from cache.
Useful for video playback, downloads, and large binary files where clients request only parts of a resource.
A smaller segment size increases cache precision but may increase the number of stored segments.
Does Range Based Caching improve video streaming performance? Yes. It prevents the CDN from fetching the entire file when only a portion is requested, improving responsiveness.
What happens if I change the Segment Size? New segment size applies only to future cached segments. Existing segments remain until evicted.
Is this feature required for byte-range requests to work? Byte-range requests work regardless, but enabling Range Based Caching ensures partial responses can come from cache instead of the origin.
Learn how the X-XSS Protection header controls browser-side filtering of reflected Cross-Site Scripting (XSS) attacks.
The X-XSS Protection feature adds the X-XSS-Protection header to viewer responses. This header instructs compatible browsers to enable their built-in XSS filtering mechanisms. While most modern browsers now ignore this header, the setting can still provide protection for legacy browsers that rely on it.
The feature does not modify origin requests or affect CDN caching behavior.
You can configure X-CDN Header in the Medianova Control Panel or via API
When enabled:
The CDN adds the following header to viewer-facing responses:
Browsers that still support the header will block pages that trigger reflected XSS heuristics.
If disabled, the CDN does not include the header, and browsers revert to their default behavior.
This feature is primarily relevant for environments that depend on legacy browser compatibility.
Provide reflected-XSS filtering for older browsers that still honor the header.
Ensure consistent browser behavior across mixed device environments or corporate networks with outdated browser fleets.
Modern browsers (Chrome, Edge, Safari) ignore X-XSS-Protection and instead rely on CSP (Content-Security-Policy) for XSS mitigation.
This feature affects only viewer responses, not origin requests.
Enabling the header does not prevent stored or DOM-based XSS attacks.
Learn how the X-CDN Header adds CDN-specific information to origin requests in the Medianova Control Panel.
The X-CDN Header feature adds an X-CDN header to requests that are forwarded from the CDN to your origin. This allows your origin to identify that the request is coming through Medianova CDN, which can be useful for logging, routing decisions, and origin-side analytics.
You can configure X-CDN Header in the or via
When the X-CDN Header toggle is enabled:
The CDN adds the X-CDN header to the origin request during the fetch operation.
Your origin receives every request with this header included.
The header allows your origin to distinguish CDN-proxied traffic from direct client traffic.
The behavior applies to all request types because insertion occurs before the origin fetch.
This feature is passive and does not alter cache decisions, TTL behavior, Page Rules, or viewer-facing responses.
Log whether a request came through the CDN layer by checking for the X-CDN header.
Apply specific logic (e.g., rate limits, routing decisions, request tagging) based on the presence of this header.
Verify that requests are reaching your origin through the CDN, especially when diagnosing caching or routing flows.
The header is inserted only on the origin request.
It is not visible to clients and does not appear in viewer-facing responses.
Header values may differ based on internal CDN configuration.
Enabling the header does not change caching rules, request normalization, or delivery performance.
The IP address of the CDN URL shared with you by the Medianova Technical Sales team or created via a Free trial can be found as follows.
The CDN URL is pinged by opening the Command Prompt. (CDN URL = <zone_name>.mncdn.com)
Example: ping <zone_name>.mncdn.com
The IP address retrieved above is written to the “host” file of your computer.
Open the Run tab by pressing the Windows key + R.
Type system32 in the search bar and click ok.
On the screen that opens, navigate to the drivers folder and open it.
Navigate to the etc folder in the “drivers” folder and open it.
Add the IP address you obtained in the first step and the website you want to reach using this IP address and save the file as shown below.
Clear the browser cache. Make a request to the page by typing in the address bar. After opening the page, right-click on an empty area and select inspect. The Network tab will open. Verify that the .html file comes from Medianova when you see the MNCDN description under the Server tab.
The Error Status Code Cache Expiration feature in the Medianova Cloud Panel for dynamic content allows you to cache error responses (such as 404, 500, etc.) generated by dynamic content for a specified duration. This helps manage error handling efficiently by reducing unnecessary load on the origin server and optimizing cache usage.
Cache Error Status Codes: You can define a set of dynamic error codes (e.g., 404, 500) and specify a cache duration for each. By caching these error responses, you prevent the origin server from repeatedly processing the same error conditions, reducing server load and improving overall performance.
Removal of Caching Definition: If you decide that certain error codes should no longer be cached, you can remove their definitions. Requests for these error codes will then bypass the CDN cache and go directly to the origin server. However, cached error content will remain in the cache until the specified cache duration expires, ensuring that the system operates smoothly during transitions.
By configuring Error Status Code Cache Expiration for dynamic content, you can control how error responses are handled and cached, reducing server strain while still allowing for accurate error management when needed. This feature is especially useful for error pages that are generated dynamically, such as custom 404 pages or server error responses, where frequent caching can save resources without compromising on error response accuracy.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Error Status Code Cache Expiration section in the Medianova Cloud Panel.
Click the Add button to create a new definition.
Cache Time: Specify the cache duration for the error code (in seconds).
Status Code: Enter the HTTP status code(s) that you want to cache (e.g., 404, 500, etc.).
Add Multiple Definitions
The Edge Cache Expiration setting in the Medianova Cloud Panel for dynamic content allows you to control how long dynamically generated content is cached on the CDN edge servers before it expires. This setting helps to strike a balance between performance and freshness, ensuring that dynamic content is served quickly from the edge servers while still allowing for real-time updates from the origin server when needed.
Cache Type: For dynamic content, the cache type ensures that content is cached at the edge servers but can be dynamically retrieved from the origin server as necessary. This ensures that frequently accessed dynamic resources are delivered quickly, while also ensuring the content remains up-to-date when needed.
Cache Time Configuration: Define the expiration time for dynamic content cached on the edge servers. You can set specific expiration times based on the nature of the dynamic content, ensuring that data is refreshed based on its update frequency. When both edge and origin cache settings are used, the system will prompt you to define cache expiration for each to optimize delivery.
By adjusting the Edge Cache Expiration for dynamic content, you can enhance performance by serving cached content quickly while ensuring that any real-time or user-specific data is always up-to-date. This is especially useful for content that changes frequently, such as user profiles, real-time data, or personalized resources.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Edge Cache Expiration section in the Medianova Cloud Panel.
Select Cache Type: Choose edge-origin-dynamic as the cache type.
Define Cache Expiration Time: When both edge and origin cache settings are enabled, you will be prompted to specify the cache expiration time for both. Set the expiration time according to your needs.
Once you’ve configured the expiration time, click Save to apply the changes.
By setting the Edge Cache Expiration, you can ensure that content is efficiently cached on the edge servers while still allowing for timely updates from the origin server when required.
The Cookie-Base Cache feature in the Medianova Cloud Panel enables caching decisions based on specific cookies. This feature allows you to define multiple cookie values, ensuring that content caching aligns with different user sessions and dynamic content requirements.
Cache Based on Specific Cookies: When enabled, this feature ensures that caching behavior is determined by the presence and values of specified cookies. This is particularly useful for personalizing content or delivering dynamic resources based on user-specific data.
Support for Multiple Cookies: You can define multiple cookies to fine-tune caching strategies for diverse user interactions. Each cookie value can influence how the cache is managed for specific scenarios.
Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.
Select the relevant resource.
Click on the Caching tab.
Scroll down to the Cookie-Based Cache section.
Important Notes
Dynamic Content Optimization: This feature helps deliver personalized or session-specific content by adjusting caching behavior based on user cookies.
Multiple Cookie Values: Define as many cookie values as necessary to address the caching needs of your application.
By configuring the Cookie-Based Cache settings, you can ensure a seamless user experience while optimizing caching for dynamic and personalized content delivery.
Protect your web applications from common exploits and malicious traffic with Medianova’s Web Application Firewall (WAF).
WAF is Medianova’s intelligent web security layer that protects your applications from malicious traffic, bots, and exploits. With real-time filtering, custom rule control, and built-in analytics, it helps you prevent attacks before they reach your origin servers.
Medianova WAF combines ease of use, robust protection, and edge-level performance to keep your web applications secure. Unlike standard firewalls, WAF protects against both network and application-layer attacks.
Edge-level protection – All traffic is filtered at Medianova’s global CDN edge before it reaches your origin.
Managed Rules – Constantly updated rulesets by Medianova’s Security Team, including OWASP Top 10 protections.
Custom Rules – Define your own rules to block, allow, or log specific requests.
Real-time defense – Detect and mitigate attacks instantly without affecting legitimate traffic.
OWASP Top 10 Protection – Shields against SQL Injection, XSS, and other common web vulnerabilities.
Custom Rule Engine – Create granular policies based on IP, URI, headers, or user agents.
Monitoring Mode – Observe how rules behave before full activation.
Instant Mitigation – Block or log attacks in real time with no latency impact.
Web Application Security – Protect public websites and portals from injection and XSS attacks.
API Protection – Filter and control requests to your backend APIs.
E-commerce Security – Prevent data breaches, bot abuse, and checkout exploitation attempts.
Medianova WAF delivers enterprise-grade web protection that’s easy to deploy and manage through the . It helps you stay secure without adding complexity — protecting your applications from the edge, in real time.
Learn about Page Rules, how to manage Page Rules and the available settings.
Page Rules trigger one or more actions on an incoming request to Medianova CDN whenever a defined URL pattern is matched.
Page Rules are available in the Medianova Panel for any CDN resource in the Page Rules tab.
Available settings for Page Rules include Cache Type, Custom Header, Geoblocking and more.
Page Rules can be configured foror CDN resources of type Small, Dynamic, Large & VOD.
The default number of allowed page rules depends on the package as shown below.
Only one Page Rule will trigger per URL, that is the the matching page rule with the highest priority.
In the Medianova Panel, Page Rules are sorted top-to-bottom from highest priority to lowest priority. For this reason, we recommend ordering your rules from most specific to least specific.
The Origin Response Timeout setting in the Medianova Cloud Panel allows you to control how long the system waits for a response from your origin server before marking the request as failed. In dynamic content delivery, where requests often depend on real-time data or API responses, managing timeout settings becomes critical to ensure responsiveness and maintain performance.
Customizable Timeout Duration Set a specific time (in seconds) for the system to wait for responses from your dynamic origin server.
Min: 5 seconds
Max: 300 seconds
Dynamic Content Optimization Adjust timeout settings to account for real-time backend processing or API response variability, balancing performance and availability.
Improved Request Efficiency Reduce failed requests and latency by defining appropriate timeout values for dynamic origin servers.
Real-Time Performance: Ensures dynamic requests complete within acceptable timeframes, even under variable load.
Optimized API Handling: Prevents unnecessary failures when API responses require slightly longer processing.
Enhanced User Experience: Reduces delays for end users, ensuring that dynamic content is delivered seamlessly.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Origin Settings tab.
Navigate to the Origin Response Timeout section in the Medianova Cloud Panel.
Set the Timeout Duration: In the Origin Response Timeout section, set the timeout value between 5 seconds and 300 seconds, according to your needs.
After adjusting the timeout, click Save to apply the new settings.
By configuring the Origin Response Timeout, you can optimize the time the system waits for a response, ensuring that requests are handled efficiently without unnecessary delays.
The Etag Verification feature in the Medianova Cloud Panel for dynamic content allows the CDN to validate cached dynamic content against the origin server using entity tags (ETags). This ensures that the dynamically generated resources are up-to-date and that the CDN only refreshes the cache when the content has changed, optimizing both performance and accuracy.
Etag Validation:
When enabled, the Etag header is used to check the validity of cached dynamic content. This ensures that the content served from the CDN is always synchronized with the most recent version from the origin server. The Etag helps prevent the delivery of outdated or incorrect content, especially for dynamic resources that might change frequently based on user interactions, session data, or real-time information.
By using Etag Verification for dynamic content, you ensure that the CDN serves the freshest version of dynamic resources without unnecessarily re-fetching them from the origin server, improving load times and resource utilization. This is especially beneficial for dynamic content that changes often, such as personalized data, real-time updates, or API responses.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Etag Verification section in the Medianova Cloud Panel.
Fetch gzip-compressed text files from your origin for faster, more efficient content delivery.
The Enable Gzip from Origin setting lets Medianova CDN fetch gzip-compressed content directly from your origin using the Accept-Encoding: gzip header.
When enabled, the CDN retrieves already-compressed versions of text-based files such as .js, .css, and .txt instead of fetching and compressing them again.
This reduces origin data transfer and improves delivery performance.
You can enable this feature via or API
Medianova CDN starts sending the Accept-Encoding: gzip header to your origin for eligible file types.
The Stale Cache feature in the Medianova Cloud Panel for dynamic content allows you to serve previously cached content when certain HTTP error codes or an "Updating" status is encountered. This ensures continuous availability of content, even during temporary issues with the origin server or while content is being updated.
Maintain Availability: The Stale Cache feature allows you to serve cached content when the origin server is temporarily unavailable or encounters specific error codes (such as 500 or 503). This ensures that users can still access content without disruption, even if the origin server is experiencing issues.
Customizable Error Triggers: You can define which HTTP error codes or the "Updating" status will trigger the use of stale cached content. This allows you to customize when the CDN should serve cached content instead of waiting for a fresh response from the origin server.
Improved User Experience: By serving stale cached content during backend disruptions, the Stale Cache feature minimizes downtime and ensures users continue to have access to content. This is particularly useful for dynamic content that might be subject to frequent changes or when there are temporary delays in fetching new data from the origin server.
The Stale Cache feature helps enhance reliability and user experience by reducing the impact of origin server downtime or content updates, ensuring that users are always able to access content with minimal interruptions.
Supported Triggers:
You can configure the system to serve stale cached content when any of the following statuses are detected:
Updating: Triggered when content is in the process of being updated.
HTTP_500: Internal Server Error.
HTTP_502: Bad Gateway.
HTTP_503: Service Unavailable.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Stale Cache section in the Medianova Cloud Panel.
Learn how to upload and manage SSL certificates in the Medianova Control Panel.
SSL/TLS certificates enable encrypted HTTPS communication between users and CDN Resources. You can upload your own certificate, use Medianova’s shared SSL, or activate a free certificate provided by Let’s Encrypt.
Learn how to manage Redirect Handle From Origin to control how 3xx redirect responses from your origin are processed by the CDN.
Redirect Handle From Origin allows the CDN to modify request or response headers when the origin returns a 3xx redirect.
You can select which redirect codes to handle and optionally add or modify headers sent during redirection.
This provides greater control over origin-driven redirects and ensures consistent client behavior.
You can manage Redirect Handle From Origin using the or the .
In the , go to CDN Resources, select your resource, and navigate to Origin Settings
Learn how to activate and configure the Web Application Firewall (WAF) for your CDN Resources in the Medianova Control Panel.
WAF (Web Application Firewall) enhances your website’s security by inspecting and filtering incoming HTTP/HTTPS traffic. You can enable it for any Dynamic CDN Resource, select the protection mode, and create Custom Rules to detect and block malicious requests.
Configure how long specific HTTP error responses remain cached on CDN edge servers.
Error Status Code Cache Expiration defines how long selected HTTP error responses (such as 404 or 500) stay valid in the CDN cache. This reduces repeated requests to the origin when the same error occurs frequently.
You can manage Error Status Code Cache Expiration in the or via .
Select a CDN resource in the CDN section, and navigate to the Caching tab.
Serve stale cached content when the origin returns specific HTTP error responses or enters an Updating state
Stale Cache allows CDN edge servers to deliver the last cached version of an object when the origin becomes temporarily unavailable. This includes conditions such as 500–504 errors, invalid headers, timeouts, forbidden responses, or an Updating status. Enabling Stale Cache helps maintain availability and ensures continuity of service during short-term origin instability.
You can manage Stale Cache in the or via .
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Stale Cache.
This workflow defines which origin responses allow the CDN to serve stale cached content.
Perform Prefetch operations through the Control Panel or API to proactively cache files and deliver them instantly to end-users.
Prefetch allows you to pull specific files from your origin into the CDN cache before any user requests them. Use this feature to eliminate cache misses, reduce origin load, and ensure fast delivery to the first users.
You can initiate Prefetch via the or .
Define device-based caching behavior to create separate cached versions for mobile, tablet, and desktop clients.
Mobile Device Cache allows the CDN to generate different cache entries based on the detected device type. This ensures that each device category receives appropriately formatted content without cache conflicts.
The feature also forwards device information to your origin using the X-DEVICE and X-MOBILE headers.
You can manage Mobile Device Cache in the
Log in to the , select a CDN resource in the CDN section, and navigate to the Caching tab.
Learn all about Gzip and Brotli compression at Medianova, including which content types are compressed by default and compression of error responses.
Gzip and Brotli compression reduces file sizes by up to 80% for common content types like HTML, CSS and JavaScript, leading to faster load times and improved user experience. This not only enhances website performance and improves SEO / Core Web Vitals, but also decreases bandwidth usage, saving CDN costs and ensuring efficient content delivery.
Gzip compression happens at Medianova Midcache servers, which is then passed on to the Edge servers. Both the Midcache and Edge servers may cache the Gzip compressed content for faster delivery of next responses. Edge servers perform Brotli compression on-the-fly when requested by the client.
Medianova delivers content with Gzip compression, Brotli compression or no compression depending on:
Learn how to invalidate cached content instantly across all Medianova CDN
You can manage Purge operations in the or via .
Log in to the , select a CDN Resource in the CDN section, and navigate to the Purge tab.
Purge instantly invalidates cached content across all Medianova CDN cache layers. Use this feature when updated content is not yet reflected or when outdated assets need to be refreshed.
The Query String Caching feature in the Medianova Cloud Panel for dynamic content allows you to manage how query strings are handled and cached by the CDN. For dynamic content, query strings often carry important parameters, such as user-specific data, filters, or session identifiers. With this feature, you can control how variations of a dynamic URL with different query strings are cached separately or treated as the same resource.
Enable Query String Caching: When enabled, each unique query string variation of a dynamic URL will be cached separately. This allows dynamic content with different query parameters (e.g., user IDs, session tokens, or filters) to be treated as distinct cached resources, optimizing delivery for different content variations.
Learn how the X-Content-Type-Options header prevents MIME sniffing and enforces strict content-type handling in the browser.
The X-Content-Type-Options feature adds the X-Content-Type-Options header to viewer responses. This header instructs compatible browsers not to perform MIME sniffing and to rely strictly on the Content-Type declared by the server. Disabling MIME sniffing helps reduce exposure to certain injection and cross-site scripting (XSS) vectors.
Fetch gzip-compressed text-based content from your origin to improve delivery efficiency.
Enable Gzip From Origin allows the CDN to request text-based files from your origin using the Accept-Encoding: gzip header.
If the origin supports gzip, the CDN stores the compressed version in cache; otherwise, it stores the uncompressed response.
Learn how the X-Frame Options feature controls which sites are allowed to frame your content.
The X-Frame Options feature adds the X-Frame-Options HTTP response header to prevent unauthorized framing of your website. This header is commonly used to mitigate clickjacking attacks by restricting how and where your content can be embedded inside an <iframe>.
When enabled, the CDN includes the header in responses according to the configuration you provide.
You can configure X-CDN Header in the or via
Learn how HSTS Protection enforces HTTPS-only access for your CDN Resource.
HTTP Strict Transport Security (HSTS) instructs browsers to connect to your domain only over HTTPS for a defined period of time. When enabled, the CDN adds the Strict-Transport-Security header to HTTPS responses, preventing protocol downgrade attacks and reducing the risk of session or cookie interception.
HSTS can also extend enforcement to subdomains and optionally request inclusion in browser preload lists.
You can configure X-CDN Header in the or via
Learn how to enable and configure IP Restriction in the Medianova Control Panel to allow or block access from specific IP addresses.
IP Restriction enables you to define which IP addresses can access your CDN Resources by using either whitelist or blacklist rules. When configured, access control is enforced at the CDN edge, ensuring that unauthorized requests are blocked before they reach your origin server.
You can enable IP Restriction for each CDN Resource in the
The Rewrite Origin URLs feature enables precise control over how dynamic requests are routed to the origin server. By defining flexible rewrite rules, you can seamlessly map public-facing URLs to complex backend structures, ensuring efficient content delivery for frequently changing or user-specific resources.
Match Mode Options: Define dynamic matching criteria to identify URL patterns that require rewriting. Supports regular expressions and parameter-based matching for complex routing scenarios.
Click on the CDN Resource menu, select the CDN Resource you created and move to the Caching menu.
First you need to configure the Cache Settings at the bottom of the page. Cache Type field provides two options.
The Redirect Handle From Origin feature provides advanced control over how redirects are managed between the CDN and your origin server, tailored specifically for dynamic content delivery. Redirects for dynamic content often depend on real-time variables, such as user sessions, geolocation, or API responses. This feature ensures that such redirects are handled efficiently, maintaining low latency and a seamless user experience.
3xx Status Code Configuration Customize and manage HTTP status codes in the 3xx range (e.g., 301, 302, 307) to optimize redirect behavior for dynamic content. Fine-tune how redirect rules interact with personalized or session-based requests.
Learn about the CORS Header and how to enable and configure this feature.
Cross-origin resource sharing (CORS) is a browser security mechanism that determines whether a web page can load resources from a different origin. While browsers allow cross-origin images, CSS files, scripts, iframes, and videos without restrictions, other request types — such as Ajax calls and web fonts — are blocked by default under the same-origin policy.
CORS defines how browsers and servers evaluate cross-origin requests. Medianova CDN can send the access-control-allow-origin header in HTML responses to enable controlled cross-origin access.
By default, Medianova CDN forwards any CORS-related headers sent by your origin. You only need to enable CORS Header if you want CDN edges to set or override this header.
The Shared Cache feature in the Medianova Cloud Panel for dynamic content allows you to define a Domain Cache Key, enabling multiple accounts or domains to share the same cached content. This feature helps optimize content delivery, reduces redundancy, and ensures that the same cached data is available across relevant accounts, making caching more efficient.
Domain Cache Key: The Domain Cache Key is used to define a shared cache structure, ensuring that multiple accounts or domains can access the same cached content. This eliminates the need to cache identical dynamic content separately for each account, thus improving caching efficiency and reducing the load on the origin server.
Deliver images, scripts, and other static assets faster and more reliably across the globe with Medianova’s Static CDN service.
Static Content Delivery accelerates websites and applications by distributing static assets—such as images, CSS, and JavaScript files—across Medianova’s globally distributed CDN network. By caching content at the edge, end-users receive data from the nearest server, reducing latency and improving overall page load performance.
Static CDN is ideal for websites with large amounts of unchanging content that must be delivered consistently to users worldwide.
The Header Value-Based Cache feature in the Medianova Cloud Panel allows you to control caching behavior based on specific header values. By defining the type (deny or allow), along with the header and its corresponding value, you can precisely determine whether content should be cached.
Control Caching with Header Values: This feature enables caching rules to be influenced by specific header values, allowing for flexible and dynamic cache management.
The Header-Base Cache feature in the Medianova Cloud Panel enables caching decisions based on specific HTTP headers. By defining multiple header key-value pairs, you can control how content is cached depending on the request headers, allowing for advanced caching strategies tailored to your application's needs.
Cache Based on HTTP Headers: When enabled, this feature allows caching behavior to be determined by specific HTTP header key-value pairs, ensuring dynamic and personalized content delivery.
Learn how to configure Custom Header rules for a CDN Resource.
The Custom Header feature allows you to add, modify, or remove HTTP headers for both origin requests and CDN responses. This configuration enables fine-grained control over how headers are passed, overwritten, or stripped at different stages of the delivery flow.
When Custom Header is enabled, you can define multiple header actions, each with a specific key–value pair and rule type. All rules are executed by CDN edge servers for the selected CDN Resource.
You can configure Custom Header in the or via
chmod +x extract-cert.sh./extract-cert.sh yourPFXpassword✅ Certificate and Key match.❌ Mismatch between certificate and key.#!/bin/bash
# Usage: ./extract-cert.sh <pfx-password>
# 1. Extract encrypted private key
openssl pkcs12 -in domain.pfx -nocerts -out encrypted-domain.key -passin pass:$1 -passout pass:$1
# 2. Decrypt the private key
openssl rsa -in encrypted-domain.key -out domain.key -passin pass:$1
# 3. Extract public certificate
openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.crt -passin pass:$1
# 4. Verify that the certificate and key match
first=$(openssl x509 -in domain.crt -modulus -noout | openssl md5)
second=$(openssl rsa -in domain.key -modulus -noout | openssl md5)
if [[ "$first" == "$second" ]]; then
echo "✅ Certificate and Key match."
else
echo "❌ Mismatch between certificate and key."
fiAllowing flexible control through customized thresholds and actions.
Burst + No Delay – Permits short bursts without delay enforcement.
None – Strict limit; requests beyond the threshold are immediately blocked.
IP Whitelisting – Exclude trusted IPs, monitoring tools, or partners from rate enforcement.
Flexible Actions – Choose to Block or Challenge clients that exceed limits.
Configurable HTTP Response Codes – Return 429 or 529 errors when limits are exceeded.
Path & Extension Support – Apply rate limits to specific endpoints (e.g., /login, /api/) or file types (e.g., .pdf, .mp4).
Bot Mitigation – Reduce load from automated crawlers or scrapers.
Ignore Specific Query Strings: This option allows you to specify query strings that should not be cached separately. If a URL contains certain query strings (e.g., tracking parameters), these query strings will be ignored in the caching process. As a result, requests with these query strings will be treated as if they do not exist, reducing the number of cached versions and optimizing storage.
How It Works:
After enabling this option, a field will appear where you can enter the specific query strings you wish to ignore.
You can add multiple query strings by clicking the + button.
Once set, requests with these query strings will not create separate cached versions.
Cache Specific Query Strings Only: When enabled, you can specify a list of query strings that should be cached separately. Only requests with these query strings will create distinct cached versions, while other requests with different query strings will be treated as the same resource.
How It Works:
After enabling this option, a field will appear where you can enter the query strings you want to cache separately.
You can add multiple query strings by clicking the + button.
Once set, only requests with these query strings will be cached separately, while other requests without these parameters will be treated as the same cached resource.
By using Query String Caching for dynamic content, you can optimize caching for content that varies based on user-specific parameters or session data, improving performance while maintaining accurate and fresh dynamic content delivery.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Query String Caching section in the Medianova Cloud Panel.
Choose Caching option.
Ignore Specific Query Strings: Enable this option if you want to ignore specific query strings and not cache them separately. Enter the query strings you want to ignore in the provided field. Click the + button to add multiple query strings.
Cache Specific Query Strings Only: Enable this option if you want to cache only specific query strings separately. Enter the query strings you want to cache separately in the provided field. Click the + button to add multiple query strings.
After configuring the query string caching settings, click Submit to apply the changes.
By configuring the Query String Caching settings, you gain granular control over how query string variations of your resources are cached, optimizing caching strategies based on your specific needs.
Public certificate.
domain.key
Unencrypted private key.
encrypted-domain.key
Encrypted private key (temporary, can be deleted).
Availability
Yes
Yes
Yes
Yes
Number of rules
5
30
50
125
Actionable analytics – Gain visibility into threats, attack sources, and triggered rules through the Control Panel.
Integrated Analytics – Visual dashboards for traffic and threat insights.
False Positive Control – Fine-tune rules to balance protection and accessibility.
Define a cache duration for specific HTTP error codes.
Modify the cache time or status code.
Remove a cache rule so that future error responses bypass CDN cache.
Cached error responses remain valid until the configured cache time expires.
Deleting a definition does not immediately remove already cached error objects; existing cached content remains until expiration.
Setting a low cache duration minimizes the risk of serving error responses for extended periods.
If no definition exists for a status code, the CDN forwards all such responses to the origin without caching.
Does removing a definition purge already cached error responses? No. Existing cached content remains until it expires.
Can I cache multiple error codes with different durations? Yes. Each status code can have its own cache time.
What happens if I set the cache time to zero? A value of zero disables caching for that error status code.
Off – Ignore all query strings; all variations map to a single cached object.
Request URI – Cache based on the full request URI, including query parameters exactly as received.
Add one or more parameters that should not affect the cache key.
Add parameters that should be included in the cache key.
Cache Specific Query Strings Only: Only the selected parameters contribute to the cache key; all others are ignored.




Once all necessary error codes and cache times are defined, click Submit to apply the changes.

Toggle the feature to "On."
Define cookie values:
Enter the cookie key in the respective field.
Use the + button to add more cookies.
Click Submit to apply the changes.


Enable Etag Verification: Toggle the Etag Verification setting to On to enable it. This will allow the system to validate the cached content based on the Etag header.
Once enabled, click Submit to apply the changes.
HTTP_504: Gateway Timeout.
HTTP_403: Forbidden.
HTTP_404: Not Found.
HTTP_429: Too Many Requests.
Activate the Stale Cache option to configure the settings.
Select Error Triggers:
Choose the HTTP error codes (e.g., 500, 502, 503, etc.) or Updating status that will trigger the use of stale cached content.
Multiple triggers can be selected simultaneously.
Click Submit to apply your configurations.






Medianova’s Prefetch mechanism performs controlled fetch operations that proactively warm up cache layers. This eliminates the delay caused by a first-time cache miss and reduces origin load during peak demand.
All Prefetch operations are listed in the Prefetch Log table below. Use this view to track the status and results of your Prefetch actions.
Column
Description
Status
Indicates whether the Prefetch operation is Running, Successful, or Failed.
Task ID
A unique identifier assigned to each Prefetch request.
File Path
Type of Prefetch
Created At
Time when the Prefetch was initiated.
Duration
Total time the operation took to complete.
Result
Summary of the Prefetch
Medianova’s purge mechanism rapidly invalidates content across every cache layer (from edge nodes to core caches), usually finishing propagation within seconds under normal conditions. This near-immediate purge completion means users around the world see the updated content almost instantly after you purge.
All recent purge operations are listed in the Purge Log table below. Use this view to track the status of your requests.
Status
Shows whether the purge is Running, Successful, or Failed.
Task ID
A unique identifier for each purge operation.
File Type
Type of purge
Created At
Time the purge was initiated.
URLs
Number of URLs affected.
Running / Successful / Failed
Summary of the operation result.

Mobile Device Cache changes how cache keys are generated and what information is forwarded to the origin.
The CDN classifies each request using the User-Agent header:
mobile
tablet
desktop
A unique cache entry is created per device type, for example:
X-DEVICE
Device category detected by the CDN
mobile / tablet / desktop
X-MOBILE
Whether the device is mobile
true / false
These headers allow your origin to serve tailored content if needed.
Device detection is based on User-Agent parsing and may not be accurate for all custom or rare device signatures.
The feature does not provide per-resolution caching (e.g., based on screen width).
Use this feature only if your mobile/tablet/desktop content differs meaningfully.
No. This feature affects only cache segmentation and forwards device headers. Origin routing remains unchanged.
The request is classified as desktop by default, and the cache key is generated accordingly.
Yes. Mobile, tablet, and desktop clients each receive their own cached version, preventing cross-device content mismatches.
Values of the Accept-Encoding header in the request coming into Medianova
Your Medianova configuration (learn how to configure Gzip and Brotli)
You can customize which content types Medianova serves compressed for Gzip and Brotli, except for content of type text/html : this is always compressed.By default, Medianova compresses the following content types:
For responses coming from customer origin server or CDN cache, Medianova performs compression for any status code.Some MN features like Geoblocking may cause MN CDN to serve lightweight, edge-generated error responses and these are always served uncompressed.
If compression is enabled for the requested content type, Medianova applies compression to responses with a minimum size of 400 bytes.
Medianova sends compressed responses without the Content-Length header to prevent browsers receiving possibly incorrect length information as a result of dynamic transformation.
Sending Cache-Control: no-transform on the response from origin has no effect on compression.
Medianova always requests uncompressed content from the customer origin server. The CDN sends no Accept-Encoding header to the origin and expects to receive the response uncompressed and without a Content-Encoding header.
MN uses compression level 6 for Gzip and 5 for Brotli. These compression levels provide an optimal balance between compression efficiency and server CPU consumption.
Yes. When a request is first made, Medianova servers cache the content Gzip compressed. If Gzip is later disabled, the already cached Gzip version will still be served unless a purge is performed or the cached object expires.
Currently, Medianova has no plans for supporting Zstandard-encoded content.

You can configure CORS Header in the Medianova Control Panel or via the API.
After enabling the feature, Medianova CDN edge servers add the access-control-allow-origin header to HTML responses based on your configuration.
If no domains are defined in the allow list, CDN edges return the following header:
The wildcard * allows any origin to load cross-origin resources from the CDN.
Add domains to restrict cross-origin access to only approved origins.
For example, if https://www.shop.com loads web fonts from https://fonts.shop.com and you want to prevent external sites from using these fonts, add fonts.shop.com to the allow list.
When a domain is added, CDN edges respond with:
Enter a domain into the Allowed Domains field.
Examples: fonts.shop.com, https://fonts.shop.com
Select Add to include the domain in the allow list.
CORS Header applies only to HTML responses.
If your origin also sets access-control-allow-origin, CDN behavior depends on your Header Override configuration.
Browser console messages provide the most accurate diagnostics for CORS failures.
If you use credentials or custom headers in your requests, additional CORS headers may be required at the origin level.
/videos/product_launch.mp4
/assets/images/banner.jpg
/css/style.css/myimages/subfolder/image.png
/assets/css/*X-XSS-Protection: 1; mode=block/index.html | mobile
/index.html | desktoptext/html
text/plain
text/css
text/x-component
text/javascript
application/javascript
application/x-javascript
application/json
text/xml
application/xml
application/rss+xml
application/atom+xml
application/rdf+xml
application/xhtml+xml
application/vnd.ms-fontobject
application/x-font
application/x-font-opentype,
application/x-font-otf
application/x-font-truetype
application/x-font-ttf
font/opentype
font/otf
font/ttf
font/woff
font/woff2
image/svg+xml
image/x-icon
application/x-www-form-urlencoded
application/dash+xml
application/x-mpegURL
application/octet-streamaccess-control-allow-origin: *access-control-allow-origin: https://fonts.shop.comRight-click on your “host” file and choose open with. Edit it with one of the applications such as Notepad or Notepad++.
Origin still returns uncompressed files
The origin server does not return gzip-compressed responses
Verify that gzip compression is enabled and properly configured on your origin server (for example, gzip on; in Nginx or mod_deflate in Apache).
Images not affected
The feature applies only to text-based files
Use Medianova Image Optimization for image compression and format conversion.
To start managing SSL certificates, open the Medianova Control Panel and navigate to the SSL Management section.
Go to CDN → SSL Management in the left-hand menu.
Review the list of existing certificates in your organization.
Click Add New SSL to begin adding a certificate.
When adding a certificate, you will be asked to choose the SSL type and format.
Choose SSL Type
Click Next after selecting the desired option.
Own SSL Setup
If you selected Own SSL, choose a certificate format and provide the required information.
Choose Certificate Format
Field Descriptions
Free SSL Setup
If you selected Free SSL, fill in the following details:
Click Add Free SSL to issue and install your certificate automatically.
After uploading or creating your certificate, assign it to a specific CDN Resource.
Go to CDN → CDN Resources.
Open the SSL tab (or CNAME & SSL for Small and Large resources).
Select one of the following options:
SNI (Own SSL): Use your uploaded SSL certificate.
Shared SSL: Use Medianova’s shared certificate.
Follow the steps below to enable and configure redirect handling for your CDN Resource.
Open Handle Origin Redirection Error and choose one or more redirect status codes that the CDN should process.
These codes determine which 3xx responses from your origin will trigger redirect handling logic. When a selected code is returned by the origin, the CDN applies your configured header settings and processes the redirect instead of simply passing it through unchanged.
Supported redirect codes:
301
When the origin returns a selected 3xx status code:
CDN intercepts the response.
CDN adds or modifies headers based on your configuration.
The redirect is returned to the client with the updated headers.
Request Header Key / Value modifies the header sent from CDN → Origin.
Add Header Key / Value appends additional headers in redirection processing.
When On, CDN evaluates redirect codes and applies your header settings.
When Off, CDN forwards redirect responses without modification.
Issue: Redirect handling does not apply. Cause: Status toggle is disabled or no redirect codes are selected. Fix: Enable Status and choose at least one code under Handle Origin Redirection Error.
Issue: Headers are not appearing in redirected responses. Cause: Header Key or Value fields are empty. Fix: Ensure both fields are filled before selecting Add.
Issue: Redirect behavior is inconsistent. Cause: Origin and CDN redirect configurations conflict. Fix: Review origin redirect rules and ensure the CDN's configured headers do not override necessary behavior.
To begin configuration, log in to the Medianova Control Panel and navigate to the WAF settings.
Go to Security → WAF in the left-hand menu.
Select the Dynamic CDN Resource where you want to activate WAF.
The WAF configuration page will open.
Select how the firewall will operate for your CDN Resource.
Monitoring Only: Logs all requests but does not block them. Recommended for initial setup and rule tuning.
On: Fully active mode that filters and blocks malicious traffic in real time.
After selecting a mode, click Save to apply the change.
After activation, you can define custom rules to control how WAF handles requests. For example, you can block requests from specific IP ranges or allow trusted user agents.
To create or manage rules, go to Managing Rules & Actions.
Always start with Monitoring Only mode for new configurations.
Combine Managed Rules and Custom Rules for optimal coverage.
Review your WAF Analytics regularly to track threats and rule behavior.
Avoid creating overly broad rules to minimize false positives.
Choose one or more conditions from the trigger list. Stale content will be served when any selected condition occurs.
Supported triggers in the Medianova Control Panel:
error — Generic error indicator returned by the origin system.
timeout — The CDN did not receive a timely response from the origin.
invalid_header — The origin returned malformed or unexpected HTTP headers.
http_500 — Internal Server Error.
http_502 — Bad Gateway.
http_503 — Service Unavailable.
http_504 — Gateway Timeout.
http_403 — Forbidden.
http_404 — Not Found.
http_429 — Too Many Requests (rate limit).
updating — The origin is in an update/maintenance state.
Stale content is served only if a cached version already exists at the edge.
Any selected trigger can activate stale delivery.
When the origin becomes healthy again, normal cache rules resume automatically.
Stale Cache does not refresh or regenerate content; it only delivers the most recent cached copy.
This feature is intended for temporary failures, not extended outages.
What happens if no triggers are selected? Stale content is never served.
Will Stale Cache fetch new content? No. It serves only what is already cached.
Does enabling all triggers hide origin problems? It may delay visibility of backend issues. Select triggers based on operational strategy.
Does TTL affect stale delivery? TTL defines freshness; stale delivery allows fallback after TTL when origin issues occur.
You can configure X-CDN Header in the Medianova Control Panel or via API
When enabled:
The CDN adds the following header to viewer-facing responses:
Browsers that support this header will not attempt to infer content types and will instead enforce the value provided by the origin.
MIME sniffing is disabled for resources such as scripts, stylesheets, and other content types that could be misinterpreted.
Ensure the browser does not guess content types, avoiding scenarios where a file may be interpreted as executable code.
Reduce attack surfaces where incorrect content-type interpretation could lead to script execution.
Guarantee consistent behavior across browsers by ensuring content is processed exactly as declared.
The header is applied only to viewer responses, not to origin-bound requests.
Modern browsers widely support nosniff, but legacy browsers may behave inconsistently.
Enabling this header does not alter your CDN caching logic.
Correct MIME types must still be set by your origin; this header does not correct misconfigured content types.
Enable Gzip From Origin instructs the CDN to request text-based files from your origin using:
When enabled:
• The CDN requests gzip-compressed content from the origin. • If the origin supports gzip, the CDN stores the compressed version in cache. • If the origin does not support gzip, the CDN stores the uncompressed response.
This improves performance and reduces bandwidth usage between the Origin → CDN path.
The CDN sends Accept-Encoding: gzip to the origin.
If the origin supports gzip, compressed content is returned and stored in the cache.
If the origin does not support gzip, the CDN caches the uncompressed response.
You can enable this feature via the Medianova Control Panel
Medianova CDN starts sending the Accept-Encoding: gzip header to your origin for eligible file types.
Does this feature compress content for end-users? No. It only optimizes the origin → CDN transfer. Client-side compression is handled separately by Gzip Delivery and Brotli Delivery.
What if my origin does not support gzip? The CDN will fetch and cache the uncompressed version of the file.
Does this apply to all file types? No. The feature applies only to text-based MIME types. Images are not affected and require Image Optimization.
The CDN adds an X-Frame-Options header to viewer responses.
If no domain is configured, the CDN sets:
which allows framing only from the same domain.
If one or more domains are provided, the CDN applies:
for each allowed domain, enabling selective embedding.
The browser enforces the framing policy and blocks disallowed attempts.
Block external sites from embedding your pages to protect users from UI redress attacks.
Permit framing only from specific domains that require embedded content (e.g., partner dashboards, internal tools).
Define clear, browser-enforced restrictions on how your content is presented in external applications.
ALLOW-FROM is not supported by all browsers. Modern security policies often prefer CSP frame-ancestors.
X-Frame-Options does not affect API endpoints or non-HTML content.
If multiple allowed domains are configured, behavior may vary by browser due to varying support levels.
This header has no effect on origin requests; it is applied only to viewer-facing responses.
The CDN adds a Strict-Transport-Security header to HTTPS responses.
Browsers cache the policy for the duration specified in the max-age parameter.
HTTP requests are redirected to HTTPS before the HSTS header is evaluated.
Optional parameters allow extending enforcement to subdomains and requesting preload inclusion.
The policy remains active in the browser until the max-age period expires.
Depending on your configuration, the header may include:
Defines how long the browser must enforce HTTPS for your domain. Common values:
31536000 (1 year)
63072000 (2 years)
When enabled, HSTS applies to all subdomains, not only the primary domain.
Requests inclusion in browser preload lists.
(Preload requires max-age ≥ 31536000 and includeSubDomains to be enabled.)
Enforce HTTPS-only access for compliance or security policies.
Reduce risk of downgrade/MiTM attacks.
Strengthen browser-side enforcement for high-value applications.
Ensure all subdomains—including those without valid HTTP → HTTPS redirects—are protected.
HSTS applies only to HTTPS responses; the header is not sent over HTTP.
Incorrect configuration may block HTTP fallback paths if subdomains or legacy systems depend on them.
Preload inclusion requires submitting your domain to the global HSTS preload list.
Changing the HSTS max-age does not immediately remove the policy from browsers; they follow previously cached durations.
Log in to the Medianova Control Panel.
Go to CDN → CDN Resources.
Select the resource where you want to apply IP restrictions.
Click the Security tab.
Open the IP Restriction (ACL) section.
Edit: Click the Edit icon to update an IP or range.
Delete: Click the Delete icon to remove it.
Save Changes: Click Save after every modification to ensure updates are applied at the edge.
Dynamic Origin URI: Specify dynamic or user-specific URIs that trigger the rewrite rules, ensuring accurate routing for content generated in real time.
Target URI: Set the destination URIs to which requests will be rewritten. Supports placeholders and query string management for personalized and API-driven content.
Priority-Based Execution: Assign priorities to rewrite rules to ensure correct execution order, especially when multiple rules overlap.
Optimized Content Routing: Ensures real-time requests are directed to the correct origin endpoints, even when public-facing URLs differ from backend paths.
Improved Backend Integration: Allows seamless integration with origin servers that use dynamic or customized URL structures.
Enhanced Flexibility: Supports complex URL rewrites using regular expressions and query string management for APIs, dynamic resources, or personalized content.
Reduced Latency: Enables direct mapping of public URLs to backend resources, reducing processing time and improving overall response speed.
Scalable Personalization: Dynamically adapts routing for user-specific requests, ensuring accurate delivery of tailored content without exposing backend complexities.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Origin Settings tab.
Navigate to the Rewrite Origin URLs section in the Medianova Cloud Panel.
Click the Add button to open the configuration popup.
Fill in the required fields:
Match Mode: Choose from the following options:
All files: Apply the rule to all files.
Path: Match a specific path.
Full Path: Match the exact full path of the URL.
Wildcard: Use wildcards for broader matching patterns.
Origin URI: Enter the URI that should be rewritten.
Target URI: Provide the URI where requests should be redirected.
Priority: Assign a priority to this rule to determine its execution order when multiple rules are defined.
Click the Add button.
Click the Submit button.
When you select Edge, you should set the cache time, which indicates the maximum age of your cached content. Then you should also specify if you would like to cache dynamic content such as your HTML files and click the Save Changes button.
Next, you need to check your Query String Caching settings. You can leave the Query String setting disabled, if you would like to cache your files by ignoring query strings; or you can enable it to treat each query string as a cacheable item.
If “Cache Dynamic Pages” option under Cache Settings has been enabled at Step 4.1, that means all HTML files served by your origin and all resources (CSS, images, JavaScript) found in HTML files, will be cached and served through Medianova CDN.
However, it is recommended to exclude some of the HTML files which contain private information (such as account details, credit card information on check out page etc.). Below are two options to disallow caching, either by defining paths or by using cookies.
a. Page Rule Cache Type: Go to the Page Rules menu and select dynamic cache type for the desired paths and/or extensions.
b. Disallow Caching by Using Cookies: Go to the Caching menu and enter Cookie Key & Cookie Value to bypass caching under “Disallow Cookie Base Cache” setting.
Go to the SSL menu and upload your SSL certificate.
You can test your Aksela account before redirecting your Website URL to your CDN URL, and serving traffic through our platform.
To start testing, first you need to find the IP address of the CDN URL. In order to do that, you can ping your CDN URL on Command prompt.
Example: ping cdnresource_name.mncdn.com
b. Then, you need to add this IP address to your hosts file.
- Open the Run tab by pressing Windows key + R.
- Type system32 in the search bar and click ok.
- On the screen, go to the “drivers” folder and then to the “etc” folder.
- Under the “etc” folder, you can right-click on your “hosts” file and select open and edit with application such as Notepad or Notepad++.
- Please add the IP address you obtained in the first step and the website you want to reach using this IP address to the file and save it.
c. Clear your browser cache. Make a request to the page by typing yourdomain.com in the address bar. On the page that opens, right-click on an empty area and select “inspect”. Go to the “Network” tab and find your Website URL within the list of requests. Click on it and and display the information in the “Headers -> Response Headers” area. Seeing “MNCDN” next to the “Server” field shows that the .html file is served from Medianova.
After completing the test successfully, login to your DNS hosting provider’s client panel and add a CNAME record for redirecting your Site URL to the CDN URL you have created.
yourdomain.com IN CNAME cdnresource_name.mncdn.com
Your traffic is now served through Medianova Aksela.

www.example.com → example.mncdn.comcdn.example.com → example.mncdn.com
Not Supported by Some DNS Providers (Root Domain CNAME):
example.com → ddd.mncdn.com
For root domains, ANAME or ALIAS records (if supported by the DNS provider) can be an alternative solution to achieve similar functionality.
Aksela is a micro-caching platform developed by Medianova. Micro caching ensures that your content can be cached even for seconds. It serves static & dynamic content and API requests on your website through edge servers closest to end users.
By laying between the origin server and the end user, Aksela both increases performance and provides an additional layer of security. In addition to the security measures provided by Aksela, WAF (Web Application Firewall) can be provided as an additional security service.
You can access the Medianova cloud panel by logging in with your username and password at cloud.medianova.com
Click on “CDN → Create CDN Resource” option from the menu on the left side of the panel.
In the next screen, Dynamic CDN Resource is selected from the “Start building your CDN”
Fill in the requested information for Dynamic CDN Resource.
5 . When all the information is filled in correctly, the Dynamic CDN Resource is created by clicking the “Create CDN Resource” button. It will take a few minutes to be active on all edge servers. (When the “ping example.mncdn.com” command is run, getting a response from an IP address means that the CDN Resource is active).
Dynamic Header Management Define which request headers are passed or excluded during the redirect process, ensuring consistency for user-specific or API-driven workflows.
Real-Time Header Customization Add or modify headers dynamically during the redirection process to align with real-time conditions or backend logic.
Optimized for Dynamic Content: Handles session-based or real-time redirects without introducing latency.
Seamless User Experience: Ensures that personalized content routing occurs smoothly.
Improved Efficiency: Reduces unnecessary origin server requests for redirects triggered by dynamic conditions.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Origin Settings tab.
Enable this setting.
Fill in the required fields.
Handle Origin Redirection Error: Select which HTTP status codes (301, 302, 303, 307, 308) to handle for origin redirections. You can choose one or multiple options depending on the behavior you want to implement.
Request Header Key: Specify the name of the request header you want to manage during the redirection process.
Request Header Value: Provide the value for the corresponding request header key.
Click the Add button.
Click the Submit button.
Cache Sharing Across Accounts: By setting the cache to "Shared", you enable different accounts or domains to use the same cache structure. This ensures faster content delivery for dynamic content, as the CDN can serve cached data across multiple accounts without re-fetching from the origin server, improving performance and reducing server load.
Status Options:
Default (Default Setting): The cache is not shared across accounts. Each account has its own separate cache structure, and dynamic content is cached independently for each account.
Share: When set to "Share", the Domain Cache Key allows multiple accounts or domains to access the same cache structure. This enables shared caching of dynamic content, optimizing delivery speed and reducing unnecessary redundancy in caching.
By utilizing the Shared Cache feature for dynamic content, you can significantly improve cache efficiency, reduce redundant caching, and enhance the performance of content delivery across multiple accounts or domains. This feature is particularly useful for organizations managing multiple domains or accounts that require consistent access to the same dynamic resources.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Stale Cache section in the Medianova Cloud Panel.
Set the Cache Status:
To enable shared cache, select the Share option.
To keep the cache separate, leave it set to the Default option.
Save Your Settings: Once you've selected the desired cache status, click Submit to apply the changes.
Medianova’s Static CDN provides an optimized way to serve static assets with speed, security, and scalability:
Reduced Latency – Serve content from the nearest CDN edge location.
Improved Page Load Times – Accelerate rendering of images, scripts, and styles.
Lower Origin Load – Cache content at the edge to minimize backend requests.
High Availability – Redundant nodes ensure reliability even under heavy traffic.
Global Reach – Consistent performance across all geographic regions.
Combine Static CDN with Dynamic CDN or Image Optimization to maximize performance across your entire website.
Edge Caching – Automatically stores and serves static content at geographically distributed edge nodes.
Custom Domain Support – Use your own domain (CNAME) for branded content delivery.
SSL/TLS Encryption – Secure asset delivery with HTTPS support.
Compression & Optimization – Automatically compresses and optimizes file sizes for faster transfer.
Scalability – Handles spikes in user traffic seamlessly without impacting origin performance.
Monitoring & Analytics – Real-time reporting to track delivery performance and usage trends.
Medianova’s Static CDN combines global edge coverage, intelligent caching, and secure HTTPS delivery to optimize the delivery of static assets. Whether hosting media, websites, or web applications, this service ensures users experience faster load times and consistent performance anywhere in the world.
Deny or Allow Caching: You can specify whether to deny or allow caching based on the presence of a particular header value.
Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.
Select the relevant resource.
Click on the Caching tab.
Scroll down to the Header Value-Based Cache section.
Enable the Feature: Toggle the Header Value-Based Cache option to "On" in the panel.
Define Header Caching Rules:
Type: Select whether to deny or allow caching based on the header value.
Header: Enter the HTTP header name.
Value: Enter the corresponding header value.
Submit Changes: After filling in the fields, click the Submit button to save and apply your changes.
Important Notes
Precise Cache Control: This feature ensures that caching behavior is determined by specific header values, providing granular control over cache management.
Single Rule Definition: You can define one header value-based caching rule at a time. Additional rules can be added later if needed.
By configuring the Header Value-Based Cache settings, you can optimize caching for scenarios where header values dictate whether content should be cached, ensuring efficient content delivery and personalized user experiences.
Support for Multiple Headers: You can define multiple header key-value pairs to fine-tune caching rules for diverse request scenarios.
Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.
Select the relevant resource.
Click on the Caching tab.
Scroll down to the Header-Base Cache section.
Toggle the feature to "On."
Define header key-value pairs:
Enter the header key and value in the respective fields.
Use the + button to add more header key-value pairs.
Click Submit to apply the changes.
Important Notes
Granular Control: This feature ensures that requests with specific HTTP headers influence caching decisions, enabling more precise cache management.
Multiple Header Key-Value Pairs: Define as many header key-value pairs as necessary to meet the caching requirements of your application.
By configuring the Header-Base Cache settings, you can optimize caching strategies for requests that vary based on HTTP headers, improving both performance and user experience.
Select a header action from the dropdown.
Available Header Actions You can create header rules using the Add dropdown. Each option applies to a different stage of the request/response flow. Add Origin Request Header Adds a custom header to the request sent from CDN edge to the origin server. Add CDN Response Header Adds a custom header to responses delivered from CDN edge to the viewer. Remove CDN Response Header Removes a header from the response before it is sent to the viewer. Raw Header Creates a raw header rule with a custom directive, without binding it to request or response type logic. (Use only if you require fully custom header behavior.) Remove Origin Request Header Removes a header before the request is forwarded to the origin server.
Enter the Key and Value for the header, if the selected action requires one.
Header keys and values must follow valid HTTP header formatting rules.
If the same header is modified by multiple rules, CDN edge behavior follows the order of applied rules.
Removing headers may affect origin authentication, CORS behavior, or cache control logic.
Use Raw Header only when standard rule types do not fit your use case.
Learn how to identify, analyze, and minimize false positives in the Web Application Firewall (WAF) to ensure accurate protection without disrupting legitimate traffic.
A false positive occurs when the WAF blocks or flags a legitimate request as malicious. This can happen due to aggressive rule patterns or incomplete exceptions. Proper handling of false positives helps maintain both security and availability of your applications.
Identify False Positives
Use WAF logs and analytics to locate requests that were incorrectly blocked or flagged.
Open the Medianova Control Panel.
Go to Analytics → WAF Dashboard.
Review blocked requests and event logs.
Look for requests that match normal user or API behavior but are classified as threats.
Analyze Rule Behavior
Determine which rule caused the false detection. You can identify the Rule ID or Rule Name responsible by inspecting the event details in the WAF dashboard.
Adjust Rules or Add Exceptions
After identifying the cause, fine-tune your rules to allow legitimate traffic while keeping protection active.
You can:
Modify an existing rule
Adjust the Field, Operator, or Value
Validate After Adjustments
Once changes are made, monitor the WAF dashboard again:
Keep the affected rule in Log Only mode for several hours or days.
Check if the same requests are still flagged.
Learn how to manage Rewrite Origin URLs to modify how request paths are sent to your origin.
Rewrite Origin URLs enables you to transform incoming paths before they are forwarded to origin servers. You can configure Match Mode, Origin URI, Target URI, and Priority to adjust how paths are rewritten for directory changes, API restructuring, or backend routing needs.
You can manage Rewrite Origin URLs using the Medianova Control Panel or API.
In the Medianova Control Panel, go to CDN Resources, select your resource, and navigate to Origin Settings
Follow the steps below to add and manage Rewrite Origin URLs for your CDN Resource.
All files: Applies to every incoming request.
Path: Matches only the path portion of the request URI.
Full Path: Matches the exact full URL path.
Wildcard: Enables dynamic pattern matching using wildcard symbols.
Issue: Rewrite Origin URL does not apply. Cause: Incorrect Match Mode or Origin URI format. Fix: Verify that the incoming request path matches the defined parameters.
Issue: A different Rewrite Origin URL is applied first. Cause: Priority ordering conflict. Fix: Assign a lower priority value to the entry you want processed first.
Issue: Origin returns 404 after rewrite. Cause: Target URI does not exist on the origin. Fix: Confirm that the target path is valid and reachable at the origin server.
Learn how to enable and manage free SSL certificates in the Medianova Control Panel.
Free SSL certificates provide an easy and cost-effective way to secure your CDN Resources without purchasing a commercial SSL. Medianova integrates Let’s Encrypt to automatically issue and renew these certificates through the SSL Management interface.
Learn how to interpret the Web Application Firewall (WAF) dashboard and key analytics metrics in the Medianova Control Panel.
The WAF Analytics Dashboard provides visibility into malicious traffic, rule performance, and blocked requests detected by the Web Application Firewall (WAF). You can monitor attacks in real time, identify their sources, and adjust your rules to improve detection accuracy.
You can access the WAF analytics from the . Navigate to Analytics → WAF, then select the CDN Resource for which WAF is enabled. The dashboard displays real-time charts, tables, and logs that visualize threat activity, blocked requests, and triggered rules.
1. Attack Histogram
Shows the number of attacks over time, helping you detect spikes or recurring patterns. You can filter by URL to analyze specific endpoints under attack.
Use it for: spotting attack trends and determining peak hours of malicious traffic.
2. Threats
Displays the total number of requests that triggered WAF rules versus total incoming requests. Includes summary values such as:
Total: All detected threats since activation
Today: Threats detected in the last 24 hours
This Month / Last Month: Periodic comparison
Use it for: measuring overall WAF effectiveness and identifying sudden spikes that may signal an attack.
3. Top Client IPs
Lists the IP addresses triggering the most WAF rules. A pie chart provides a quick visual overview of threat sources.
Use it for: detecting potential attackers or regions generating malicious traffic.
4. Top Request URIs
Shows the URLs most frequently targeted by suspicious or blocked requests.
Use it for: identifying vulnerable endpoints or popular attack targets.
If a specific path (e.g., /login, /api/v1/auth) appears repeatedly, consider applying additional rule protections.
5. Top User Agents
Lists browsers, bots, or automated clients generating flagged requests.
Use it for: distinguishing legitimate traffic from malicious bots. Unusual or outdated User Agents may indicate automated attack tools.
6. Rule Activity
Displays which WAF rules are triggered most often, showing their frequency and relative impact.
Use it for: assessing rule efficiency and identifying potential false positives. Frequently triggered rules may need refinement or condition adjustments.
7. Activity Log (Last 300 Requests)
Shows detailed information about the most recent flagged requests, including:
Timestamp
IP address
Request URI
User Agent
Use it for: investigating incidents and validating rule accuracy. Regular review helps fine-tune your security posture.
Review WAF analytics at least weekly to identify trends.
Watch for repeated attacks from the same IPs or regions.
Use the Threats and Rule Activity metrics to detect false positives or over-triggered rules.
Adjust or refine rules based on recurring attack patterns.
The Web Application Firewall (WAF) allows you to define Custom Rules that specify how incoming traffic is evaluated. Each rule can match certain request attributes and apply an action — such as Block, Allow, or Log Only — when conditions are met.
Each action defines how WAF handles a matched request:
Note: “Log Only” is ideal for testing or monitoring potential issues before applying stricter blocking rules.
Learn how to create a Large CDN Resource in the Medianova Control Panel for large file delivery or video-on-demand (VOD) content.
A Large CDN Resource is designed for delivering large files such as video, music, archives (.zip), or executables (.exe). This resource type provides optimized caching behavior for large objects, improving performance and minimizing load on your origin servers.
In the Create CDN Resource form, you can configure either:
Large Content Caching – for static large files such as videos, music, zip, or exe files.
VOD Content Caching – for media content that requires transcoding to streaming protocols (e.g., HLS, DASH).
Note: Following file extensions are not allowed in a Large CDN Resource. The service will return a 403 error when calling these type of files.
| gif | jpg | jpeg | png | bmp | swf | psd | tif | tiff | txt | html | jsp | js | css | ico | aspx | php | woff | ttf | eot | otf | htm | xml | pdf | psb | ashx | swz | cur | svg | jpr | webp |
Use Large Content Caching for large, static files and VOD Content Caching for media that needs adaptive packaging.
Config Status and Resource Status icons confirm that setup is complete.
If configuration fails, verify origin connectivity and port settings.
After creation, your Large CDN Resource appears in the CDN Resources list with valid configuration indicators. You can verify connectivity by running:
A successful response from an IP address confirms that the resource is active and accessible through Medianova’s edge network.
Define advanced origin routing rules by matching requests to specific origins based on URI patterns, protocols, domains, ports, and priority.
Advanced Origin Settings allow you to configure granular origin-routing behavior for specific URIs, file types, or directories. By defining rule-based conditions, you can route selected traffic to different origins, override ports, set custom host headers, or assign priorities for complex routing environments.
You can manage Advanced Origin Settings in the Medianova Control Panel or via API.
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Origin Settings tab.
Advanced Origin Settings use rule-based logic. Each rule defines what request pattern to match and how the CDN should route that traffic.
This workflow creates a new rule for routing selected requests to a specific origin configuration.
Advanced Origin Settings follow a priority-based evaluation model:
Highest priority wins. Lower numeric values represent higher priority.
If multiple rules match the incoming request, the CDN applies the rule with the highest priority.
If no rules match, the CDN uses the default origin configuration.
Routing decisions consider:
URI match pattern
Origin protocol selection
Domain/IP
Ports
This allows precise routing for APIs, media directories, file extensions, or multi-origin deployments.
What happens if multiple rules match the same request?
The rule with the highest priority (lowest priority number) is applied.
Do regex or prefix rules impact performance?
Regex rules are more expensive than prefix or extension matches. Use them only when necessary.
What if no Advanced Origin rule matches the request?
The request is sent to the default origin defined in the main Origin Settings section.
Proactively warm up CDN caches by fetching files from your origin before user access, ensuring fast delivery and avoiding cache misses.
Prefetch refers to the process of proactively fetching and caching specific files from your origin before any user request occurs. It warms up CDN caches so that the first users receive content instantly, avoiding slow cache misses and offloading your origin server. When you initiate a Prefetch, the CDN pulls the file from your origin and caches it across all CDN POPs. This is especially effective for the delivery of large static or media files.
You can initiate Prefetch operations from the or via the .
Use Prefetch to:
Preload content before a scheduled event, campaign, or content release
Ensure large static files (e.g., videos, software downloads) load instantly
Avoid cache-miss latency for the first user(s)
Offload your origin by serving assets from CDN edge locations
You submit one or more file paths via the or .
Medianova CDN initiates an HTTP GET request to your origin for each file.
If the file is not already cached, it is fetched and stored across CDN edge locations.
The file is then available to be served instantly to users from cache.
When you initiate a Prefetch, the CDN issues an HTTP GET request to your origin and stores the file in cache across all CDN POPs (Points of Presence). This ensures that the file is readily available globally, without waiting for actual user traffic to trigger cache population.
Unlike Purge, which invalidates cached content, Prefetch only populates caches if the file is not already cached. If the file already exists in cache, Prefetch will not re-fetch it from origin.
Prefetch Type
Medianova supports single-file Prefetch, which allows fetching and caching a specific file from your origin.
Prefetch only frequently accessed static files, such as videos, images, or large downloads.
Use Purge + Prefetch together to refresh caches after file updates.
Schedule Prefetch operations during off-peak hours to minimize origin load.
Avoid prefetching non-cacheable or dynamic resources.
Configure browser-side caching behavior for different resource types using Browser Cache Rules.
Browser Cache Rule allows you to control how long different resource types remain cached in the visitor’s browser.
This improves performance by reducing repeated network requests for static or frequently accessed files.
You can manage Browser Cache Rules in the Medianova Control Panel or via API.
Log in to the Medianova Control Panel, select a CDN resource in the CDN section, and navigate to the Caching tab.
Open the options menu for the rule and select Edit.
Modify Type, Priority, or Cache Mode as required.
Select Submit to save the changes.
Open the options menu for the rule and select Delete.
Confirm the deletion to remove the rule.
Select Submit to apply the update.
Rules are evaluated in order of Priority, where smaller numbers indicate higher precedence.
Browser Cache Rules control browser-side caching only, not CDN edge caching.
The Apply the HTML/JSON files toggle affects all rules globally.
When Cache Mode = Origin, browser caching behavior follows origin headers;
Use file extension rules to cache static assets like .js, .css, and .png for long durations.
Use no cache mode for frequently updated resources (e.g., .html, .json APIs).
Medianova CDN Configuration Basics document is designed to help you understand and implement the fundamental configurations necessary to leverage the full potential of Medianova's Content Delivery Network (CDN). Whether you are a web developer, content creator, or IT professional, this guide will walk you through essential concepts and steps to optimize content delivery, enhance performance, and improve user experience.
To get started with Medianova CDN, follow these steps:
Log in to with your username and password.
Click on the Create CDN Resource tab in the left menu.
Choose any resource type and fill in the necessary fields.
Create a resource and configure the necessary settings.
The resource you created will be in a "pending" status. Below is information about the resource statuses:
The CDN URL and the ORIGIN URL below are examples.
Enlarges the table by opening it in a full screen dialogOpen
You must replace the existing domain on website code with the CDN URL for contents that you want to serve from CDN.
Examples of HTML code illustrating how to configure a CDN URL with the Origin URL:
Source codes are replaced with the CDN URL instead of the Origin URL as mentioned above.
Thus, our CDN service becomes active on your site.
In order to access your content, you also need to define our IPs in your firewalls. to access the IP list of Medianova.
The Browser Cache Rule feature in the Medianova Cloud Panel for dynamic content allows you to define caching behavior for dynamically generated resources. This feature helps optimize content delivery for dynamic content, reduce load times, and ensure that content is always up-to-date or efficiently cached for better performance.
Flexible Cache Type Options:
All Files: This rule applies to all dynamic files, regardless of their type or location. It can be useful when you want to apply caching behavior globally to all dynamic resources.
Full Path: Apply the caching rule based on the exact full URL path of the dynamic content. This allows for fine-tuned control over specific dynamic URLs.
Directory: Apply the caching rule to all dynamic content within a specific directory. This is useful when dynamic content is organized by folder.
File Extension: Apply caching rules based on the file extension (e.g., .json, .html, .php). This is particularly useful when dynamic content is served as JSON, HTML, or other formats.
Cache Priority: Set priorities for dynamic resources to control which resources are cached first. For example, prioritize critical dynamic content (e.g., personalized data, user-specific content) over less important content to improve user experience.
Cache Mode Options:
Origin: Dynamic resources are fetched and cached directly from the origin server, ensuring that content is always up-to-date.
No Cache: The dynamic resource will not be cached in the browser and will always be fetched from the origin server. This ensures that the latest dynamic content is always served, but can increase load times.
Cache:
Apply to HTML/JSON Files:
On: The caching rule will apply to HTML and JSON files that contain dynamic content, allowing you to fine-tune caching behavior for these specific resource types.
Off: The caching rule will not apply to HTML and JSON files, ensuring they are always fetched fresh from the origin server.
By configuring Browser Cache Rules for dynamic content, you can optimize content delivery for both performance and freshness, ensuring that dynamic resources are efficiently cached or fetched in a way that best meets your application's needs.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Caching tab.
Navigate to the Browser Cache Rule section in the Medianova Cloud Panel.
Click on the Add button to create a new cache rule.
Configure Cache Rule Settings:
Type: Choose the type of cache rule you want to apply:
By configuring the Browser Cache Rule, you can control how different file types are cached, ensuring that critical resources are loaded faster and less important resources are handled according to your specifications. The option to apply or not apply to HTML/JSON files provides further flexibility in caching strategies.
Accelerate personalized, database-driven, or API-based content with Medianova’s Dynamic CDN. Cache dynamic responses at the edge to reduce origin load and deliver faster user experiences.
Dynamic Content Acceleration delivers time-sensitive and user-specific content faster by intelligently caching dynamic responses at the CDN edge. Unlike static assets, dynamic content (such as personalized dashboards, API responses, or search results) is generated for each request, which can increase server load. Medianova’s microcaching technology allows these responses to be cached for very short durations — even a few seconds — dramatically improving responsiveness while keeping data up to date.
This feature is available for Dynamic CDN Resources and can be managed through the Medianova Control Panel.
Dynamic content caching enhances both speed and efficiency for high-traffic applications. It helps you:
Reduce origin load – Serve frequent requests directly from CDN edge nodes.
Improve page responsiveness – Cache HTML and API responses for short durations.
Lower bandwidth costs – Decrease redundant origin requests.
Scale efficiently – Handle large traffic spikes with consistent response times.
Use Dynamic CDN for applications where content changes often but not on every request — such as product listings, search results, or pricing data.
Microcaching – Cache dynamic responses for seconds or minutes to optimize performance.
Full Page Caching (FPC) – Cache entire HTML pages to reduce origin queries.
API Caching – Store API responses for repetitive or frequent calls.
Edge-based Caching – Execute caching at CDN edge locations to minimize latency.
The origin server generates dynamic content in response to user requests.
The Dynamic CDN edge caches the response for a short, configurable duration (e.g., 5 seconds).
Repeated requests within that duration are served instantly from the edge cache.
Once the TTL expires, the CDN refreshes the data from the origin to ensure freshness.
A product API returning inventory counts can be cached for 10 seconds — enough to handle hundreds of identical requests without stressing your database.
Setting cache time too low may reduce cache efficiency, while setting it too high can risk serving outdated data. Start small and adjust gradually based on analytics.
Exclude personalized or transactional pages (like /checkout or /profile) from caching.
Cache short-lived API responses to improve responsiveness.
Regularly monitor cache hit ratios to fine-tune TTLs and rules.
The Disallow Cookie-Based Cache feature in the Medianova Cloud Panel allows you to prevent caching for requests containing specific cookie values. By defining multiple key-value pairs, you can control how the cache behaves when certain cookies are present, ensuring that caching policies align with your requirements.
Prevent Caching for Specific Cookies: When enabled, this feature allows you to specify cookie key-value pairs that should bypass caching. Requests containing these cookies will not be cached, ensuring dynamic and personalized content delivery.
Support for Multiple Key-Value Pairs: You can define multiple cookie key-value pairs to tailor caching behavior for a variety of scenarios. This provides flexibility in managing caching for complex applications with diverse user interactions.
Enable the Feature: Toggle the Disallow Cookie-Based Cache option to "On" in the panel.
Define Cookie Key-Value Pairs:
Enter the cookie key in the provided field.
Enter the corresponding cookie value.
Navigate to the CDN Resources section in the left-hand menu of the Medianova Cloud Panel.
Select the relevant resource.
Click on the Caching tab.
Scroll down to the Disallow Cookie-Based Cache section.
Important Notes
Granular Control: This feature ensures that requests containing specified cookies bypass the cache, enabling precise control over cache behavior for dynamic content.
Multiple Key-Value Pairs: You can define as many key-value pairs as necessary to accommodate your application's caching needs.
By configuring the Disallow Cookie-Based Cache settings, you can optimize cache management for scenarios requiring personalized or dynamic content delivery, ensuring seamless and accurate user experiences.
The Origin SNI Request feature ensures that Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connections to your origin server use the correct domain name during the handshake process. By including the Server Name Indication (SNI) extension in the connection request, the origin server can identify and present the appropriate SSL certificate, even when multiple domains are hosted under the same IP address.
In dynamic content delivery, where secure connections are frequently established and involve user-specific or API-driven resources, Origin SNI Request plays a critical role in ensuring secure and seamless content routing. This feature enhances compatibility with origin servers handling dynamic or personalized content while maintaining optimal performance.
Seamless Multi-Domain Support: Ensures proper SSL/TLS certificate selection for multiple domains hosted on the same origin server.
Enhanced Security: Enables secure connections for dynamic requests, protecting sensitive user data during transit.
Improved Compatibility: Supports origin servers that rely on SNI for SSL/TLS handshakes, ensuring uninterrupted content delivery.
Optimized for Dynamic Content: Handles frequent and personalized requests efficiently, without compromising connection performance.
Click on the CDN Resources section in the left-hand menu of the Cloud panel.
Select the relevant resource.
Click on the Origin Settings tab.
Navigate to the Origin SNI Request section in the Medianova Cloud Panel.
Provide the required Origin SNI Request Domain:
Enter the domain name for which SSL/TLS connections should be established.
Ensure the domain corresponds to a valid SSL certificate on the origin server.
Click Submit to save the configuration.
Validate cached content using the ETag response header so the CDN can detect when the origin object has changed.
ETag Verification ensures that cached objects remain consistent with the latest version served by the origin. When enabled, the CDN evaluates the ETag header returned by the origin and refreshes the cached object when a mismatch is detected. This prevents outdated or stale content from being delivered to end users.
You can manage ETag Verification in the Medianova Control Panel or via API.
Select a CDN resource in the CDN section, and navigate to the Caching tab.
Enable or disable ETag validation to ensure cached content remains synchronized with the origin.
When enabled, the CDN compares the origin’s ETag header with the cached object to determine whether a refresh is required.
When disabled, cached objects are served without ETag-based validation.
ETag validation improves consistency but may result in more origin requests depending on header behavior.
Does ETag Verification guarantee that the CDN always serves the latest version? Yes. When enabled, the CDN validates the cached object using the ETag header and refreshes it if the origin indicates a change.
Does enabling ETag Verification increase origin traffic? It can. Validation requires comparing ETag values, which may trigger additional revalidation requests depending on origin behavior.
What happens if the origin does not send an ETag header? The CDN cannot perform ETag-based validation. Normal cache expiration and revalidation rules apply.
Learn how to integrate WordPress with Medianova CDN to deliver static and media content faster, improve page load times, and enhance your website’s overall performance.
WordPress is one of the world’s most widely used content management systems (CMS), offering flexibility through open-source development, easy setup, and extensive theme and plugin support. With Medianova CDN, your WordPress site’s static assets—such as images, scripts, and videos—are served from the nearest CDN edge node instead of your origin server, ensuring faster delivery to global users.
Access to your WordPress Admin Panel
A Medianova CDN Resource created in the Medianova Control Panel
Optional: Separate CDN resources for static images (Small Resource) and large media files such as videos (Large Resource)
To include multiple file extensions, separate them with commas (,).
Example: jpg, png, gif, svg
You can view your CDN Resource URLs in the Medianova Control Panel under CDN → Resources or by visiting .
Rate Limiting helps manage client request traffic by defining thresholds on how many requests a user or IP can make within a specified time window. This feature operates at the CDN edge, preventing excessive traffic from reaching your origin servers and maintaining stable performance.
Learn how to integrate Phalcon, a high-performance PHP framework, with Medianova CDN to serve static assets efficiently and enhance website performance.
Phalcon is an open-source PHP framework designed for speed and efficiency. Unlike traditional PHP frameworks, Phalcon is implemented as a C extension, providing exceptional execution performance with MVC architecture support.
This guide explains multiple integration methods for connecting Phalcon-based applications with Medianova CDN to deliver static files (CSS, JS, images) from the nearest CDN edge.
Learn how to add, edit, clone and delete page rules in the Medianova Panel.
Path & Extension Based Rate Limiting allows you to define traffic limits based on specific URL paths and/or file extensions (e.g., /api , /login, .pdf, .jpg). This enables targeted protection for sensitive endpoints or static resources by enforcing custom request limits per rule.
Path & Extension Based Rate Limiting is available under Page Rules for Small, Large and Dynamic
Learn how to integrate CakePHP with Medianova CDN to deliver static assets such as images, CSS, and JavaScript files faster and improve website performance.
CakePHP is an open-source PHP framework based on the MVC (Model-View-Controller) pattern, similar to Zend, Laravel, and Symfony. This guide explains how to configure Medianova CDN for CakePHP version 2.4 and later, enabling your application to serve static content from the nearest CDN edge node instead of the origin server.
Learn how to integrate your Medianova Small or Large CDN Resource with your website to deliver static assets or large media files through the CDN.
After creating a Small or Large CDN Resource in the Medianova Control Panel, you must integrate it with your website or application so that your static and media assets are delivered through the CDN instead of your origin. This guide explains how to update your asset URLs, firewall configuration, and CMS settings to ensure seamless content delivery via Medianova CDN.
A
Learn how to integrate your Magento-based e-commerce website with Medianova CDN to improve load speed and ensure high-performance content delivery.
Learn how to add and configure a CNAME to map your custom domain and enable secure HTTPS delivery.
A CNAME record (Canonical Name record) allows you to associate your custom domain — for example, cdn.yourdomain.com — with the default hostname provided by Medianova, such as yourzonename.mncdn.com.
Using a CNAME provides consistent brand identity, simplifies DNS management, and enables secure HTTPS delivery through the .
X-Content-Type-Options: nosniffAccept-Encoding: gzipX-Frame-Options: SAMEORIGINX-Frame-Options: ALLOW-FROM <domain>Strict-Transport-Security: max-age=<seconds>
Strict-Transport-Security: max-age=<seconds>; includeSubDomains
Strict-Transport-Security: max-age=<seconds>; preload
Strict-Transport-Security: max-age=<seconds>; includeSubDomains; preloadOnly the IP addresses you add will be allowed. All others will be blocked.
Blacklist
The IP addresses you add will be blocked. All others will be allowed.
Enter a Rule Name for easy identification.
Select a Field (parameter) from the dropdown — such as:
Request Method (GET, POST, etc.)
Client IP
Request URI
User Agent
Referrer
Choose an Operator, such as equals, contains, or matches.
Enter the Value to match.
(Optional) Add additional conditions using the And operator.
Select an Action to perform when the rule conditions are met:
Block – Reject the request and log the event.
Allow – Permit the request to proceed to origin.
Log Only – Record the request for review without blocking.
Click Save to apply the rule.
Delete: Click the Delete icon to permanently remove the rule.
Reorder (if supported): Drag and drop to change rule evaluation priority.
Block
Immediately rejects the request with an error response.
Allow
Lets the request pass to the origin server.
Log Only
Records the event for analysis without blocking traffic.
Verify operation results in the Prefetch Logs section.
Behavior
Description
Single-file fetching
Each Prefetch request targets one specific file path
CDN-wide propagation
Files are cached across all POPs
TTL adherence
Cache duration respects the file's Cache-Control or configured TTL settings
Origin-safe
No effect if the file is already cached unless purged first
Type
Description
Example
Single File Prefetch
Fetches and caches one specific file from your origin.
/videos/intro.mp4
Passive: If the resource becomes unavailable for any reason, the resource status changes to "Passive." In this state, the resource is inactive, and users cannot access it.
Origin URL
CDN URL
.jpg, .png) and a Large Resource for video files (e.g., .mp4).
→ Copy the CDN URLs of your created resources; they will be used in plugin configuration.CDN URLs not applied to static files
Plugin not configured or cache not cleared
Recheck the CDN URLs in plugin settings and clear the WordPress cache.
Site shows mixed content warnings
HTTPS not enabled on CDN resource
Configure Shared SSL or Custom SSL in the Medianova Control Panel before enabling HTTPS.
CDN plugin not found in search
Outdated WordPress version
Update WordPress to the latest version and try again.
Click Save to apply the changes.
Own SSL
Upload your own SSL/TLS certificate issued by a Certificate Authority (CA).
Free SSL
Use a free SSL certificate automatically issued by Medianova (Let’s Encrypt).
Domain SSL
Extract an existing certificate directly from your domain if HTTPS is enabled.
.crt / .pem / .key (Paste Content)
Paste your certificate, private key, and CA chain into the input fields.
.crt / .pem / .key (Upload File)
Upload the certificate and private key files directly from your device.
.pfx (Personal Information Exchange)
Upload a .pfx file containing your certificate, key, and chain. Provide a password if required.
SSL Name
Internal display name for your SSL certificate.
Domain Name
Domain or wildcard domain to secure.
Certificate (.crt)
Public certificate file for HTTPS validation.
Private Key
Private key matching the certificate.
Certificate Password
Password for encrypted key or .pfx file.
CA Chain / Intermediate Certificates
Certificates linking your domain to the root authority.
SSL Name
A name to identify the certificate in your organization.
Wildcard
Toggle this option to secure all subdomains under the same domain.
Domain
Select the CDN domain to apply the certificate.
Leaf Certificate
The primary certificate for your domain.
Intermediate Certificates
Bridge between the leaf and the root authority.
Root Certificate
Trusted by browsers and operating systems.




Fill in the required fields in the popup:
Match Mode — Choose how the incoming path is matched. Options include:
All files
Path
Full Path
Wildcard
Origin URI — Enter the incoming request path to match.
Target URI — Enter the new path that requests will be rewritten to.
Priority — Lower values are evaluated first when multiple Rewrite Origin URLs exist.


Combine analytics data with logs from your origin server for deeper context.
Rule ID / Name
Identifier of the triggered rule.
Triggers
Number of times the rule matched incoming requests.
Last Triggered
Most recent occurrence time.






Choose how the rule matches content:
All Files – Applies rule to all content.
Full Path – Applies to an exact URL path.
Directory – Applies to all content under a directory (for example: /images/).
File Extension – Applies to file types (for example: .jpg, .css, .js).


Full Path: Applies to files based on their exact URL path.
Directory: Applies to all files within a directory.
File Extension: Applies based on file extensions like .js, .css, .jpg, etc.
Priority: Set the priority (e.g., High, Medium, Low) for this cache rule to manage which files are cached first.
Cache Mode: Select the cache mode:
Origin: The resource is cached from the origin server.
No Cache: The resource is not cached.
Cache: The resource is cached in the browser for a set duration.
Apply the HTML/JSON Files:
On: Enable this option to apply the rule to HTML and JSON files.
Off: Disable this option to exclude HTML and JSON files from this cache rule.
Once you've configured the browser cache rule, click Submit to apply the changes.

Balance freshness and performance – Configure cache rules to keep data relevant without overloading the origin.
Custom Page Rules – Exclude sensitive or real-time pages such as checkout or admin panels.
Granular Cache Control – Configure individual TTLs (cache durations) for different endpoints.
Use Compression and WebP Optimization to further reduce load times.
Cache Time (TTL)
Determines how long dynamic responses are cached before being refreshed. Shorter TTLs maintain freshness; longer TTLs improve performance.
Page Rules
Define which paths should or should not be cached (e.g., exclude /checkout, /admin, or highly dynamic pages).
API Endpoints
Apply caching selectively to repetitive API calls (e.g., product listings, autocomplete, or pricing).

Use the + button to add additional key-value pairs as needed.
Submit Changes: After entering the required cookie key-value pairs, click the Submit button to save and apply your changes.
Toggle the feature to "On."
Define cookie key-value pairs:
Enter the cookie key and value in the respective fields.
Use the + button to add more key-value pairs.
Click Submit to apply the changes.

Enable the Origin SNI Request setting by toggling it to On.

Enable or disable ETag validation using the ETag Verification toggle.



302 — Temporary redirect
303 — See Other
307 — Temporary redirect (method is preserved)
308 — Permanent redirect (method is preserved)
The CDN will apply your redirect-handling configuration only to the selected status codes, giving you granular control over how different redirect types are processed.
Request Header Key: User-AgentRequest Header Value: Custom-UA
If you do not need to change request headers, leave these fields empty.
Add Header Key: X-Debug-RedirectAdd Header Value: true
These headers are included in redirected requests or responses depending on your configuration.



















Add Header Key: Specify the name of the custom header to be appended during the redirection.
Add Header Value: Provide the value for the custom header key to ensure it is correctly appended.






Choose whether the rule should match an Exact Path, Prefix, File Extension, or Regex pattern.
Update match conditions, origin host, ports, or priority values.
Submit the change to finalize the removal.


Outdated rule condition
Old regex pattern still matching new endpoint
Example: Change “contains /api” to “equals /api/admin”.
Change the rule action
Temporarily switch from Block to Log Only to monitor.
Add an exception rule
Allow requests from a specific IP, URI, or User Agent.
Whitelist internal services
Add known internal IPs (monitoring tools, API clients) to an allowlist.
Overly broad request URI match
Blocking /api/v1/ instead of /api/v1/admin
Strict User Agent filtering
Blocking “curl” used in automated internal scripts
Missing whitelist entry
Internal monitoring IPs not excluded
Choose Free SSL when you want to automatically issue and manage a certificate through Medianova’s Let’s Encrypt integration.
Wildcard
(Optional) Enable this option to secure all subdomains under the same domain (e.g., *.example.com).
Domain
Select the domain associated with your CDN Resource.
After filling in the fields, click Add SSL to start the process.
Once successful, click Confirm to finalize installation.
The new SSL certificate will appear in your SSL Management list and can now be assigned to your CDN Resources.
Open the SSL (or CNAME & SSL) tab.
Choose Shared SSL to apply the Free SSL certificate.
Click Save.
SSL Name


A name to identify the certificate in your organization.
In Select CDN Resource Type, choose Large & VOD Streaming.
Two configuration tabs appear: Large Content Caching and VOD Content Caching.
Use Large Content Caching for static large files such as videos, music, .zip, and .exe.
CDN Resource Name – Enter a short, descriptive name for your resource.
→ This name will appear in your default CDN hostname (for example, example.mncdn.com).
Source of Your Files
My Origin (Origin Pull) – Medianova fetches content directly from your server.
Click Add and complete:
Use VOD Content Caching if you plan to deliver video content and need automatic packaging for streaming protocols.
CDN Resource Name – Provide a name for the VOD resource.
Source of Your Files
My Origin (Origin Pull) – Specify your Origin URL (for example, https://www.example.com).
Stook Object Storage (Origin Push) – Choose a Stook Bucket/Path.
(Optional) Enable Medianova VOD Packaging to automatically prepare your MP4 files for streaming protocols (HLS, DASH).
CDN Resource Label – (Optional) Add a label for identification.
Click Create CDN Resource at the bottom of the form. The new resource appears in the CDN Resources list. Configuration and availability are indicated by icons under:
Config Status – Green check shows valid configuration.
Resource Status – Blue toggle indicates the resource is active.
To begin configuration, log in to the Medianova Control Panel and follow these steps:
Navigate to Security → Rate Limiting.
Select the Dynamic CDN Resource where you want to enable Rate Limiting.
The configuration panel for that resource will open.
Some parts of your application may require different rate limits — for example, to protect login endpoints or limit access to downloadable files — without affecting the entire CDN resource.
With Path & Extension Based Rate Limiting, you can define request thresholds that apply only to specific URL paths (such as /login or /api/) or file types (like .pdf, .jpg, or .mp4).
These rules are managed under the Page Rules section in the Medianova Control Panel and allow more granular control over how traffic is handled at the edge.
Use this feature when you need to:
Apply stricter limits to sensitive routes such as /auth/, /checkout, or /login.
Restrict access to large media or document files.
Combine global rate limits with path-level overrides for flexible traffic management.
Learn more: See Path & Extension Based Rate Limiting for configuration steps and advanced examples.
A configured CDN Resource
Access to the Phalcon project source code
PHP 7.4 or later (recommended)
Assets are still served from the origin
The CDN prefix is not applied in code.
Verify that setStaticBaseUri() or $css->setPrefix() includes your correct CDN Resource URL.
Invalid asset paths
The CDN prefix or local directory structure is incorrect.
Check the path structure inside your assets directory and ensure the CDN path matches the file hierarchy.
SSL-related warnings
HTTPS not enabled on CDN resource.
Enable Shared SSL or Custom SSL in the Medianova Control Panel before using HTTPS URLs.
Page Rules match on a combination of file path and file extension.
File Path
Directory, wildcard and regex pattern
File Extensions
Any, one or more
Directory is recursive (unless using the Exact Match setting), meaning /dir/ matches all URLs for files in the /dir/ directory and its subdirectories.
Wildcard is for example * to match on any URL path and /*/images/ matches URLs in any second-level images directory.
When using regex pattern, only the * . / () [] $ symbols are supported. You cannot use other symbols, including ? ! + ^.
A new window appears containing a form to create a page rule. The form requires specifying a File Path and one or more File Extension entries, and allows for selecting and configuring Page Rules settings.
Find the page rule in the table, click the three dots and select Page Rule Details. The new window shows the status of every setting and details for each setting.
If you want to create a new page rule that is very similar to an existing rule, the easiest way is to clone the existing rule, and then apply changes to the clone.
Change the page rule in three steps:
Find the page rule in the table, click the three dots, select Delete Page Rule and click Yes, Delete in the confirmation window. This triggers an immediate update to CDN servers.

Rate Limiting must be enabled globally under the Security tab.
Path & Extension Based Rate Limiting is disabled by default, even when Rate Limiting is ON.
Rules are created under the Page Rules section of the panel.
You can define different rate limits for each path or file type, separate from the base rule.
Whitelist IPs are managed from a single global pool; no separation exists between general Rate Limiting and Path & Extension Based Rate Limiting.
Each Path & Extension Based Rate Limiting rule inherits global Rate Limiting settings (request limit, burst, time window, etc.), but allows you to scope limits to a specific path or file extension.
Path
Target path (e.g., /api/login)
File Extension
Target extensions (e.g., .pdf, .jpg, .html)
Request Limit
Requests per second/minute (inherited from global config)
Burst
Number of extra allowed requests before enforcing limits
Navigate to the Page Rules section in the Medianova panel.
Click Add Rule.
In the rule editor, define:
Path (e.g., /login)
File Extensions (e.g., .pdf, .jpg)
Select and enable Rate Limiting toggle inside the rule.
Set:
Request Limit (100–1000)
Time Window (Per Second or Per Minute)
Burst value (optional)
If your account’s default Cache Type is dynamic or edge, add the same Cache Type field to this rule explicitly.
This rule limits .pdf file requests under /reports to 100 per minute, allowing 20 additional burst requests before applying the rate limit.
Limit file downloads by extension:
Apply rate limits to .pdf, .zip, .jpg files regardless of path.
Protect API endpoints by path:
Limit access to paths like /api/auth, /api/login, /checkout.
Combine path + extension filtering:
Limit requests to /reports/*.pdf or /downloads/*.zip.
Restrict access to static assets:
Control access to large files or images under /media/ or /static/.
Prevent scraping of product/category pages:
Apply limits to paths like /products/, /categories/.
Rate-limit search endpoints:
Protect /search or /filter paths from abuse.
Path & Extension Based Rate Limiting is disabled by default and must be activated per rule
Only functional when resource Rate Limiting is enabled
Whitelisted IPs cannot be scoped per rule
Request Limit Range: 100 - 1000
A configured CDN Resource.
A running CakePHP 2.4+ application
Write access to your ./Config/bootstrap.php file
Assets still load from the origin server
CDN URLs not defined or configuration not reloaded.
Check the bootstrap.php entries and clear the CakePHP cache.
Assets missing or 404 errors
Incorrect CDN path or directory mismatch.
Verify that your img, css, and js directories match the structure in your CDN Resource.
Mixed content warning (HTTP/HTTPS)
HTTPS not enabled on CDN resource.
Enable Shared SSL or Custom SSL in the Medianova Control Panel before using secure URLs.
Access to your website’s HTML, CSS, JS, or CMS configuration.
Ability to modify firewall rules on your origin server.
An active Medianova CDN Resource
Access to your Magento Admin Panel (Administrator role)
Optional: A configured Shared SSL or Custom SSL in the Medianova Control Panel if HTTPS is required
After completing these steps, Magento will deliver static and media files via Medianova CDN.
If your Magento site uses HTTPS, repeat the Base URL configuration steps for the Secure section as well.
CDN URLs not visible in HTML
Magento cache not refreshed
Go to System → Cache Management and flush all caches.
Mixed content warning (HTTP/HTTPS)
HTTPS not configured properly in Medianova
Configure Shared SSL or Custom SSL before updating secure URLs.
Slow asset delivery
Zone caching disabled
Check the Zone settings in the Medianova Control Panel and ensure caching is active.
In the SSL Certificate section, choose one of the available options from the Select SSL Certificate dropdown:
Shared SSL – Use Medianova’s shared certificate.
SNI – Use your organization’s uploaded certificate.
Custom SNI – Apply a specific SSL from your list.
Disabled – Turn off HTTPS for the resource.
DNS propagation may take several minutes depending on your DNS provider’s TTL configuration.
CNAMEs must be unique and not used by any other services (for example, mail or web hosting).
If you are using a Custom SSL, ensure the certificate covers all configured CNAMEs (via CN or SAN fields).
TLS 1.1 is deprecated and should remain disabled for security compliance.
To verify your configuration, run:
The response should resolve to your Medianova CDN hostname.
When your CNAME configuration is active, you can replace original URLs in your web assets with the CDN domain:
Your CNAME domain (for example, cdn.yourdomain.com) now resolves to Medianova’s edge network, serving cached content from your CDN Resource.
Your CDN Resource is now accessible through your custom domain (for example, cdn.yourdomain.com).
All requests to this domain are served securely via Medianova’s edge network using the configured SSL and TLS versions.
Instantly invalidate outdated cache entries across all Medianova CDN cache layers to ensure the latest content is delivered globally without waiting for TTL expiration.
Purge invalidates cached content across the Medianova CDN before its cache lifetime (TTL) expires. It ensures that updated content from your origin is immediately reflected and consistently served from all cache layers worldwide.
When a purge is executed, the Medianova purge system distributes invalidation commands across the CDN’s cache hierarchy. Cached objects are marked as expired and fetched again from your origin upon the next user request.
You can trigger a purge from the Medianova Control Panel or via API .
Use purge whenever:
Updated HTML, CSS, JS, images, or video files must be reflected immediately.
Outdated or sensitive content needs to be removed from CDN caches.
New deployments or configuration changes require instant cache refresh.
Consistency across all cache layers is required after a content update.
Medianova supports multiple purge methods to give you flexibility and control:
A purge request is initiated via the or .
Medianova’s purge system distributes invalidation commands to all cache layers.
Cached objects matching the path are marked as invalid and no longer served.
On the next user request, the CDN retrieves the fresh content from the origin and re-caches it.
Purge requests propagate through all layers of Medianova’s caching infrastructure extremely quickly – typically completing across our global network in under 5 seconds – ensuring that outdated content is swiftly replaced with fresh content worldwide.
Purge only what’s needed. Avoid full purges to reduce cache refill load.
Use specific paths instead of broad wildcard patterns whenever possible.
Automate with API purge to clear cache after deployments or content updates.
Monitor purge logs to verify completion (see Manage Purge).
Learn how to create a Small CDN Resource in the Medianova Control Panel for static content delivery.
A Small CDN Resource is optimized for small-sized static assets such as images, CSS, JavaScript, and web fonts. It delivers these files efficiently through Medianova’s global edge network, improving website performance and reducing load on your origin servers.
You can configure a Small CDN Resource to fetch content directly from your own origin (Origin Pull) or host it on Medianova Storage (Origin Push).
Unsupported file extensions The following file types are not supported in Small CDN Resources and will return 403 Forbidden responses when requested: | 3gp | 3gpp | asf | asx | mp3 | wm | wav | midi | mpg | mov | mpeg | m2p | flv | f4v | | avi | ogv | ogg | aac | mp4 | m4a | m4v |
Use Small only for static assets. For large files, video, or downloadable content, use Large & VOD Streaming instead.
Config Status and Resource Status icons confirm that your setup is complete.
If configuration fails, verify origin accessibility and port settings.
Use the following command to test connectivity and view CDN response headers:
Replace example.mncdn.com with your CDN URL (use the Custom CNAME if this has been activated) and choose a URL path that returns a 200.
This example curl command sends a GET request to the CDN and returns output detailing the remote IP address and HTTP request and response headers. The response body is discarded.
If configuration fails, verify origin accessibility and port settings.
Ensure DNS updates (especially Custom CNAME) have propagated before testing.
For SSL errors, confirm that the certificate matches the domain and is active.
ping example.mncdn.com<?php
$url = new Phalcon\Mvc\Url();
// Dynamic URIs remain on your origin server
$url->setBaseUri('/');
// Static resources go through Medianova CDN
$url->setStaticBaseUri('https://<CDN_ZONE_URL>/');
Path: /reports
File Extensions: .pdf
Request Limit: 100
Time Window: Per Minute
Burst: 20cdn.yourdomain.com CNAME yourzonename.mncdn.com<!-- Origin URL -->
<img src="http://yourdomain.com/images/logo.jpg" alt="">
<!-- CDN URL -->
<img src="http://cdn.yourdomain.com/images/logo.jpg" alt="">Coordinate with TTL strategy. If content changes often, use shorter cache durations.
Single File Purge
Removes one specific file from all CDN caches.
/images/banner.jpg
Wildcard Purge
Removes multiple files using pattern matching.
/images/*
Full CDN Resource Purge
Clears all cached files for a specific CDN Resource.
/*
Instant Global Invalidation
Cache invalidations propagate rapidly across all CDN cache layers.
Parallel Distribution
Purge commands are broadcast concurrently to all cache nodes for faster execution.
Independent Caches
Each CDN node manages its local cache separately; purge ensures global synchronization.
Auto Revalidation
After purge, next requests trigger fresh pulls from the origin.

HTTP Port / HTTPS Port
Protocol
Host Header
(Optional) Origin SNI Request, Priority, Weight if multiple origins exist.
Stook Object Storage (Origin Push) – Medianova hosts your files.
Choose your Stook Bucket / Path.
(Optional) Add a CDN Resource Label.
Set FTP Password and Confirm Password for uploads.
Set FTP Password and Confirm Password to upload files if required.

The maximum number of requests allowed (e.g., 100).
Time Interval
The period within which requests are counted (e.g., per second, per minute).
Burst
Allows short spikes within the limit window before throttling begins.
Burst + No Delay
Permits short bursts instantly, without waiting for enforcement delay.
None
Strict enforcement. Requests exceeding the limit are immediately blocked.
Block
Rejects the request and returns an error response (default).
Challenge
Sends a verification challenge to the client before allowing further requests.






Open your website in a browser.
View the HTML source (Ctrl + U) and confirm that static file URLs begin with your CDN Resource domain.
<img src="https://yourdomain.com/images/example.jpg" alt="Example Image">
<script src="/scripts/example.js"></script>
<img src="https://CDN_URL/images/example.jpg" alt="Example Image">
<script src="https://CDN_URL/scripts/example.js"></script>

Add the following variables to define Medianova CDN paths for your assets:
Ctrl + U).Confirm that image, CSS, and JS assets are loaded from your Medianova CDN Resource.
<?php
$css = $this->assets->collection('header');
$scripts = $this->assets->collection('footer');
if ($config->environment == 'development') {
$css->setPrefix('/');
$scripts->setPrefix('/');
} else {
$cdnURL = 'https://<CDN_ZONE_URL>/';
$css->setPrefix($cdnURL);
$scripts->setPrefix($cdnURL);
}
$css->addCss('css/bootstrap.min.css')
->addCss('css/custom.css');
$scripts->addJs('js/jquery.js')
->addJs('js/bootstrap.min.js');
<?php
$cdnURL = 'https://<CDN_ZONE_URL>/';
$this->assets
->addCss($cdnURL . 'css/custom.css', false);/* Before */
background-image: url('/images/background.jpg');
/* After */
background-image: url('https://CDN_URL/images/background.jpg');nslookup cdn.yourdomain.com<?php echo $this->Html->image('medianova-logo.png', ['alt' => 'Medianova Logo']); ?><img src="https://example.mncdn.com/img/medianova-logo.png" alt="Medianova Logo" /><?php echo $this->Html->css('style.css'); ?><link rel="stylesheet" type="text/css" href="https://example.mncdn.com/css/style.css" /><?php echo $this->Html->script('script.js'); ?><script type="text/javascript" src="https://example.mncdn.com/js/script.js"></script><?php
Configure::write('App.imageBaseUrl', 'https://<CDN_ZONE_URL>/img/');
Configure::write('App.cssBaseUrl', 'https://<CDN_ZONE_URL>/css/');
Configure::write('App.jsBaseUrl', 'https://<CDN_ZONE_URL>/js/');Under the General section, select Web.
/static/.
Example: https://example.mncdn.com/static/In the Base URL for User Media Files field, enter your Zone URL followed by /media/.
Example: https://example.mncdn.com/media/
Select all cache types, click Submit, and then choose Flush Magento Cache.
In Select CDN Resource Type, choose Small.
Option 1 – My Origin (Origin Pull)
Medianova fetches content directly from your server when users request files.
Select My Origin.
Click Add and complete the Origin Settings:
Domain or IP
HTTP Port / HTTPS Port
Protocol
Option 2 – Stook Object Storage (Origin Push)
Medianova hosts your files on Stook Object Storage.
Select Stook Object Storage.
In Stook Bucket/Path, choose an existing Bucket and optional Subfolder.
(Optional) Add a CDN Resource Label for internal tracking.
Learn about the actions Medianova CDN can take based on a page rule, and the configuration options for each setting.
Settings control the actions Medianova CDN takes once a request matches the URL pattern defined in a page rule.
The table below outlines all settings available in Page Rules from the Medianova Panel.
Use the Cache Type setting to control CDN caching.
Select Edge to specify how long the CDN may cache responses.
Select Origin to instruct the CDN to determine the maximum cache duration from origin response headers cache-control or expires .
Select Dynamic to disallow the CDN to cache responses for matching URLs.
The CORS setting controls the cross-origin resource sharing (CORS) header access-control-allow-origin in responses served by Medianova CDN edge servers.
Set the Custom Header Type to Default to have the CDN inherit the parent settings, as configured in the Headers tab in the Medianova Panel.
Set the Custom Header Type to Custom to disable parent setting inheritance and customize the headers. Configure the CDN to manipulate headers in requests to origin, or to manipulate headers in responses the CDN sends to clients/browsers.
Use the Downloadable Query String Header setting to trigger browsers to download a file instead of displaying it.
In the page rule, toggle the setting on and specify a Downloadable Query String Header Key and a Downloadable Query String Header Value. For example, set the key to download and the value to yes to trigger a browser to download the file when it loads a URL with query string ?download=yes (and the URL matches on File Path and File Extension as configured in the page rule).
The CDN will send the content-disposition response header with in its value the attachment attribute and the path to the file. For example, content-disposition: attachment; filename="manual.pdf"
Turn on Exact Match to disable recursive directory processing.
For example, if the page rule has File Path /dir/ and Exact Match is enabled, only URLs for files in that exact directory will match, while with Exact Match off (default) the page rule would also take action for files in subdirectories like /dir/subdir/ .
If Hotlink Protection is turned on in the parent setting in the Security tab, a new page rule will inherit its status and configuration. The Update a Page Rule screen then shows the Hotlink Protection toggle in the active state and the Hotlink Protection Type is set to Default.
Change the Hotlink Protection Type to Custom to and confgure the Hotlink Protections that must apply to matching URLs.
Turn on Options Request to have the CDN send edge-generated responses to requests with the OPTION method in case the origin does not respond to OPTION requests.
While a new page rule inherits the parent setting for (as configured in the Caching tab in the Medianova Panel), you can customize the CDN query string caching behavior for matching URLs.
Query String Caching in Page Rules has four options:
Page Rules allows you to enable/disable Range Based Caching for matching URLs, regardless of the parent setting for Range Based Caching (as configured in the Caching tab in the Medianova Panel)..
Static CDN is primarily used for delivering fixed content, such as images, CSS files, and JavaScript files. These resources are typically unchanged, which allows for faster delivery through a CDN. The Static CDN Analytics section provides key metrics that help monitor, analyze, and optimize the performance of static content delivery. These metrics focus on the caching effectiveness, the amount of traffic being served from the cache versus the origin server, and the overall bandwidth usage.
Total Traffic: This chart displays the total amount of traffic delivered during a selected time range. Users can view the traffic over a custom time range or compare it with the previous time range to understand the trends and fluctuations in traffic. A significant increase in traffic indicates that the content is being accessed more frequently, which can be beneficial for scaling infrastructure and improving cache efficiency.
Traffic in Time: This chart provides insights into traffic variations over time. By analyzing traffic patterns, you can identify spikes in demand, possibly caused by promotions, seasonal events, or viral content. It also helps determine when content delivery peaks, assisting in optimizing server performance during high-traffic periods.
Cached vs Non-Cached: This chart compares traffic served from the cache versus traffic retrieved from the origin server. High cache traffic indicates that most of the data is being served efficiently from the CDN, reducing load on the origin server and speeding up delivery to end-users. A low cache hit ratio might indicate a need for better cache configuration or optimization.
Cached Data: This chart shows the breakdown of cached data into hits, updating, and stale categories:
Hits: Content successfully retrieved from the cache.
Updating: Content that is currently being updated in the cache.
Stale
Non-Cached Data: This chart shows the amount of data retrieved from the origin server, broken down into miss and expired categories:
Miss: Content that was not found in the cache and had to be fetched from the origin server.
Expired: Cached content that has expired and needs to be fetched again from the origin server. A higher proportion of non-cached data suggests that caching is not being utilized effectively, which could lead to higher latency and bandwidth usage.
Bandwidth: This chart shows the total bandwidth used for delivering static content. High bandwidth usage might indicate large file sizes or a high volume of requests, which can be optimized through compression, better cache utilization, or content delivery strategies.
Cached vs Non-Cached: This chart compares the bandwidth used for cached versus non-cached data. Ideally, cached data should consume most of the bandwidth, as it reduces the need for repetitive fetching from the origin server, resulting in faster load times and reduced network strain.
Total Requests: This chart displays the total number of requests made for static content. A high number of requests indicates active content consumption, which is useful for monitoring content popularity and server load.
Hits vs Misses: This chart compares the number of requests that resulted in a cache hit versus a cache miss. A higher hit ratio is ideal, as it indicates that the CDN is effectively serving content from the cache, reducing the need to contact the origin server.
Request Hits: This chart shows detailed information on hits, broken down into hit, updating, stale, and revalidated categories:
Updating: The content is in the process of being updated.
Stale: The content is outdated and served while awaiting a response from the origin server.
Request Misses: This chart shows detailed information on misses, broken down into miss and expired categories:
Miss: The content was not found in the cache and was fetched from the origin server.
Expired: The cached content expired and had to be retrieved from the origin server again. Analyzing this data helps in understanding the reasons for cache misses and optimizing cache configurations.
A Tier Filter dropdown is available next to the All Resources selector. This filter defines which CDN layers are included in the request data.
Tooltips appear on hover for desktop and via an info icon on mobile. The selected filter is also reflected in exported reports.
Example report titles: Requests – Edge only Requests – All
API parameter:
tier=edge or tier=all (default = edge)
Total Requests: This chart displays the total number of requests, helping you track overall activity and performance.
Status Code Structure: This chart compares the distribution of different HTTP status codes:
2xx: Successful responses (e.g., 200 OK).
Successful Responses (2xx): This chart shows the distribution of successful responses, particularly focusing on the 200 OK code and other 2xx codes. High 2xx responses indicate that the CDN is successfully delivering content.
Redirects (3xx): This chart displays the distribution of redirect codes (301, 302, etc.). Redirects can indicate changes in content location, which should be minimized for optimal performance.
Client Errors (4xx): This chart shows errors on the client side, such as 403 (Forbidden), 404 (Not Found), and 429 (Too Many Requests). A high number of client errors suggests that users are requesting unavailable content or facing access issues.
Server Errors (5xx): This chart shows server-side errors, such as 500 (Internal Server Error), 502 (Bad Gateway), and 504 (Gateway Timeout). These errors indicate issues on the origin server and require attention to ensure smooth content delivery.
Status code metrics also reflect the selected Tier Filter. You can view codes for Edge only or include All CDN tiers. When All is selected, totals may increase because the same request can appear multiple times across tiers.
Exported reports and visual charts indicate the active filter in their titles.
API parameter: tier=edge or tier=all (default = edge)
Error logs provide a detailed record of requests that resulted in errors. By selecting a specific error code, users can view logs that include the request path, method, protocol, and hit status. The logs are invaluable for identifying patterns and resolving recurring issues in content delivery.
The Tier Filter applies to all error log data. Users can toggle between Edge only and All, depending on whether they want to see only end-user–level errors or logs from all CDN layers.
Selecting Edge only isolates actual user errors, while All shows cumulative errors from Edge, Mid, and Origin.
API parameter: tier=edge or tier=all
Default: edge

curl -svo /dev/null "https://example.mncdn.com/" --compressedConfigure edge caching behaviour and TTL
All
Configure cross-origin resource sharing headers
All
Add or remove request and response headers
All
Trigger browser to download file
All
Disable recursive URL matching
All
Configure specific hotlink protection
Starter, Growth, Enterprise
Enable OPTIONS requests
All
Configure specific query string caching
All
Disable range based caching
All
On
Edge servers use the settings of the Cors Header feature
Off
Edge servers forward the CORS header from origin
Dynamic
Outgoing CDN responses have the access-control-allow-origin: <origin> CORS header, where <origin> is the value of the Origin header in the incoming request
Add Origin Request Header
Add header to requests to origin
Remove Origin Request Header
Remove header from requests to origin
Add CDN Response Header
Add header to outgoing CDN responses
Remove CDN Response Header
Remove header from outgoing CDN responses
Retain All
Query string is part of the cache key. /image.jpg?123 is cached separately from /image.jpg?456
Ignore All
All query string parameters are ignored. /image.jpg?123 and /image.jpg?456 are considered the same response
Retain Specific
Only the specified query string parameters are included in the cache key
Ignore Specific
The specified query string parameters are ignored when determining the cache key

4xx: Client errors (e.g., 404, 403).
5xx: Server errors (e.g., 500, 502). Monitoring these status codes helps identify potential issues in content delivery and client-side or server-side errors.
Edge only (default)
Displays requests from end users. Excludes internal CDN tiers.
All
Displays total requests from Edge + Mid + Origin layers. May include repeated counts of the same request across tiers.
















Host Header
(Optional) Origin SNI Request, Priority, and Weight if you add multiple origins.





