All pages
Powered by GitBook
1 of 18

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

DDoS Protection

Protect your applications and APIs from volumetric and protocol-based attacks with Medianova’s multi-layer, always-on DDoS mitigation system.

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic by overwhelming a target system or network with excessive requests. Medianova’s DDoS Protection automatically detects and mitigates these attacks without requiring any manual activation. From rate limiting to IP and Geo blocking, Medianova ensures uninterrupted availability even under heavy attack conditions.

How Medianova DDoS Protection Works

Medianova integrates several protection layers designed to stop attacks before they impact your services.

Medianova DDoS Protection Architecture

Always-On Defense

Your DDoS protection is active by default. There is no need for additional setup — your web assets are continuously monitored and protected against common attack types such as:

  • DNS Query Floods

  • Slowloris Attacks

  • HTTPS GET / POST Floods

Anycast DNS Infrastructure

Medianova’s global distributes thousands of requests across multiple servers. This prevents traffic overload on a single endpoint and mitigates large-scale network floods.

Anycast DNS not only improves security but also reduces latency by routing users to the nearest edge location.

IP and Origin Protection

You can reduce the risk of DDoS threats by concealing your origin IP before an attack begins. Medianova provides an extra layer of protection through Secure Cloud, limiting exposure of your origin infrastructure and filtering harmful traffic before it reaches your servers.

Warning: Exposing your origin IP directly allows attackers to bypass DDoS mitigation layers.

Rate Limiting and Geo Blocking

Edge-level rate limiting and Geo-based filtering restrict malicious or excessive traffic patterns. This ensures that legitimate users maintain access while harmful requests are dropped early in the network path.

WAF Integration

When combined with Medianova’s , DDoS Protection forms a complete multi-layer defense system. This integration protects not only against volumetric attacks but also against application-layer threats, such as bot floods or malicious payloads targeting web applications.

Best Practices

  • Conceal your origin IP using Secure Cloud or Origin Shield.

  • Combine DDoS Protection with WAF for enhanced multi-layer defense.

  • Keep critical DNS zones under to distribute load globally.

  • Regularly review threat and access logs to identify abnormal patterns.

Medianova DDoS Protection delivers continuous and intelligent protection against both volumetric and application-layer attacks. By combining global Anycast DNS distribution, adaptive rate limiting, and origin shielding, Medianova ensures your online services remain fast, secure, and always available.

Anycast DNS
Web Application Firewall (WAF)
Anycast DNS

Security

SSL/TLS Encryption

Secure your CDN traffic and applications with SSL/TLS encryption to ensure private, authenticated communication between clients and servers.

Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide encrypted communication between clients and servers. They ensure data privacy, integrity, and authentication—protecting your website and CDN-delivered assets against interception or tampering.

Over time, the traditional HTTP protocol evolved into HTTPS, which uses SSL/TLS encryption to secure all data exchanged between users and websites. Medianova CDN supports HTTPS by default and allows you to manage SSL certificates directly through the platform.

TLS is the modern version of SSL. All Medianova services use TLS 1.2 and 1.3 for enhanced security and performance.

Why SSL/TLS Matters

  • Confidentiality: Encrypts all client–server communications.

  • Integrity: Prevents data alteration or man-in-the-middle attacks.

  • Authentication: Confirms your site’s identity through trusted Certificate Authorities (CAs).

  • Trust & SEO: HTTPS improves user confidence and search engine ranking.

Supported SSL Certificate Types

Medianova CDN supports all common SSL/TLS certificates. Choose the one that fits your infrastructure and domain structure.

Certificate Type
Description
Recommended For

For setups serving multiple domains or subdomains, consider Wildcard or SAN-supported certificates to simplify management.

How SSL/TLS Works on Medianova CDN

  1. A user requests your content via HTTPS.

  2. The CDN edge node presents a valid SSL/TLS certificate.

  3. Encrypted communication is established between the client and the edge server.

  4. The edge communicates securely with your origin server (if origin SSL is configured).

Best Practices

  • Always use HTTPS for all CDN-enabled resources.

  • Prefer TLS 1.3 for stronger encryption and faster handshakes.

  • Keep certificates renewed before expiration to avoid service disruption.

  • Use Wildcard or SAN certificates to simplify certificate management.

‏‏‏‏‏‏‏‏

SAN (Subject Alternative Name)

Covers multiple domains under a single certificate.

Multi-domain architectures

Code Signing SSL

Used by developers to verify the integrity of software or drivers.

Application signing, APIs

Data is delivered end-to-end through encrypted channels.

Avoid mixed-content warnings by ensuring all assets (images, scripts) load over HTTPS.

Domain Validation (DV)

Validates domain ownership only. Simple and fast to issue.

Blogs, small websites

Organization Validation (OV)

Confirms both domain and company identity.

Corporate or business sites

Extended Validation (EV)

Highest validation level; displays organization name in browser UI.

E-commerce, financial platforms

Wildcard SSL

Secures a domain and all its subdomains (e.g., *.yourdomain.net).

Two-Layer Encryption Flow

Multi-subdomain services

Extract CRT and KEY Files from a PFX Certificate

Learn how to extract .crt and .key files from a .pfx certificate using OpenSSL.

A .pfx (PKCS#12) file contains your public certificate, private key, and intermediate certificates bundled together. This guide explains how to extract the certificate (.crt) and private key (.key) using a simple Bash script with OpenSSL.

Prerequisites

Before you begin:

Use Free SSL Certificates

Learn how to enable and manage free SSL certificates in the Medianova Control Panel.

Free SSL certificates provide an easy and cost-effective way to secure your CDN Resources without purchasing a commercial SSL. Medianova integrates Let’s Encrypt to automatically issue and renew these certificates through the SSL Management interface.

Free SSL certificates are valid for 90 days and are automatically renewed before expiration.

1

A valid .pfx file provided by the customer.

  • The password for the .pfx file.

  • OpenSSL installed on your local machine.

  • (Optional) Rename the file for clarity using this format: domain.pfx — for example: medianova_com.pfx.

  • 1

    Create the Extraction Script

    Create a new Bash script file named extract-cert.sh and copy the following commands:

    Save and close the file.

    Replace domain.pfx with your actual filename (e.g., medianova_com.pfx).

    2

    Make the Script Executable

    Run the following command to make the script executable:

    3

    Run the Script

    Execute the script using your .pfx password as an argument:

    4

    Files Generated

    After running the script, three files will be generated:

    File Name
    Description
    5

    Verify the Output

    If extraction is successful, you’ll see one of the following messages in your terminal:

    If the certificate and private key do not match:

    This procedure automates the extraction of certificate and key files from .pfx bundles. You can now use the generated .crt and .key files to upload your own SSL certificate in the Medianova Control Panel.

    Access the SSL Management

    To begin, log in to the Medianova Control Panel and open the SSL Management section.

    • Navigate to CDN → SSL Management in the left-hand menu.

    • Review your existing SSL certificates.

    • Click Add New SSL in the upper-right corner.

    2

    Select the Free SSL Option

    When the dialog appears, choose Free SSL as the certificate type and click Next to continue.

    Choose Free SSL when you want to automatically issue and manage a certificate through Medianova’s Let’s Encrypt integration.

    3

    Fill in Certificate Details

    Enter the required information in the form:

    Field
    Description

    SSL Name

    After filling in the fields, click Add SSL to start the process.

    4

    Complete Let’s Encrypt Verification

    Medianova automatically performs domain verification using Let’s Encrypt.

    • Wait for the verification process to complete.

    • Once successful, click Confirm to finalize installation.

    The new SSL certificate will appear in your SSL Management list and can now be assigned to your CDN Resources.

    Domain verification may take up to a few minutes depending on DNS propagation.

    If domain ownership cannot be verified, the process will fail. Ensure that your DNS settings are correct and that your domain points to Medianova’s CDN.

    5

    Assign the SSL to a CDN Resource

    After installation, assign the certificate to the desired CDN Resource:

    1. Go to CDN → CDN Resources.

    2. Open the SSL (or CNAME & SSL) tab.

    3. Choose Shared SSL to apply the Free SSL certificate.

    4. Click Save.

    You can verify activation by opening your domain in a browser using https://. The lock icon indicates a valid SSL connection.

    #!/bin/bash
    # Usage: ./extract-cert.sh <pfx-password>
    
    # 1. Extract encrypted private key
    openssl pkcs12 -in domain.pfx -nocerts -out encrypted-domain.key -passin pass:$1 -passout pass:$1
    
    # 2. Decrypt the private key
    openssl rsa -in encrypted-domain.key -out domain.key -passin pass:$1
    
    # 3. Extract public certificate
    openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.crt -passin pass:$1
    
    # 4. Verify that the certificate and key match
    first=$(openssl x509 -in domain.crt -modulus -noout | openssl md5)
    second=$(openssl rsa -in domain.key -modulus -noout | openssl md5)
    
    if [[ "$first" == "$second" ]]; then
        echo "✅ Certificate and Key match."
    else
        echo "❌ Mismatch between certificate and key."
    fi

    A name to identify the certificate in your organization.

    Wildcard

    (Optional) Enable this option to secure all subdomains under the same domain (e.g., *.example.com).

    Domain

    Select the domain associated with your CDN Resource.

    Replace yourPFXpassword with the actual password for your .pfx file. The script automatically validates whether the .crt and .key match.

    domain.key

    Unencrypted private key.

    encrypted-domain.key

    Encrypted private key (temporary, can be deleted).

    If you see a mismatch error, verify the .pfx file and password before re-running the script.

    domain.crt

    Public certificate.

    chmod +x extract-cert.sh
    ./extract-cert.sh yourPFXpassword
    ✅ Certificate and Key match.
    ❌ Mismatch between certificate and key.

    Manage Rules & Actions

    The Web Application Firewall (WAF) allows you to define Custom Rules that specify how incoming traffic is evaluated. Each rule can match certain request attributes and apply an action — such as Block, Allow, or Log Only — when conditions are met.

    Managed Rules are automatically maintained by Medianova’s Security Team. Custom Rules are created manually to adapt the WAF to your specific application needs.

    1

    Access the Rule Management

    To manage rules, log in to the Medianova Control Panel:

    1. Go to Security → WAF.

    2. Select your Dynamic CDN Resource.

    3. Open the Rules & Actions tab.

    You’ll see a list of existing Custom Rules and the option to create new ones.

    Managed Rules are always active by default. You can combine both Managed and Custom Rules for layered protection.

    2

    Create a New Custom Rule

    Follow these steps to add a new rule:

    1. Click Add Rule.

    3

    Edit or Delete Existing Rules

    You can modify or remove existing rules at any time:

    • Edit: Click the Edit icon next to a rule, adjust the fields or actions, and click Save.

    Understand Rule Actions

    Each action defines how WAF handles a matched request:

    Action
    Behavior

    Note: “Log Only” is ideal for testing or monitoring potential issues before applying stricter blocking rules.

    Hotlink Protection

    Prevent unauthorized use of your media files by blocking external websites from embedding or linking directly to your CDN-hosted assets.

    Hotlink Protection restricts access to your CDN Resource by verifying the Referer header in each HTTP request. When enabled, it ensures that only requests originating from your allowed domains can retrieve content from your CDN. Requests coming from unauthorized sources — such as external websites directly embedding your files — are blocked or redirected automatically.

    Why Use Hotlink Protection?

    Hotlink Protection helps you:

    • Protect bandwidth – Prevent others from using your CDN capacity to serve their own content.

    • Secure digital assets – Stop unauthorized sharing or embedding of your hosted media.

    • Reduce server load – Block high-traffic external sites from consuming resources.

    • Maintain brand control – Ensure your content appears only on trusted domains.

    • Prevent abuse – Stop third-party sites from monetizing your media.

    How Hotlink Protection Works

    Hotlink Protection checks the Referer field of every HTTP request. If the Referer does not match your whitelisted domain list, the CDN automatically denies or redirects the request.

    Action
    Description

    Add multiple allowed domains to the whitelist for multi-site deployments (e.g., www.medianova.com, cdn.medianova.com).

    Enter a Rule Name for easy identification.

  • Select a Field (parameter) from the dropdown — such as:

    • Request Method (GET, POST, etc.)

    • Client IP

    • Request URI

    • User Agent

    • Referrer

  • Choose an Operator, such as equals, contains, or matches.

  • Enter the Value to match.

  • (Optional) Add additional conditions using the And operator.

  • Select an Action to perform when the rule conditions are met:

    • Block – Reject the request and log the event.

    • Allow – Permit the request to proceed to origin.

    • Log Only – Record the request for review without blocking.

  • Click Save to apply the rule.

  • You can chain up to three conditions in a single rule. Complex logic combinations are not supported.

    Use “Log Only” for testing before switching to “Block” to minimize false positives.

    Delete: Click the Delete icon to permanently remove the rule.

  • Reorder (if supported): Drag and drop to change rule evaluation priority.

  • Review logs frequently to ensure that new or modified rules behave as expected.

    Block

    Immediately rejects the request with an error response.

    Allow

    Lets the request pass to the origin server.

    Log Only

    Records the event for analysis without blocking traffic.

    Allow

    Serves content when the Referer is from an authorized source.

    Block

    Rejects requests from unauthorized sites.

    Redirect

    Sends unauthorized users to a specified page or image.

    How to Activate WAF

    Learn how to activate and configure the Web Application Firewall (WAF) for your CDN Resources in the Medianova Control Panel.

    WAF (Web Application Firewall) enhances your website’s security by inspecting and filtering incoming HTTP/HTTPS traffic. You can enable it for any Dynamic CDN Resource, select the protection mode, and create Custom Rules to detect and block malicious requests.

    WAF is available only for Dynamic CDN Resources. Ensure your resource is active before proceeding.

    1

    Access the WAF

    To begin configuration, log in to the and navigate to the WAF settings.

    • Go to Security → WAF in the left-hand menu.

    • Select the Dynamic CDN Resource where you want to activate WAF.

    • The WAF configuration page will open.

    If you haven’t created a Dynamic CDN Resource yet, go to CDN → Create CDN Resource first, then return to this section.

    2

    Choose WAF Mode

    Select how the firewall will operate for your CDN Resource.

    • Monitoring Only: Logs all requests but does not block them. Recommended for initial setup and rule tuning.

    3

    Create Your First Rule

    After activation, you can define custom rules to control how WAF handles requests. For example, you can block requests from specific IP ranges or allow trusted user agents.

    To create or manage rules, go to .

    4

    Verify WAF Activation

    Once WAF is enabled, the Status indicator on your resource page will show “Active.” Incoming requests are now analyzed by the firewall and logged in real time.

    You can monitor activity in the Analytics → WAF Dashboard section.

    Best Practices

    • Always start with Monitoring Only mode for new configurations.

    • Combine Managed Rules and Custom Rules for optimal coverage.

    • Review your WAF Analytics regularly to track threats and rule behavior.

    • Avoid creating overly broad rules to minimize false positives.

    Web Application Firewall (WAF)

    Protect your web applications from common exploits and malicious traffic with Medianova’s Web Application Firewall (WAF).

    WAF is Medianova’s intelligent web security layer that protects your applications from malicious traffic, bots, and exploits. With real-time filtering, custom rule control, and built-in analytics, it helps you prevent attacks before they reach your origin servers.

    Why Choose WAF?

    Medianova WAF combines ease of use, robust protection, and edge-level performance to keep your web applications secure. Unlike standard firewalls, WAF protects against both network and application-layer attacks.

    • Edge-level protection – All traffic is filtered at Medianova’s global CDN edge before it reaches your origin.

    • Managed Rules – Constantly updated rulesets by Medianova’s Security Team, including OWASP Top 10 protections.

    • Custom Rules – Define your own rules to block, allow, or log specific requests.

    • Real-time defense – Detect and mitigate attacks instantly without affecting legitimate traffic.

    Key Features

    • OWASP Top 10 Protection – Shields against SQL Injection, XSS, and other common web vulnerabilities.

    • Custom Rule Engine – Create granular policies based on IP, URI, headers, or user agents.

    • Monitoring Mode – Observe how rules behave before full activation.

    • Instant Mitigation – Block or log attacks in real time with no latency impact.

    Use Cases

    • Web Application Security – Protect public websites and portals from injection and XSS attacks.

    • API Protection – Filter and control requests to your backend APIs.

    • E-commerce Security – Prevent data breaches, bot abuse, and checkout exploitation attempts.

    Built for Modern Web Security

    Medianova WAF delivers enterprise-grade web protection that’s easy to deploy and manage through the . It helps you stay secure without adding complexity — protecting your applications from the edge, in real time.

    Handle False Positives

    Learn how to identify, analyze, and minimize false positives in the Web Application Firewall (WAF) to ensure accurate protection without disrupting legitimate traffic.

    A false positive occurs when the WAF blocks or flags a legitimate request as malicious. This can happen due to aggressive rule patterns or incomplete exceptions. Proper handling of false positives helps maintain both security and availability of your applications.

    False positives are common during initial WAF configuration. Always start in Monitoring Only mode to observe behavior before activating full protection.

    1

    Identify False Positives

    Use WAF logs and analytics to locate requests that were incorrectly blocked or flagged.

    1. Open the Medianova Control Panel.

    2. Go to Analytics → WAF Dashboard.

    3. Review blocked requests and event logs.

    4. Look for requests that match normal user or API behavior but are classified as threats.

    Pay special attention to repetitive blocks from trusted IPs or common API endpoints — they are typical indicators of false positives.

    2

    Analyze Rule Behavior

    Determine which rule caused the false detection. You can identify the Rule ID or Rule Name responsible by inspecting the event details in the WAF dashboard.

    Common Cause
    Example
    3

    Adjust Rules or Add Exceptions

    After identifying the cause, fine-tune your rules to allow legitimate traffic while keeping protection active.

    You can:

    • Modify an existing rule

      • Adjust the Field, Operator, or Value

    4

    Validate After Adjustments

    Once changes are made, monitor the WAF dashboard again:

    1. Keep the affected rule in Log Only mode for several hours or days.

    2. Check if the same requests are still flagged.

    Configure IP Restriction

    Learn how to enable and configure IP Restriction in the Medianova Control Panel to allow or block access from specific IP addresses.

    IP Restriction enables you to define which IP addresses can access your CDN Resources by using either whitelist or blacklist rules. When configured, access control is enforced at the CDN edge, ensuring that unauthorized requests are blocked before they reach your origin server.

    You can enable IP Restriction for each CDN Resource in the Medianova Control Panel.

    1

    Access the IP Restriction

    1. Log in to the .

    2. Go to CDN → CDN Resources.

    3. Select the resource where you want to apply IP restrictions.

    4. Click the Security tab.

    IP Restriction is available only for active CDN Resources.

    2

    Choose Restriction Mode

    Select one of the following modes based on your access policy:

    Mode
    Description
    3

    Add IP Addresses or Ranges

    1. Click Add IP.

    4

    Edit or Remove Existing Entries

    • Edit: Click the Edit icon to update an IP or range.

    5

    Verify Configuration

    Once saved, you can verify your configuration:

    • Attempt access from an allowed IP → content should load successfully.

    WAF Analytics

    Learn how to interpret the Web Application Firewall (WAF) dashboard and key analytics metrics in the Medianova Control Panel.

    The WAF Analytics Dashboard provides visibility into malicious traffic, rule performance, and blocked requests detected by the Web Application Firewall (WAF). You can monitor attacks in real time, identify their sources, and adjust your rules to improve detection accuracy.

    Analytics data is available when WAF is active in either On or Monitoring Only mode.

    Rate Limiting

    Control traffic flow, protect resources, and ensure fair usage across your CDN resources with Medianova’s intelligent Rate Limiting feature.

    Rate Limiting helps you maintain stable application performance by controlling how many requests a client can make in a given time frame. It protects against excessive API calls, brute-force attempts, and high-frequency requests that can degrade origin performance or service quality.

    With Medianova’s edge-level implementation, rate limits are applied directly at the CDN layer — before the traffic reaches your origin servers — ensuring both reliability and efficiency.

    Rate Limiting is available for Dynamic CDN Resources and can be configured per domain, path, or file extension through the .

    Why Use Rate Limiting?

    IP Restriction

    Control access to your CDN Resources by allowing or blocking specific IP addresses through whitelist or blacklist configurations.

    IP Restriction (Access Control List – ACL) allows you to manage which IP addresses can access your CDN Resource. You can choose between two modes: Whitelist or Blacklist, to define how access is granted or denied.

    • Whitelist Mode: Only the IP addresses you specify are allowed to access your resource. All other IPs are denied.

    • Blacklist Mode: The IP addresses you specify are denied access. All other IPs are allowed.

    Actionable analytics – Gain visibility into threats, attack sources, and triggered rules through the Control Panel.

    Integrated Analytics – Visual dashboards for traffic and threat insights.

  • False Positive Control – Fine-tune rules to balance protection and accessibility.

  • Medianova Control Panel
    Rate Limiting ensures a secure, predictable, and efficient experience for all users by:
    • Preventing abuse or overload from bots or aggressive clients.

    • Protecting login endpoints and API gateways from brute-force attacks.

    • Ensuring fair bandwidth distribution among users.

    • Preserving origin stability and avoiding unnecessary compute or database load.

    • Allowing flexible control through customized thresholds and actions.

    Key Features

    • Customizable Limits – Define request thresholds per second or minute to suit your application.

    • Edge-Level Enforcement – Limit requests at the CDN edge, preventing overload before it reaches your origin.

    • Burst Control Options – Configure how short bursts of requests are handled:

      • Burst – Allows short spikes within the limit window.

      • Burst + No Delay – Permits short bursts without delay enforcement.

      • None – Strict limit; requests beyond the threshold are immediately blocked.

    • IP Whitelisting – Exclude trusted IPs, monitoring tools, or partners from rate enforcement.

    • Flexible Actions – Choose to Block or Challenge clients that exceed limits.

    • Configurable HTTP Response Codes – Return 429 or 529 errors when limits are exceeded.

    • Path & Extension Support – Apply rate limits to specific endpoints (e.g., /login, /api/) or file types (e.g., .pdf, .mp4).

    Use Cases

    • API Protection – Prevent abuse of public APIs and ensure consistent response times.

    • Authentication Endpoints – Limit login attempts to protect user accounts.

    • Download or Media Control – Restrict large file or video download frequency to optimize CDN performance.

    • E-commerce Traffic Shaping – Manage checkout or cart requests during high-traffic campaigns.

    • Bot Mitigation – Reduce load from automated crawlers or scrapers.

    Built for Performance

    Medianova’s Rate Limiting operates at the edge, ensuring minimal latency and zero impact on normal user experience. By combining adaptive enforcement, path-based rules, and real-time analytics, it enables granular control over how traffic interacts with your CDN — keeping your applications fast, fair, and secure.

    You can configure and monitor Rate Limiting directly through the Medianova Control Panel under the Security section.

    Medianova Control Panel

    Outdated rule condition

    Old regex pattern still matching new endpoint

    Custom Rules take precedence over Managed Rules. If both apply, the Custom Rule’s action will execute.

    for more precise matching.
  • Example: Change “contains /api” to “equals /api/admin”.

  • Change the rule action

    • Temporarily switch from Block to Log Only to monitor.

  • Add an exception rule

    • Allow requests from a specific IP, URI, or User Agent.

  • Whitelist internal services

    • Add known internal IPs (monitoring tools, API clients) to an allowlist.

  • Apply changes incrementally and review logs after each update to confirm resolution.

    If no false alerts occur, switch the rule back to Block mode.

    Do not disable Managed Rules globally to avoid temporary false positives. Always isolate and fix the specific rule causing the issue.

    Overly broad request URI match

    Blocking /api/v1/ instead of /api/v1/admin

    Strict User Agent filtering

    Blocking “curl” used in automated internal scripts

    Missing whitelist entry

    Internal monitoring IPs not excluded

    Open the IP Restriction (ACL) section.

    Blacklist

    The IP addresses you add will be blocked. All others will be allowed.

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    Enter an IP address or subnet range in CIDR format (e.g., 192.168.0.0/24).
  • Press Enter or click the + icon to add it to the list.

  • Repeat for additional IPs or ranges.

  • Click Save to apply changes.

  • Use CIDR notation to efficiently manage large network ranges.

    Delete: Click the Delete icon to remove it.

  • Save Changes: Click Save after every modification to ensure updates are applied at the edge.

  • Removing an entry from a Whitelist immediately blocks that IP from accessing your resource.

    Attempt access from a restricted IP → access should be denied or redirected.

  • Review logs or analytics to confirm correct enforcement.

  • Test from different networks (VPN, mobile, or office IPs) to ensure your list is accurate.

    Whitelist

    Medianova Control Panel

    Only the IP addresses you add will be allowed. All others will be blocked.

    On: Fully active mode that filters and blocks malicious traffic in real time.

    After selecting a mode, click Save to apply the change.

    Start with Monitoring Only mode to observe your application’s normal request patterns before enabling full protection.

    Rule configuration is optional at activation. WAF includes predefined Managed Rules that are enabled by default.

    WAF logs and metrics may take up to a few minutes to appear after initial activation.

    Medianova Control Panel
    Managing Rules & Actions
    Accessing the Dashboard

    You can access the WAF analytics from the Medianova Control Panel. Navigate to Analytics → WAF, then select the CDN Resource for which WAF is enabled. The dashboard displays real-time charts, tables, and logs that visualize threat activity, blocked requests, and triggered rules.

    Metrics update automatically at short intervals, though the refresh rate may vary depending on your resource’s traffic volume.

    Key Metrics and Visualizations

    1. Attack Histogram

    Shows the number of attacks over time, helping you detect spikes or recurring patterns. You can filter by URL to analyze specific endpoints under attack.

    Use it for: spotting attack trends and determining peak hours of malicious traffic.

    2. Threats

    Displays the total number of requests that triggered WAF rules versus total incoming requests. Includes summary values such as:

    • Total: All detected threats since activation

    • Today: Threats detected in the last 24 hours

    • This Month / Last Month: Periodic comparison

    Use it for: measuring overall WAF effectiveness and identifying sudden spikes that may signal an attack.

    3. Top Client IPs

    Lists the IP addresses triggering the most WAF rules. A pie chart provides a quick visual overview of threat sources.

    Use it for: detecting potential attackers or regions generating malicious traffic.

    Repeated offenders can be blocked or rate-limited via Custom Rules.

    4. Top Request URIs

    Shows the URLs most frequently targeted by suspicious or blocked requests.

    Use it for: identifying vulnerable endpoints or popular attack targets. If a specific path (e.g., /login, /api/v1/auth) appears repeatedly, consider applying additional rule protections.

    5. Top User Agents

    Lists browsers, bots, or automated clients generating flagged requests.

    Use it for: distinguishing legitimate traffic from malicious bots. Unusual or outdated User Agents may indicate automated attack tools.

    6. Rule Activity

    Displays which WAF rules are triggered most often, showing their frequency and relative impact.

    Column
    Description

    Rule ID / Name

    Identifier of the triggered rule.

    Triggers

    Number of times the rule matched incoming requests.

    Last Triggered

    Most recent occurrence time.

    Use it for: assessing rule efficiency and identifying potential false positives. Frequently triggered rules may need refinement or condition adjustments.

    7. Activity Log (Last 300 Requests)

    Shows detailed information about the most recent flagged requests, including:

    • Timestamp

    • IP address

    • Request URI

    • User Agent

    • Triggered Rule

    Use it for: investigating incidents and validating rule accuracy. Regular review helps fine-tune your security posture.

    Best Practices

    • Review WAF analytics at least weekly to identify trends.

    • Watch for repeated attacks from the same IPs or regions.

    • Use the Threats and Rule Activity metrics to detect false positives or over-triggered rules.

    • Adjust or refine rules based on recurring attack patterns.

    • Combine analytics data with logs from your origin server for deeper context.

    Whitelist and Blacklist modes are mutually exclusive — only one can be active at a time.

    Why Use IP Restriction?

    Use IP Restriction to:

    • Protect internal or staging environments from unauthorized access.

    • Restrict API access to trusted partners or corporate networks.

    • Block known malicious IP ranges or suspicious activity.

    • Ensure compliance with internal security policies.

    Key Features

    • Whitelist Mode – Only the IP addresses you specify are allowed to access the resource. All other traffic is blocked.

    • Blacklist Mode – The IP addresses you specify are denied access, while all other IPs are permitted.

    • Edge-Level Enforcement – Filtering occurs at the CDN edge, ensuring zero impact on origin performance.

    • CIDR Range Support – Define large IP ranges using CIDR notation (e.g., 192.168.1.0/24).

    • Mutually Exclusive Modes – You can use either whitelist or blacklist mode, but not both simultaneously.

    Use Whitelist mode for restricted corporate APIs and Blacklist mode for public-facing applications that need selective blocking.

    Medianova’s IP Restriction system provides a simple yet powerful way to enforce access control at the CDN level. By validating requests before they reach your infrastructure, it prevents unauthorized access and improves overall performance stability. Combined with other Security features such as Rate Limiting, WAF, and Hotlink Protection, it forms a robust multi-layer defense mechanism.

    Configure Rate Limiting

    Rate Limiting helps manage client request traffic by defining thresholds on how many requests a user or IP can make within a specified time window. This feature operates at the CDN edge, preventing excessive traffic from reaching your origin servers and maintaining stable performance.

    Rate Limiting is available only for Dynamic CDN Resources in the Medianova Control Panel.

    1

    Access the Rate Limiting

    To begin configuration, log in to the Medianova Control Panel and follow these steps:

    1. Navigate to Security → Rate Limiting.

    2. Select the Dynamic CDN Resource where you want to enable Rate Limiting.

    3. The configuration panel for that resource will open.

    If you don’t have a Dynamic CDN Resource yet, create one under CDN → Create CDN Resource, then return to the Security section.

    2

    Enable Rate Limiting

    Toggle the Rate Limiting option to On to activate the feature. Once enabled, you can define custom thresholds and actions for your selected resource.

    3

    Set Request Limits

    Specify the number of requests allowed per client within a given time interval.

    Field
    Description
    4

    Choose Rate Limit Option

    Define how bursts of traffic are handled when the limit is reached. Select one of the following modes from the dropdown:

    Option
    Description
    5

    Configure IP Whitelisting (Optional)

    Add trusted IP addresses or networks that should bypass rate enforcement.

    • Click Add Whitelist Entry.

    6

    Define Actions for Exceeded Limits

    Specify what happens when a user exceeds the defined rate limit.

    Action
    Description
    7

    Save and Apply Configuration

    After defining all parameters, click Save to activate your Rate Limiting settings. The configuration takes effect immediately at the CDN edge.

    8

    Verify and Monitor

    To confirm that Rate Limiting is working:

    • Send multiple requests exceeding your threshold to trigger enforcement.

    Path & Extension Based Rate Limiting

    Some parts of your application may require different rate limits — for example, to protect login endpoints or limit access to downloadable files — without affecting the entire CDN resource.

    With Path & Extension Based Rate Limiting, you can define request thresholds that apply only to specific URL paths (such as /login or /api/) or file types (like .pdf, .jpg, or .mp4). These rules are managed under the Page Rules section in the Medianova Control Panel and allow more granular control over how traffic is handled at the edge.

    Use this feature when you need to:

    • Apply stricter limits to sensitive routes such as /auth/, /checkout, or /login.

    • Restrict access to large media or document files.

    • Combine global rate limits with path-level overrides for flexible traffic management.

    Learn more: See for configuration steps and advanced examples.

    Disabling Rate Limiting immediately removes active enforcement rules but retains your configuration for future use.

    Time Interval

    The period within which requests are counted (e.g., per second, per minute).

    Start with conservative thresholds and gradually adjust them based on traffic analytics.

    Allows short spikes within the limit window before throttling begins.

    Burst + No Delay

    Permits short bursts instantly, without waiting for enforcement delay.

    None

    Strict enforcement. Requests exceeding the limit are immediately blocked.

    “Burst” modes are useful for high-traffic APIs or login pages where short spikes are expected.

    Enter the IP address or range (e.g., 192.168.0.0/24).

  • Click Save to apply.

  • Whitelist internal monitoring systems or administrative users to prevent accidental blocking.

    Rejects the request and returns an error response (default).

    Challenge

    Sends a verification challenge to the client before allowing further requests.

    You can also define the HTTP response code to be returned:

    • 429 — Too Many Requests

    • 529 — Custom throttling response

    Use Challenge mode only if you have challenge verification integrated on your frontend (e.g., CAPTCHA).

    Test your configuration with real traffic or API calls to ensure it behaves as expected.

    Check the response code (429 or 529).

  • Review request logs and metrics in Analytics → Rate Limiting Dashboard.

  • Metric visibility may take a few minutes after activation depending on traffic volume.

    Request Limit

    Path & Extension Based Rate Limiting

    The maximum number of requests allowed (e.g., 100).

    Burst

    Block

    Geoblocking

    Restrict or allow access to your CDN Resources based on geographic location by configuring country-based whitelists and blacklists.

    Geoblocking allows you to control which countries can access your content through the . By enabling this feature, you can restrict or allow requests based on the visitor’s geographic origin, helping you comply with regional policies and protect your digital assets.

    Geoblocking operates at the CDN edge, preventing unauthorized access before requests reach your origin server.

    Why Use Geoblocking?

    Use Geoblocking to manage access and enforce content distribution policies efficiently:

    • Compliance and licensing – Restrict access to regions where content rights do not apply.

    • Dynamic pricing models – Apply different pricing or service availability by country.

    • Security enhancement – Block known high-risk regions or malicious traffic.

    • Content optimization – Focus delivery to target markets, reducing unnecessary traffic.

    Combine Geoblocking with IP Restriction for granular, IP-based exceptions within approved countries.

    How to Configure Geoblocking

    1

    Log in to the Medianova Control Panel.

    2

    Go to CDN → CDN Resources and select the resource you want to manage.

    3

    Open the Security tab.

    4

    Enable the Geoblocking toggle.

    5

    From the country list:

    • Drag or select countries to the Whitelist (allowed).

    • Drag or select countries to the Blacklist (blocked).

    6

    Click Save Changes to apply your configuration.

    7

    (Optional) Add specific IP exceptions under IP Restriction for fine-tuned control.

    You cannot whitelist and blacklist the same country simultaneously.

    Medianova Control Panel

    Upload and Manage SSL Certificates

    Learn how to upload and manage SSL certificates in the Medianova Control Panel.

    SSL/TLS certificates enable encrypted HTTPS communication between users and CDN Resources. You can upload your own certificate, use Medianova’s shared SSL, or activate a free certificate provided by Let’s Encrypt.

    TLS is the modern version of SSL. All Medianova services support TLS 1.2 and TLS 1.3 by default.

    1

    Access the SSL Management Page

    To start managing SSL certificates, open the and navigate to the SSL Management section.

    • Go to CDN → SSL Management in the left-hand menu.

    • Review the list of existing certificates in your organization.

    • Click Add New SSL to begin adding a certificate.

    2

    Add a New SSL Certificate

    When adding a certificate, you will be asked to choose the SSL type and format.

    Choose SSL Type

    Option
    Description
    3

    Assign SSL to a CDN Resource

    After uploading or creating your certificate, assign it to a specific CDN Resource.

    • Go to CDN → CDN Resources.

    4

    Manage and Validate SSL Certificates

    From the SSL Management page, you can:

    • Edit SSL Name – Rename an existing certificate.

    FAQs

    How does Medianova’s DDoS protection work?

    Medianova’s DDoS protection works through integrated strategies like rate limiting, IP blocking, geoblocking, Anycast DNS, Origin Shield, and WAF integration to prevent overload, block threats, and protect your origin server.

    Does CDN Reduce DDoS Attacks?

    Yes, a CDN reduces DDoS attacks by distributing traffic across multiple servers, using Anycast DNS, rate limiting, and shielding the origin server. It minimizes the attack impact and improves resilience.

    Do I need to manually activate DDoS protection on Medianova?

    Medianova’s Always-On DDoS Protection is active by default, providing automatic protection for your web assets against common DDoS attack types, including DNS Query Floods, SlowLoris, HTTPS GET requests, and HTTPS POST requests. No additional activation or manual configuration is required.

    What types of SSL certificates are supported by Medianova CDN?

    Medianova CDN supports a wide range of SSL certificates, including:

    • Wildcard SSL Certificates

    • SAN-supported SSL Certificates

    • Code Signing SSL Certificates

    • Domain SSL, Organization Validated SSL, and Extended SSL Certificates

    How can I upload and manage SSL Certificates?

    Yes, it is possible. For detailed instructions, please refer to the "How to Upload and Manage SSL Certificates" documentation.

    What file formats are supported for SSL certificates?

    Medianova supports standard SSL certificate formats, including .crt for certificates and .key for private keys.

    Can I add multiple SSL certificates to my organization?

    Yes, you can add multiple SSL certificates to your organization. Each certificate can be associated with different resources or domains.

    How can I use Free SSL?

    Yes, you can use Free SSL. For detailed steps, please refer to the "How Can I Use Free SSL?" documentation.

    Does Medianova support TLS 1.3?

    Yes, Medianova CDN supports TLS 1.3, the latest version of the TLS protocol, which offers enhanced security and faster performance compared to its predecessors.

    What are the differences between “SNI” and “Shared SSL”?

    SNI (Server Name Indication): This option allows you to use your own SSL certificate uploaded via the panel for a specific CDN Resource.

    Shared SSL: If you don’t have your own SSL certificate, Medianova provides a shared SSL option that can be used for secure connection

    Can I edit an uploaded SSL certificate?

    You can only rename an SSL certificate in the SSL Management menu. Other edits, such as updating the certificate or private key, are not allowed. If changes are needed, delete the existing certificate and upload a new one.

    How do I delete an SSL certificate?

    To delete an SSL certificate:

    1. Go to “CDN → SSL Management”.

    2. Click on the “Delete” option next to the certificate.

    3. Confirm the action in the pop-up window that appears.

    What is a Private Key, and why is it important?

    The Private Key is a critical part of the SSL certificate that ensures secure communication. It is based on asymmetric encryption and must be kept secret:

    • The Private Key stays on the web server and is never shared.

    • The Public Key is shared openly to establish secure communication.

    What happens if I don’t own an SSL certificate?

    If you don’t have your own SSL certificate, you can:

    • Use the “Shared SSL” option provided by Medianova.

    • Utilize the “Free SSL” option, which generates a certificate through Let’s Encrypt.

    What is the difference between "Monitoring Only" and "On" modes in WAF?
    • Monitoring Only: In this mode, WAF monitors all incoming traffic for potential threats without blocking any traffic. It provides insights into your security posture and allows you to fine-tune rules before enforcing them.

    • On: In this mode, WAF actively filters and blocks malicious traffic, providing full protection for your web assets.

    Can I view real-time threats blocked by WAF?

    Yes, the WAF service provides real-time monitoring and logging of blocked threats, which can be viewed under Analytics → WAF in the panel.

    Can I configure WAF for Dynamic CDN Resources?

    Yes, you can configure the WAF for Dynamic CDN Resources. When creating a Dynamic CDN Resource, follow the steps to activate and configure the WAF as per your security requirements.

    How do I create a custom rule in WAF?

    To create a custom rule in WAF, please refer to the "How to Activate WAF" documentation for detailed guidance.

    How can I handle false positives in WAF?

    To handle false positives in WAF, enable Monitoring-Only mode to analyze traffic. Disable the specific rule causing the issue or create custom rules to prevent it, ensuring security remains intact.

    Can I edit or delete a custom rule in WAF?

    Yes, you can edit or delete custom rules by clicking the Edit or Delete icons and submitting the changes.

    How can I configure Rate Limiting?

    To configure Rate Limiting, please refer to the "Rate Limiting" documentation for detailed steps, where you will find instructions on how to log in, select resources, and configure settings in the Security tab.

    How do I set the request limits?

    Under the Request Limit section, specify the maximum number of requests allowed per second or minute.

    Adjust the values based on your traffic volume and server capacity.

    What is the difference between the "Burst" and "Burst + No Delay" options?

    Burst allows a burst of requests but applies throttling once the threshold is exceeded.

    Burst + No Delay allows a burst of requests without any initial delay, providing quicker responsiveness before applying throttling.

    What is the "Burst Value" and how is it used?

    The Burst Value defines the threshold for the burst limit when the Burst or Burst + No Delay option is selected. It specifies how many requests are allowed in a burst before throttling is applied.

    What HTTP status codes can be configured for Rate Limiting?

    You can choose one of the following HTTP status codes to return when the rate limit is exceeded:

    • 429 Too Many Requests: Indicates that the client has exceeded the allowed number of requests within the specified time window.

    • 529 Site Overloaded: Used when the server is overloaded and unable to process requests due to excessive traffic.

    How can I define actions for excessive requests?
    • Block: Deny requests that exceed the rate limit.

    • Challenge: Present a CAPTCHA to validate the request.

    How can I enable Hotlink Protection for my CDN Resource?

    To enable Hotlink Protection, please refer to the "Hotlink Protection" documentation for detailed instructions on configuring it in the Medianova Cloud Panel.

    How do I whitelist domains for Hotlink Protection?

    In the Hotlink Protection section, you can add whitelisted domains that are allowed to access your CDN resources.

    These domains will be granted permission to link to or embed your resources.

    What happens if a request comes from a non-whitelisted domain?

    If a request comes from a non-whitelisted domain (i.e., a blacklisted or unauthorized source), the server will:

    • Block access to the resource.

    • Optionally, you can configure the server to redirect the request to a specific page or serve a placeholder image.

    How can I disable Hotlink Protection?

    If you want to disable Hotlink Protection, simply toggle the Hotlink Protection option to Off in the Security menu of your selected CDN Resource.

    What is the difference between Whitelist and Blacklist?

    Whitelist: Only devices with IP addresses listed in the whitelist are allowed access to the designated resources. All other IP addresses are denied access.

    Blacklist: Devices with IP addresses listed in the blacklist are denied access to the resources. All other devices are allowed access.

    What happens if an IP address is not in the Whitelist or Blacklist?

    If Whitelist is selected, only the listed IP addresses will have access, and all other IP addresses will be denied.

    If Blacklist is selected, all IP addresses except those in the blacklist will have access to the resources

    Why would I use the Whitelist option?

    You would use the Whitelist option if you want to grant access to specific, trusted IP addresses (e.g., business partners, internal network) and deny all other requests.

    Why would I use the Blacklist option?

    The Blacklist option is useful if you want to block specific IP addresses that are known for malicious activity or unwanted access, while allowing all other devices to access the resources.

    What happens if I make changes to the IP Restriction ACL settings?

    After making changes to the IP Restriction ACL settings, click Save Changes to apply the new access control policy. The changes will immediately take effect.

    How do I enable Geoblocking on Medianova Cloud Panel?

    To enable Geoblocking, please refer to the "Geoblocking" documentation for detailed steps on configuring country-based restrictions in the Medianova Cloud Panel.

    Can I update my Geoblocking settings after enabling it?

    Yes, you can update your whitelist and blacklist at any time. Simply move the countries between the whitelist and blacklist boxes, and click Save Changes to apply the updates.

    Can I block or allow specific IP addresses using Geoblocking?

    Yes, in addition to country-based restrictions, you can also manage IP-based restrictions. Scroll to the IP Restriction section at the bottom of the page to whitelist or blacklist specific IP addresses.

    How do I add or remove countries from the whitelist or blacklist?

    To add a country, drag it from the country list on the left to either the Whitelist or Blacklist pane.

    To remove a country, simply drag it out of the whitelist or blacklist pane and into the country list.

    Can I apply Geoblocking to a specific CDN resource?

    Yes, Geoblocking can be applied to individual CDN resources. You can configure the settings for each CDN resource separately.

    Can I enable Geoblocking without using the IP Restriction section?

    Yes, you can enable Geoblocking without using the IP Restriction section. The IP Restriction section is optional and can be used for more granular control over access.

    Own SSL

    Upload your own SSL/TLS certificate issued by a Certificate Authority (CA).

    Free SSL

    Use a free SSL certificate automatically issued by Medianova (Let’s Encrypt).

    Click Next after selecting the desired option.

    Choose Free SSL for quick setups. Use Own SSL for organization-validated certificates or wildcard support.

    Own SSL Setup

    If you selected Own SSL, choose a certificate format and provide the required information.

    Choose Certificate Format

    Format
    Description

    Domain SSL

    Extract an existing certificate directly from your domain if HTTPS is enabled.

    .crt / .pem / .key (Paste Content)

    Paste your certificate, private key, and CA chain into the input fields.

    .crt / .pem / .key (Upload File)

    Upload the certificate and private key files directly from your device.

    .pfx (Personal Information Exchange)

    Upload a .pfx file containing your certificate, key, and chain. Provide a password if required.

    Ensure that your certificate and private key match. Uploading mismatched pairs will result in an error.

    Field Descriptions

    Field
    Description

    SSL Name

    Internal display name for your SSL certificate.

    Domain Name

    Domain or wildcard domain to secure.

    Certificate (.crt)

    Public certificate file for HTTPS validation.

    Private Key

    Private key matching the certificate.

    Certificate Password

    Password for encrypted key or .pfx file.

    CA Chain / Intermediate Certificates

    Certificates linking your domain to the root authority.

    Free SSL Setup

    If you selected Free SSL, fill in the following details:

    Field
    Description

    SSL Name

    A name to identify the certificate in your organization.

    Wildcard

    Toggle this option to secure all subdomains under the same domain.

    Domain

    Select the CDN domain to apply the certificate.

    Click Add Free SSL to issue and install your certificate automatically.

    Free SSL certificates are valid for 90 days and are automatically renewed by Medianova.

    Free SSLs are ideal for fast deployment or non-critical environments.

    Open the SSL tab (or CNAME & SSL for Small and Large resources).

    • Select one of the following options:

      • SNI (Own SSL): Use your uploaded SSL certificate.

      • Shared SSL: Use Medianova’s shared certificate.

    • Click Save to apply the changes.

    Resource tab names differ by product type.

    Small/Large Resources: CNAME & SSL

    Streaming/VOD/Dynamic: SSL

    Replace SSL – Upload a new certificate to replace an expired one.

  • Delete – Remove unused or expired certificates.

  • Always upload the complete certificate chain (Leaf + Intermediate + Root) to avoid browser trust warnings.

    Component
    Description

    Leaf Certificate

    The primary certificate for your domain.

    Intermediate Certificates

    Bridge between the leaf and the root authority.

    Root Certificate

    Trusted by browsers and operating systems.

    Full Chain = Leaf + Intermediate (+ Root)

    Uploading only the leaf certificate may cause incomplete validation. Always include the full chain.

    Medianova Control Panel