docs
ucdn
User Guide
Advanced Configuration

Advanced Settings

For more configurations on CDN, you can understand how to configure and related precautions through this article.

Some configurations support non-standard configurations, please contact technical support for configuration.

FeaturesSupport
Mandatory JumpSupport
Custom Return HeaderSupport
Custom Response HeaderSupport
Whole Site Acceleration-QUICSupport
Whole Site Acceleration-WebsocketSupport
IPv6Support
Range Back to SourceSupport
UA Black and White ListSupport
Timestamp Anti-theft ChainSupport
Bandwidth CappingSupport
Single Link Speed LimitSupport
IP Access Frequency LimitSupport
Http2.0Support
HTTPS Forced JumpSupport
OCSPSupport
Intelligent CompressionSupport

Forced Jump

You can force redirect user requests to HTTPS by setting forced redirection.

Before performing this operation, please ensure that the corresponding domain has successfully configured the HTTPS certificate.

Custom Back to Source Header

By configuring the HTTP Header of back to source, you can set the back to source header information. The HTTP Header setting is implemented by setting parameters and corresponding values.

ParameterDescription
Custom ParametersAccording to your actual business needs, set parameters and values.

Custom Response Header

By configuring the response HTTP Header, you can achieve CORS, set or designate header information included in the HTTP response header. The HTTP Header setting is implemented by setting parameters and corresponding values.

Common HTTP response header parameters are explained as follows:

ParameterDescription
Access-Control-Allow-OriginSpecifies the allowed origin of the CORS request.
When set to "*", all domains are allowed.
Access-Control-Allow-MethodsSpecifies the allowed methods of the CORS request.
Common methods are POST, GET, OPTIONS, etc.
Access-Control-Max-AgeSpecifies the cache time of the prefetch request result of the client program for a specific resource.
Access-Control-Expose-HeadersSpecifies the allowed fields of the CORS request.
Like Cache-Control, Content-Language, Content-Type etc
Custom ParametersYou can also set custom parameters.

Operating Step

1.Enter the UCDN product console [Domain Management] page, select the domain to be configured.

2.Enter the domain configuration details page, select [Domain Configuration] - [Basic Settings] - [Advanced Settings], carry out related configurations.

3.Open compulsory jump, add the back to source header, add the respond header back.

Be sure to click Confirm Configuration after the configuration modification is complete to successfully modify the configuration.

Enable mandatory jump

Add Response Header

Add Back to Source Header

Whole Site Acceleration Special Configuration

Quic

Quic protocol achieves low-latency transmission, suitable for weak network environments. If your business user scenario needs to maintain network fluency, you can choose to use the Quic protocol.

Quic protocol service is a value-added service, requiring charges for request number, for charges details please refer to Whole Site Acceleration-Request Number

Method to open: Contact the non-standard account manager for opening.

After opening, you can view the service opening status under the corresponding domain configuration.

WebSocket

WebSocket can maintain real-time communication, and does not need to continuously send requests to the server to maintain the connection. When your service needs to actively push information to the client, and has high requirements for real-time communication, it is recommended that you choose to open the WebSocket service.

Websocket service is a value-added business charge. For charges details please refer to Whole Site Acceleration WebSocket Monthly Traffic Billing

Method to open: Contact the non-standard account manager for opening.

After opening, you can view the service opening status under the corresponding domain configuration.

More Non-Standard Configurations

When you need to configure more strategies for domain, but the self-service console cannot meet, you need to contact the account manager or technical support for non-standard configuration;

The following are examples of some supported non-standard configurations. If the following configurations cannot meet your requirements, you can also contact your account manager or technical support for non-standard evaluation and configuration.

The configuration time is related to the complexity of the requirements. Under normal circumstances, the requirements can be completed on the same working day, and they will be delayed on non-working days.

Protocol Category

  • IPv6: Currently supports IPv6 protocol acceleration, does not support IPv6 protocol back to source.

Back to Source Category

  • range to back: Segment back to source, this feature of segmented back to source is turned off by default and requires the source station to support the Range head. After this configuration is enabled, CDN will initiate Range requests to the source station (the default is to request the entire file back to source), thereby improving the efficiency of CDN content retrieval. Turning on fragment back to source may affect the back to source.

Access Control Category

  • UA Black and White List: Limit the User-Agent header of user requests, and only allow/deny requests with specified User-Agent to access CDN domain.

  • Timestamp anti-theft chain: Refer to Timestamp anti-theft chain, if there are other anti-theft chain strategies, you can also evaluate and confirm support.

  • Bandwidth Cap: By limiting the peak bandwidth of the domain, control cost or prevent attacks from affecting online services. In general, the limitation strategies are:

    A. Set the peak bandwidth threshold to XXX (Mbps). For requests exceeding the threshold, limit the single connection to Y (MB/s). This restriction cannot completely limit the peak value to XXX, it will depend on the size of the single connection speed limit and the number of requests.

    B. Set the peak bandwidth threshold to XXX (Mbps), and block 403 links for requests exceeding the threshold.

  • Single connection speed limit: Limit the single request to XX MB/S (KB/s, B/s can also be set; it is not recommended to set above GB/s, the effect of speed limit is not obvious).

  • IP access frequency limit: Limit the number of access times for a single IP within a unit time, and return 403 for exceeding a period of time. The configuration strategy is: if the domain/ designated directory/URL receives more than X accesses from IP in X minutes, it will be rejected (403) for subsequent access to the domain or directory or URL by the IP that reached the threshold in the next X seconds/minutes/hours

HTTPS Related

  • HTTP/2 Setting

  • HTTPS Forced Jump: HTTP request jumps to HTTPS

  • OCSP Configuration: Can improve the efficiency of TLS handshake during HTTPS request by client, and reduce user access time.

Other Configurations

  • Intelligent Compression: Perform Gzip compression on static files to reduce the downstream traffic generated by requests, and speed up file transfer. The client needs to carry Accept-Encoding to make a compression request when requesting.
  • Company
  • ContactUs
  • Blog
Copyright © 2024 SurferCloud All Rights Reserved