All Products
Search
Document Center

Edge Security Acceleration:Overview

Last Updated:Jan 29, 2026

You can use hotlink protection, URL signing, remote authentication, IP blacklists and whitelists, and User-Agent blacklists and whitelists to identify and filter visitors. These features restrict access to your DCDN resources and improve security.

You can use the access control features of DCDN to perform the following operations for your domain names.

Feature

Description

Configure hotlink protection

You can configure a Referer blacklist or whitelist to identify and filter visitors based on the source domain names of requests. This restricts access to your DCDN resources and prevents other websites from hotlinking to your content.

Configure URL signing

URL signing adds authentication to URLs. DCDN validates the encrypted string and timestamp in a signed URL to protect your resources from unauthorized downloads. URL signing is more secure than hotlink protection and is ideal for files that require a high level of security.

Remote authentication

If you have your own authentication server, you can configure remote authentication to forward user requests to your server for validation.

Configure an IP blacklist and whitelist

You can configure an IP blacklist and whitelist based on the source IP addresses of requests. This identifies and filters visitors, restricts access to DCDN resources, and prevents malicious activities such as IP address abuse and attacks.

Configure a User-Agent blacklist and whitelist

A User-Agent identifies the client that sends a request. You can configure a User-Agent blacklist and whitelist to filter visitors and ensure that your resources are accessed only from allowed clients.