Over 10,000 customers trust IXCDN to deliver content to millions.
IPv4 / IPv6:
Our entire infrastructure supports both IPv4 and IPv6 protocols, ensuring compatibility with any network environment.
HTTP/2:
This protocol improves web performance by allowing multiple requests and responses to be multiplexed over a single connection, reducing load times.
HTTP/3 (beta):
The latest evolution of HTTP that builds on QUIC transport protocol, significantly reducing latency for improved user experiences.
TLS 1.3 with 0-RTT:
This version of the Transport Layer Security protocol offers improved security and performance, including zero round-trip time (0-RTT) for faster connections.
Anycast and GeoDNS routing:
By using Anycast and GeoDNS, traffic is routed to the nearest or optimal server, enhancing speed and reliability.
Dynamic content acceleration:
Improves the delivery of dynamic content by using advanced caching strategies and optimized routing.
Edge rules:
Allows the implementation of custom rules at the edge of the network for better control over traffic management and request handling.
Free Let’s Encrypt SSL:
Offers free SSL certificates from Let's Encrypt to ensure secure communication over HTTPS.
Custom SSL certificate:
Supports the use of your own SSL certificates for enhanced security and brand reliability.
Custom domain:
Allows you to use your own domain names for better brand recognition and professionalism.
Extended API:
Provides a comprehensive API for automating and integrating our services with your own applications and workflows.
Terraform support:
Enables infrastructure as code by allowing management through Terraform for easier and more reliable deployments.
Grafana support:
Integrates with Grafana for advanced monitoring and visualization of your metrics and logs.
Two-factor authentication:
Enhances account security by requiring a second form of verification in addition to your password.
Origin shielding:
Adds an extra layer of caching to protect your origin servers from high traffic, thus improving performance and reliability.
Origin groups:
Allows for the configuration of multiple origin servers for load balancing and redundancy, ensuring high availability and reliability.
Our entire infrastructure supports both IPv4 and IPv6 protocols
Purge by URL, file, directory:
Instantly remove cached content by specifying the URL, file name, or entire directory to ensure outdated or incorrect content is promptly refreshed.
Prefetch:
Automatically fetch and cache content before it is requested by the user, reducing load times and improving the user experience by delivering content instantaneously.
Cache sharding:
Distribute cached content across multiple servers to balance the load and improve the speed and efficiency of content delivery, enabling faster access for end-users.
Always online (Serve stale):
Ensure your website remains accessible even during server outages by serving stale content from the cache, maintaining user access to critical information.
Customizable TTL:
Adjust the Time-to-Live (TTL) settings for cached content to define how long it remains in the cache before it is refreshed, providing flexibility in managing content freshness and performance.
Purge by URL, file, directory:
Easily clear cache entries by specifying the exact URL, file, or directory, facilitating immediate updates and ensuring users always see the most current version of your site.
Use CDN cache purge:
Utilize content delivery network (CDN) tools to globally purge cache entries, enabling quick and efficient invalidation of outdated content across all CDN edge servers.
Origin validation using SSL:
Ensure secure connections between your origin servers and the CDN by leveraging Secure Sockets Layer (SSL) validation, which authenticates the origin and encrypts data to prevent unauthorized access.
SNI support:
Server Name Indication (SNI) allows multiple SSL certificates to be served from the same IP address and port number, enabling the hosting of multiple SSL sites on a single server and improving resource utilization.
Secure token:
Use secure tokens to control access to your content by generating tokens that validate user requests, enhancing security by preventing unauthorized content distribution.
Access control list:
Implement access control lists (ACLs) to restrict or permit access to specific resources or content based on IP addresses, geographical locations, or other criteria, ensuring that only authorized users can access sensitive data.
CORS headers support:
Enable Cross-Origin Resource Sharing (CORS) headers to allow secure interactions between your web applications and resources hosted on different domains, facilitating seamless integration and data sharing while maintaining security.
Forced redirect to HTTPS:
Automatically redirect all HTTP traffic to HTTPS to ensure secure communication, protecting data integrity and confidentiality by encrypting the data transmitted between the user and your server.
TLS versions:
Specify and enforce the use of specific Transport Layer Security (TLS) versions to secure communications, ensuring that connections benefit from the latest security protocols and updates while deprecating older, less secure versions.
Origin validation using SSL:
Implement SSL verification to ensure that only trusted servers can connect to your CDN, effectively preventing malicious entities from intercepting or tampering with data during transit.
Protect the origin-CDN connection against man-in-the-middle attacks:
Safeguard the communication channel between your origin servers and the CDN from man-in-the-middle (MITM) attacks by using robust encryption methods and mutually authenticated SSL/TLS connections, ensuring data integrity and security.
Brotli compression:
Utilize Brotli compression to reduce file sizes and improve load times. Brotli is a modern compression algorithm that often achieves higher compression ratios than traditional methods like Gzip, particularly beneficial for text-based resources.
Fetch compressed:
Ensure that resources are fetched in their compressed form when available, minimizing bandwidth usage and speeding up the delivery of content to end users by reducing the amount of data transferred.
Gzip compression:
Employ Gzip compression to decrease the size of your assets, such as HTML, CSS, and JavaScript files, thus improving page load speed and overall performance.
Rewrite option:
Use URL rewriting options to dynamically transform URLs, enabling cleaner, more user-friendly URLs, and facilitating better resource management and SEO.
WebP and AVIF compression:
Leverage WebP and AVIF image formats to significantly reduce image file sizes without compromising quality. These modern formats provide superior compression rates compared to older formats like JPEG and PNG.
Image quality settings:
Adjust image quality settings to balance image fidelity and performance. Tailor the compression level to meet your requirements for speed and visual quality.
Image cropping:
Automatically crop images to focus on the most important parts, enhancing the visual presentation of images on different devices and screen sizes.
Image resizing:
Dynamically resize images to fit multiple resolutions and device screens, ensuring that images are appropriately sized for their context, thus improving load times and user experience.
Large file delivery optimization:
Optimize the delivery of large files, such as software distributions or HD videos, by utilizing techniques such as chunked transfer encoding and intelligent caching, ensuring efficient, reliable, and fast downloads.
WebSockets support:
Support WebSockets to enable real-time, bidirectional communication between clients and servers. This is essential for applications that require immediate data updates, such as live chat, gaming, and financial tickers.
Custom HTTP status code:
Configure custom HTTP status codes to provide more informative responses to clients, handling specific scenarios with tailored messages and enhancing error tracking and debugging processes.
Download speed limit:
Implement download speed limits to control the bandwidth each connection can use, preventing any single user from monopolizing resources and helping to ensure fair distribution of bandwidth.
Brotli compression:
Implement Brotli compression to reduce file and image sizes effectively. Brotli, as a modern, high-efficiency compression method, helps in minimizing resource sizes, improving load times, and saving bandwidth.
Reduce file and image size with the Brotli compression method:
Utilize Brotli compression to efficiently decrease the size of files and images, providing faster load times and reduced data transfer costs by optimizing content delivery without compromising quality.
Detailed statistics:
Access comprehensive statistics to monitor CDN performance, track key metrics like bandwidth usage, hit/miss ratio, and response times, and gain insights into overall resource consumption and user interactions.
Raw logs:
Obtain raw logs to scrutinize every request and response passing through the CDN. Analyze detailed entries to troubleshoot issues, understand user behavior, and ensure compliance with security and performance standards.
Log viewer:
Use an integrated log viewer to conveniently inspect CDN log data. This tool allows you to search, filter, and examine log entries in real-time, aiding in quick diagnostics and performance analysis.
Control of consumed traffic:
Manage and monitor the amount of traffic consumed by your resources. Set usage limits, analyze traffic patterns, and implement measures to optimize performance and cost-efficiency.
Real Time Monitor:
Monitor the traffic load in real time.Find and Audit the top usage or hot url,limit or redirect、protect the top url.
IXCDN provides you with general information about CDN operation. This information does not contain all possible sets of fields and restricted by time. These reports offer insights into traffic distribution, request types, geographical data, and other critical metrics to help in making informed strategic decisions.
SSL/TLS encryption:
Implement SSL/TLS encryption to secure communications between clients and your CDN endpoints, ensuring that data in transit is encrypted and protected from unauthorized access and tampering.
L3, L4 DDoS protection:
Deploy Layer 3 and Layer 4 DDoS protection to safeguard your network infrastructure against volumetric attacks and protocol-based threats. This protection helps to ensure the availability and stability of your services under attack.
L7 DDoS protection:
Utilize Layer 7 DDoS protection to defend against complex, application-level attacks that target specific web properties and services, ensuring that your application remains available and performant under sophisticated attack vectors.
WAF (Web Application Firewall):
Use a Web Application Firewall to protect your web applications by filtering and monitoring HTTP traffic between a web application and the internet. The WAF defends against common vulnerabilities such as SQL injection, cross-site scripting (XSS), and other threats outlined in the OWASP Top Ten.
API security:
Implement API security measures to protect your APIs from malicious activities and ensure that they operate securely. This includes enforcing authentication, authorization, and implementing rate-limiting to prevent abuse.
Bot protection:
Use bot protection solutions to detect and mitigate malicious bots that can scrape content, perform credential stuffing, or launch other automated attacks against your web properties, ensuring genuine user traffic is prioritized.
SSL/TLS encryption:
Employ SSL/TLS encryption to secure data transmission, building a secure channel between the client and server, thereby protecting against eavesdropping, tampering, and forgery.
Use the secure connection to protect against man-in-the-middle attacks:
Establish a secure connection using SSL/TLS encryption to prevent man-in-the-middle (MITM) attacks, ensuring the privacy and integrity of data exchanged between users and your services.
Reduced TTFB:
Utilize techniques to reduce Time to First Byte (TTFB), ensuring faster delivery of content to users by minimizing the initial delay experienced when a web page or media stream starts to load. This improvement enhances user experience by reducing perceived latency.
RAM caching for live:
Implement RAM caching for live streams to store data in memory for rapid access, significantly reducing latency and buffering times for real-time media delivery.
Live HTTP-based protocols:
Support live streaming using HTTP-based protocols such as HLS (HTTP Live Streaming) and DASH (Dynamic Adaptive Streaming over HTTP), which allow adaptive bitrate streaming over the web.
Live non-HTTP protocols:
Enable live streaming over non-HTTP protocols, such as RTMP (Real-Time Messaging Protocol) or WebRTC, which are designed for low-latency and real-time communication.
HESP protocol:
Implement the High Efficiency Streaming Protocol (HESP) to deliver ultra-low-latency streaming with reduced bandwidth consumption, providing a better user experience for live video broadcasts.
Micro-segmented caching:
Use micro-segmented caching techniques to break down media content into small segments that can be cached and distributed efficiently, reducing load times and improving streaming performance.
Restricted access:
Implement restricted access controls to ensure that only authorized users can access specific content, enhancing security and compliance with licensing agreements.
Reduced TTFB:
Optimize server and network configurations to minimize Time to First Byte (TTFB), thus accelerating the initial load time for web pages and media content, leading to better user engagement and satisfaction.
IXCDN Stream Platform help our customers control every aspect of the viewing experience with high-quality,streaming in 4K,8K HDR,and Dolby Vision.IXCDN Provide a superior video experience by optimizing factors like buffering, latency, and bandwidth usage to achieve near-instant playback for users, enhancing viewing satisfaction and reducing abandonment rates.
Comprehensive Documentation:
Provides detailed API documentation including endpoints, request/response formats, and code samples, ensuring developers have the resources they need to effectively integrate and use the CDN API.
Authentication and Authorization:
Implement secure API key-based or OAuth authentication and authorization mechanisms to ensure that only authorized users can access and manipulate CDN resources.
Content Purge and Invalidation:
Allow developers to programmatically purge or invalidate cached content across the CDN, ensuring that users always access the most current version of the content.
Real-time Analytics:
Offer endpoints to retrieve real-time analytics data, such as hit counts, cache hit/miss ratios, bandwidth usage, and geographic distribution of traffic, providing valuable insights to developers and operators.
Customizable Caching Rules:
Enable developers to set custom caching rules and expiration times for different types of content, optimizing cache behavior based on specific use cases and content requirements.
Content Delivery Optimization:
Provide endpoints to configure delivery settings like compression, minification, image optimization, and adaptive bitrate streaming, ensuring fast and efficient content delivery.
Edge Logic Configuration:
Allow programmatic setup and management of edge logic, such as redirects, rewrites, header manipulations, and other custom behaviors at the edge level.
Dynamic Origin Configuration:
APIs for configuring dynamic origin servers, which specify the source servers from which the CDN fetches content, supporting multi-origin setups and load balancing.
SSL/TLS Management:
Provide tools for managing SSL/TLS certificates, ensuring secure data transmission between clients and the CDN while supporting automated certificate renewal processes.
Access Control and Security:
Offer APIs for setting up security measures such as IP whitelisting/blacklisting, geofencing, token-based authentication, and DDoS protection, enhancing the security of content delivery.
Logging and Monitoring:
Enable access to detailed logs and monitoring data for traffic, errors, and performance metrics, helping developers diagnose issues and optimize their CDN usage.
Edge Function Deployment:
Allow developers to deploy and run custom scripts or functions at the edge, providing the ability to execute logic closer to the end-user for reduced latency and improved performance.
All the functionality that you are familiar with in the IXCDN control panel is also available through the API, allowing you to script the complex actions that your use case requires.Integration with popular DevOps tools and platforms for seamless CI/CD pipelines, allowing for automated deployment and management of CDN configurations.