As clients request your site, Edgecast sends traffic through our network to the servers associated with your origin configuration(s). You must configure your firewall to allow this traffic to ensure that these requests are not blocked.
IP blocks may vary by organization.
If you plan on using the Edgecast CLI to deploy to a development or CI/CD environment, then you will also need to allow traffic from the domain to which it connects. This domain is listed within the Allowlisting window.
To view our network’s IP blocks
Load the Origins page.
From the Edgecast Console, select the desired private space or organization.
Select the desired property.
From the left-hand pane, select the desired environment from under the Environments section.
From the left-hand pane, select Origins.
From the information bar at the top of the page, click instructions.
The Allowlisting window will display a list of IPv4 and IPv6 blocks for standard traffic, Perimeter 81 for network security, AWS NAT gateway for the Edgecast cloud, and the domain to which the Edgecast CLI connects when deploying to a development or CI/CD environment.
We strongly recommend that you allow traffic for all IP blocks and the domain listed on the Allowlisting window.
Once you are ready to serve traffic through Edgecast, you will need to configure DNS for each hostname. DNS configuration consists of defining a CNAME record that points your hostname to our service.
If your hostname is at the zone apex (e.g., example.com), then you will need a DNS service provider that supports defining a CNAME record at the zone apex. Learn how to set this up through Route.
From your DNS service provider, point your hostname(s) to a service domain that is either specific to your property’s environment or space.
Sample Service Domain:2af36ae6-2146-4b73-a5e7-f86c4a93bc06.edgio.link
Edgecast assigns a different service domain to each of your environments. You may point any hostname defined within a specific environment to its service domain.
To view the service domain assigned to a specific environment
Load the Hostnames page.
From the Edgecast Console, select the desired private space or organization.
Select the desired property.
From the left-hand pane, select the desired environment from under the Environments section.
From the left-hand pane, select Hostnames.
From the DNS column, click Actions needed.
This button is disabled if you have not deployed a new hostname yet or when setting up a hostname for a new root domain and you have not already activated a TLS certificate.
For example, this button will be enabled for images.example.com if you have already deployed this change and you currently serve traffic through cdn.example.com. However, it will be disabled for cdn.example.org until you set up a TLS certificate for it.
From the DNS Configuration pane, click to copy this domain.
Edgecast requires a CNAME record to serve your site’s traffic. Some DNS service providers do not support defining a CNAME record for the zone apex (e.g., example.com). In order to serve traffic for a zone apex, you will need to use a DNS service provider that supports CNAME records at the zone apex. Instructions on how to use Edgecast Route to set up a CNAME record at the zone apex is provided below.
The zone apex is the point in your zone that contains your SOA and NS records.
To add a CNAME record at the zone apex through Route
Edgecast Route requires activation. Additionally, you will need to delegate your primary zone to Edgecast Route. Contact your account manager or our sales department at 1 (866) 200 - 5463 to upgrade your account.
Unless otherwise agreed in writing by Edgecast, Application Services are solely intended for rendering the functional attributes of a website e.g., HTML, JavaScript, CSS, and APIs (subject to the restrictions herein), and are not to be used for video or audio streaming or for delivery of other large file types, including but not limited to images and software downloads or updates (“Unauthorized Traffic”) which require the purchase of other Edgecast Services. Edgecast may monitor, terminate, suspend, and/or restrict the use of the Application Services when it determines in its sole discretion that Unauthorized Traffic is being delivered.