All Products
Search
Document Center

Edge Security Acceleration:Overview

Last Updated:Oct 09, 2024

You can configure a global cache policy to cache static resources on points of presence (POPs). This increases the resource hit ratio, improves access performance, and reduces origin traffic.

Feature

Description

Query strings

When a point of presence (POP) generates a cache key for a request, the POP removes the question mark (?) and query strings that follow the question mark (?), such as user identity and access source, from the request URL. This increases the cache hit ratio and accelerates page loading.

Browser cache TTL

The browser cache time-to-live (TTL) is the period of time during which web page resources, such as HTML, CSS, JavaScript files, and images, are stored in the cache of browsers. By default, the TTL follows the Cache-Control header that is configured on the origin server. You can configure the browser cache TTL without modifying the configuration of the origin server. During the TTL, the browser loads the files from the cache for subsequent requests. This speeds up page loading.

Edge cache TTL

The edge cache time-to-live (TTL) is the period of time during which origin resources are cached on Edge Security Acceleration (ESA) points of presence (POPs). When the TTL ends, resources that are cached on POPs are marked as expired. If the requested resource has expired on a POP, the POP retrieves the most recent resource from the origin server and caches it. You can configure a cache TTL for static resources based on file directories or file name extensions.

Development mode

After you enable the development mode, all requests are redirected to the origin server. This allows requests to your website to temporarily bypass the caching components of Edge Security Acceleration (ESA) so that you can verify changes to the cached content. This feature is useful when you want to view changes in real time. Once enabled, the development mode lasts for 3 hours and then is automatically disabled.

Sort query strings

After you turn on Sort Query Strings, Edge Security Acceleration (ESA) automatically sorts the query strings in the URLs when processing requests. Then, ESA returns the requested resources from the cache or redirects the requests to the origin server based on the sorted query strings. This way, POPs return the same file for requests that contain the same parameters and values, regardless of the order of query strings in the request URLs. This feature improves the cache hit ratio.