How can I set up and activate EuropeanSEC for my website?


You have just ordered EuropeanSEC and want to set up the powerful Content Delivery Network (CDN) and the Web Application Firewall (WAF) for your website? Then please follow these steps:

1
Validate domain & set up SSL

To use EuropeanSEC, you need access to your domain's DNS zone. This is usually possible via the customer interface of the provider where you ordered your domain.

Unfortunately, the input fields differ depending on the provider, but they always follow the same basic rules. To prepare the domain for EuropeanSEC, it is necessary to add two DNS entries. We informed you exactly which ones these are a few minutes after your order by email. Alternatively, you can retrieve them at any time via our management interface.

Example

yourdomain.de TXT globalsign-domain-verification=3C4614D5837098F1775E7D369B6F0FD7

This entry serves for basic validation that you are the owner of the domain. Our partner periodically checks whether the corresponding key can be retrieved as a TXT entry via your main domain. As soon as this is the case, EuropeanSEC will be enabled for setup and a valid SSL certificate for your domain will be set up on our edge servers. If necessary, you can replace this certificate at any time with your own existing certificate.

The validation and setup will take a few minutes. If so-called CAA records are set up for your DNS zone, please make sure that you also add the following 2 entries to allow the issuance of SSL certificates by GlobalSign:

your.domain.de CAA 0 issue "globalsign.com"
your.domain.de CAA 0 issuewild "globalsign.com"
2
Route traffic through our edge servers

You can now begin routing the actual data traffic between the visitors of your website and your server through our globally distributed network. For this, three additional DNS entries need to be added or replaced, if they already exist. You have also received these by email after successfully setting up the SSL certificate, or you can retrieve them at any time in the management interface.

Example

yourdomain.de A 45.60.23.204
yourdomain.de A 45.60.26.204
www.yourdomain.de CNAME 6bac3ln.europeancdn.eu

With these entries, requests to your domain are first routed through our network, where they are filtered accordingly or delivered from the high-performance cache before the request is forwarded to your web server.

How long it takes for this change to take effect depends on the TTL (Time To Live) of your DNS zone. As a rule, it can take up to 24 hours until all visitors are actually routed through our network.

3
Check statistics after 1-2 days

After some time, the first statistics will automatically appear in your management interface. Once this happens, the setup of the CDN and the WAF is complete. You can now make advanced settings if needed:

  • Set up firewall exception rules
  • Adjust firewall policies
  • Upload your own SSL certificate
  • Set up blacklists and whitelists
  • Adjust caching & optimization factors


If you have any questions or problems during setup, please do not hesitate to contact our customer service.


You may also be interested in...
Year in review: The top cyber security threats of 2023 and how to prepare for 2024

The year 2023 has been packed with technological advances, which has also evolved the tactics used by cybercriminals to exploit vulnerabilities and compromise sensitive data.

The importance of regular security audits for your IT infrastructure

In this article, we tackle the critical issue of regular security audits and discuss why these audits are essential, their benefits, and how they work.

The effects of the GDPR on IT security

This article looks at the impact of the GDPR on IT security and explains its role in strengthening data protection safeguards, reshaping cybersecurity strategies and promoting a culture of data protection.

Exploring the Variances Between Email Encryption and Email Authentication

Unlock the secrets of email security! Dive into our comprehensive guide on the crucial roles of email encryption and authentication, their mechanisms, benefits, and best practices.

Secure Your Business Email Accounts: 10 Essential Steps

Discover how to fortify your business email against cyber threats! Learn the top 9 essential steps in our latest guide to boost your email security and protect sensitive data.

How to detect and avoid a phishing attack

Protecting Your Business from Phishing Attacks: Types, Dangers, and Prevention Strategies. Learn how to recognize and avoid phishing attacks to safeguard your company's data and reputation.

How to protect your company from insider threats

Insider threats are another major threat to organizations, in addition to external threats. In this article, you will learn what exactly insider threats are, why they arise and how you can protect your company against them.

Security Considerations for Cloud Services

Cloud services offer notable advantages such as scalability, cost-efficiency and accessibility, but also raise significant security concerns that cannot be overlooked. As organizations migrate their operations to the cloud, ensuring the security of sensitive data and resources becomes a priority. While the cloud offers unmatched convenience and flexibility, it also brings new challenges that organizations must address comprehensively.

Top WAF Features to Look for in 2025

Discover the future of web security! Learn the top WAF features in 2025, from AI integration and zero-day attack protection to advanced threat intelligence and API security. Stay ahead in cybersecurity!