If you or your hosting provider use a firewall to protect the web server, it may be necessary under certain circumstances to allow our IP addresses. This is the only way to ensure that visitors to your website do not receive an error and can actually access the content.
To do this, add the following IP ranges to your firewall's allow list or ask your hosting provider to do this for you:
199.83.128.0/21
198.143.32.0/19
149.126.72.0/21
103.28.248.0/22
45.64.64.0/22
185.11.124.0/22
192.230.64.0/18
107.154.0.0/16
45.60.0.0/16
45.223.0.0/16
131.125.128.0/17
2a02:e980::/29
The EuropeanSEC CDN uses a variety of globally distributed server locations to cache content and deliver it more quickly to visitors of your website. Visitors are automatically served by the server that provides the best connection speed and load. Usually, this is a CDN server located in close geographic proximity. A visitor from Spain will be served by a different CDN server than a visitor from the USA or Germany.
Each CDN server has its own IP in one of the above-mentioned ranges. If, due to a firewall on your server, one or more IPs of our CDN servers are mistakenly blocked, this can lead to an "Error 20" connection error, which only affects visitors who are located in and assigned to that region. Therefore, it may happen that some of your customers report problems, while for you and other customers there are no reproducible connection issues at all.
Server firewalls are often based on checking whether an unusually high number of requests from an IP arrive within a defined period of time. If a specified threshold is exceeded, this IP is temporarily or permanently blocked in order to prevent potential attacks. In operation without CDN and WAF, this usually works because each visitor can be identified by your server with a unique IP. With CDN enabled, however, the visitors' IPs are masked by the CDN servers (proxies), meaning that to your server, it looks as if all visitors from Luxembourg are using the same IP (that of the CDN server in Luxembourg). Accordingly, there is a significantly higher number of requests in the same period from this IP address than in normal operation.
To prevent unwanted blocking from the outset, we recommend whitelisting the IP ranges in your firewall or at least allowing them a higher connection volume. If WAF is also activated, this does not cause any disadvantages, as potential attacks are already blocked within our network and do not reach your server at all.
Protecting Your Business from Phishing Attacks: Types, Dangers, and Prevention Strategies. Learn how to recognize and avoid phishing attacks to safeguard your company's data and reputation.
The modern cyber threat landscape is characterized by a diversity and complexity of attack methods. A comprehensive security awareness strategy that addresses different types of threats and teaches security best practices is essential to establish an effective security culture within the organization.
Insider threats are another major threat to organizations, in addition to external threats. In this article, you will learn what exactly insider threats are, why they arise and how you can protect your company against them.
Cyber security is critical for small and medium-sized enterprises (SMEs) as they need to protect high-value data and customer trust. Our guide provides concise information to strengthen SME cybersecurity. We highlight fundamental concepts, identify threats, and provide practical advice on how to implement security measures.
Working from home: opportunities and challenges of teleworking. The rise of telecommuting offers many benefits, but it also brings new cybersecurity risks and challenges. Learn how companies and employees can overcome these challenges.
Discover the keys to data security in the healthcare industry and learn why data security in the healthcare industry is essential. From sensitive data to GDPR - discover the importance, current risks and proven strategies for comprehensive protection.
The importance of security awareness for companies: Why traditional training approaches are often not enough and how targeted campaigns can increase security awareness. A roadmap for an effective security awareness campaign.
Explore the pros and cons of open source vs. proprietary security tools. Discover which might suit your business needs, from cost-effectiveness to advanced features and support.
Discover the indispensable role of the web application firewall (WAF) in protecting your online business. Learn how it fends off attacks, ensures compliance, and builds trust with your customers. Dive into the future of WAF technology and how it will evolve to meet the threats of tomorrow.