WAF is deployed in dedicated mode. The following tables describe specifications and functions of the dedicated WAF instances.
Table 1 describes dedicated WAF instances.
Item |
Description |
---|---|
Deployment mode |
Dedicated WAF instances |
Application scenarios |
Service servers are deployed on the cloud. Suitable for large enterprise websites that have a large service scale and have customized security requirements. |
Protection objects |
Domain names or IP addresses |
Advantages |
|
For more details, see Table 2.
Service metrics |
Specifications |
---|---|
Peak rate of normal service requests |
|
Service bandwidth threshold (Origin servers are deployed on the cloud.) |
|
Number of domains |
2,000 (Supports 2,000 top-level domain names) |
Peak rate of CC attack protection |
500,000 QPS |
CC attack protection rules |
100 |
Precise protection rules |
100 |
IP address blacklist and whitelist rules |
100 |
Geolocation access control rules |
100 |
Web tamper protection rules |
100 |
Information leakage prevention rules |
100 |
Global Protection Whitelist (Formerly False Alarm Masking) |
1,000 |
Data masking rules |
100 |