Product Specifications

WAF is deployed in dedicated mode. The following tables describe specifications and functions of the dedicated WAF instances.

Dedicated Mode

Table 1 describes dedicated WAF instances.

Table 1 Dedicated mode description

Item

Description

Deployment mode

Dedicated WAF instances

Application scenarios

Service servers are deployed on the cloud.

Suitable for large enterprise websites that have a large service scale and have customized security requirements.

Protection objects

Domain names or IP addresses

Advantages

  • Enable cloud and on-premises deployment.
  • Enable exclusive use of WAF instance.
  • Meet requirements for protection against large-scale traffic attacks.
  • Deploy dedicated WAF instances in a VPC to reduce network latency.

Service Scale

For more details, see Table 2.

Table 2 Applicable service scale

Service Metrics

Specifications

Peak rate of normal service requests

  • Specifications: WI-500. Referenced performance:
    • Throughput: 500 Mbit/s; QPS: 10,000
    • WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
  • Specifications: WI-100. Referenced performance:
    • Throughput: 100 Mbit/s; QPS: 2,000
    • WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain

Service bandwidth threshold (The origin server is deployed on the cloud.)

  • Specifications: WI-500. Referenced performance:
    • Throughput: 500 Mbit/s; QPS: 10,000
    • WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
  • Specifications: WI-100. Referenced performance:
    • Throughput: 100 Mbit/s; QPS: 2,000
    • WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain

Number of domain names

2,000 (Supports 2,000 top-level domain names)

Quantity of supported ports

  • Standard ports: Unlimited
  • Non-standard ports: Unlimited

Peak rate of CC attack protection

500,000 QPS

CC attack protection rules

100

Precise protection rules

100

Reference table rules

100

IP address blacklist and whitelist rules

100

Geolocation access control rules

100

Web tamper protection rules

100

Information leakage prevention rules

100

Global Protection Whitelist (Formerly False Alarm Masking)

1,000

Data masking rules

100

  • The number of domains is the total number of top-level domain names (for example, example.com), single domain names/subdomain names (for example, www.example.com), and wildcard domain names (for example, *.example.com).
  • If a domain name maps to different ports, each port is considered to represent a different domain name. For example, www.example.com:8080 and www.example.com:8081 are counted towards your quota as two distinct domain names.