WAF is deployed in dedicated mode. The following tables describe specifications and functions of the dedicated WAF instances.
Dedicated Mode
Table 1 describes dedicated WAF instances.
Table 1 Dedicated mode descriptionItem
|
Description
|
Deployment mode
|
Dedicated WAF instances
|
Application scenarios
|
Service servers are deployed on the cloud.
Suitable for large enterprise websites that have a large service scale and have customized security requirements.
|
Protection objects
|
Domain names or IP addresses
|
Advantages
|
- Enable cloud and on-premises deployment.
- Enable exclusive use of WAF instance.
- Meet requirements for protection against large-scale traffic attacks.
- Deploy dedicated WAF instances in a VPC to reduce network latency.
|
Service Scale
For more details, see Table 2.
Table 2 Applicable service scaleService Metrics
|
Specifications
|
Peak rate of normal service requests
|
- Specifications: WI-500. Referenced performance:
- Throughput: 500 Mbit/s; QPS: 10,000
- WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
- Specifications: WI-100. Referenced performance:
- Throughput: 100 Mbit/s; QPS: 2,000
- WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
|
Service bandwidth threshold (The origin server is deployed on the cloud.)
|
- Specifications: WI-500. Referenced performance:
- Throughput: 500 Mbit/s; QPS: 10,000
- WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
- Specifications: WI-100. Referenced performance:
- Throughput: 100 Mbit/s; QPS: 2,000
- WAF-to-Server connections supported: 60,000 per instance or 5,000 per domain
|
Number of domain names
|
2,000 (Supports 2,000 top-level domain names)
|
Quantity of supported ports
|
- Standard ports: Unlimited
- Non-standard ports: Unlimited
|
Peak rate of CC attack protection
|
500,000 QPS
|
CC attack protection rules
|
100
|
Precise protection rules
|
100
|
Reference table rules
|
100
|
IP address blacklist and whitelist rules
|
100
|
Geolocation access control rules
|
100
|
Web tamper protection rules
|
100
|
Information leakage prevention rules
|
100
|
Global Protection Whitelist (Formerly False Alarm Masking)
|
1,000
|
Data masking rules
|
100
|
- The number of domains is the total number of top-level domain names (for example, example.com), single domain names/subdomain names (for example, www.example.com), and wildcard domain names (for example, *.example.com).
- If a domain name maps to different ports, each port is considered to represent a different domain name. For example, www.example.com:8080 and www.example.com:8081 are counted towards your quota as two distinct domain names.