Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.

On this page

Show all

Help Center/ Web Application Firewall/ FAQs/ Protection Rules/ What Is the Peak Rate of CC Attack Protection?

What Is the Peak Rate of CC Attack Protection?

Updated on 2024-11-05 GMT+08:00

It depends on the WAF edition you are using. For details, see Table 1.

Table 1 Peak rate of CC attack protection

Edition

Peak rate of normal service requests

Peak rate of CC attack protection

Standard

  • 2,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

100,000QPS

Professional

  • Service requests: 5,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

200,000 QPS

Platinum

  • Service requests: 10,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

1,000,000QPS

Dedicated WAF

The following lists the specifications of a single instance.

  • Specifications: WI-500. Referenced performance:
    • HTTP services - Recommended QPS: 5,000. Maximum QPS: 10,000.
    • HTTPS services - Recommended QPS: 4,000. Maximum QPS: 8,000.
    • WebSocket service - Maximum concurrent connections: 5,000
    • Maximum WAF-to-server persistent connections: 60,000
  • Specifications: WI-100. Referenced performance:
    • HTTP services - Recommended QPS: 1,000. Maximum QPS: 2,000.
    • HTTPS services - Recommended QPS: 800. Maximum QPS: 1,600
    • WebSocket service - Maximum concurrent connections: 1,000
    • Maximum WAF-to-server persistent connections: 60,000
NOTICE:

Maximum QPS values are for reference only. They may vary depending on your businesses. The real-world QPS is related to the request size and the type and quantity of protection rules you customize.

  • Specifications: WI-500. Referenced performance:

    Maximum QPS: 20,000

  • Specifications: WI-100. Referenced performance:

    Maximum QPS: 4,000

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback