Service Edition Differences
Currently, EdgeSec provides the enterprise edition. For details, see Version Description and Functions and Features Supported by Each Version.
Description
Table 1 describes each version of EdgeSec.
Service Scale |
Enterprise Edition |
---|---|
Number of domain names |
20 |
CC attack prevention rules |
100 |
Precise protection rules |
100 |
Reference table rules |
100 |
IP address blacklist and whitelist rules |
1,000 |
Geolocation access control rules |
100 |
Web tamper protection rules |
100 |
Information leakage prevention rules |
100 |
Global protection whitelist rules |
1,000 |
Data masking rules |
100 |
Functions Supported by Each Edition
Table 2 lists the security features applicable to each version.
Description:
- √: The function is included in the current edition.
- x: The function is not included in the current edition.
Function Template |
Enterprise Edition |
---|---|
Domain expansion package |
√ |
Adding wildcard domain names |
√ |
Flexibly configuring defense policies in a batch |
√ |
Batch adding domain names to a policy |
√ |
Protection against common web attacks, such as SQL injections, XSS, remote overflow vulnerabilities, file inclusions, Bash vulnerabilities, remote command execution, directory traversal, sensitive file access, and command/code injections |
√ |
Updating protection rules against zero-day vulnerabilities to the latest on the cloud and delivering virtual patches in a timely manner |
√ |
Web shell detection |
√ |
Deep anti-evasion inspection to identify and block evasion attacks, such as the ones that use homomorphic character obfuscation, command injection with deformed wildcard characters, UTF7, data URI scheme, and other techniques |
√ |
Inspection of all header fields in the requests |
√ |
CC attack prevention |
√ |
Precise protection |
√ |
Reference table management |
√ |
IP address whitelist and blacklist and batch importing of IP addresses/IP address ranges |
√ |
Allowing or blocking web requests based on the countries that the requests originate from. |
√ |
Identification and blocking of crawler behavior such as search engines, scanners, script tools, and other crawlers |
√ |
JavaScript-based anti-crawler protection |
√ |
Information leakage prevention rules |
√ |
Global protection whitelist rules |
√ |
Data masking |
√ |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot