Help Center> Web Application Firewall> FAQs> Service Request/Specification> WAF Instance Specifications Change> What Are the Impacts When QPS Exceeds the Allowed Peak Rate?
Updated on 2024-02-01 GMT+08:00

What Are the Impacts When QPS Exceeds the Allowed Peak Rate?

If the QPS specifications you select cannot handle the daily peak traffic of protected website or application services, WAF stops protecting your website. This will cause traffic limiting, random packet loss, automatic bypassing of WAF. As a result, your services may become unavailable, frozen, or respond very slowly for a certain period of time.

Table 1 lists the QPS specifications supported by each WAF edition.

Table 1 QPS specifications supported by WAF

Edition

Peak Rate of Normal Service Requests

Peak Rate of CC Attack Defense

Standard

2,000 QPS

100,000 QPS

Professional

5,000 QPS

200,000QPS

Platinum

10,000 QPS

1,000,000 QPS

Dedicated mode

The following lists the specifications of a single instance.

  • Specifications: WI-500. Referenced performance:
    • HTTP services - Recommended QPS: 5,000. Maximum QPS: 10,000.
    • HTTPS services - Recommended QPS: 4,000. Maximum QPS: 8,000.
    • WebSocket service - Maximum concurrent connections: 5,000
    • Maximum WAF-to-server persistent connections: 60,000
  • Specifications: WI-100. Referenced performance:
    • HTTP services - Recommended QPS: 1,000. Maximum QPS: 2,000.
    • HTTPS services - Recommended QPS: 800. Maximum QPS: 1,600
    • WebSocket service - Maximum concurrent connections: 1,000
    • Maximum WAF-to-server persistent connections: 60,000
  • Specifications: WI-500. Referenced performance:

    Maximum QPS: 20,000

  • Specifications: WI-100. Referenced performance:

    Maximum QPS: 4,000

For details, see Edition Differences.

WAF Instance Specifications Change FAQs

more