Help Center/ Web Application Firewall/ FAQs/ Protection Rules/ What Is the Peak Rate of CC Attack Protection?
Updated on 2025-04-25 GMT+08:00

What Is the Peak Rate of CC Attack Protection?

It depends on the WAF edition you are using. For details, see Table 1.

Table 1 Peak rate of CC attack protection

Edition

Peak rate of normal service requests

Peak rate of CC attack protection

Standard

  • 2,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

100,000 QPS

Professional

  • Service requests: 5,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

200,000 QPS

Enterprise

  • Service requests: 10,000 QPS
  • WAF-to-Server connections: 6,000 per domain name

1,000,000QPS

Dedicated mode

NOTE:

Estimated performance metrics are based on tests. They may vary depending on your services. The real-world QPS is related to the request size and the type and quantity of protection rules you customize.

The following lists the specifications of a single instance.

  • Specifications: WI-500. Estimated performance:
    • HTTP services: 5,000 QPS (recommended)
    • HTTPS services: 4,000 QPS (recommended)
    • WebSocket service - Maximum concurrent connections: 5,000
    • Maximum WAF-to-server persistent connections: 60,000
  • Specifications: WI-100. Estimated performance:
    • HTTP services: 1,000 QPS (recommended)
    • HTTPS services: 800 QPS (recommended)
    • WebSocket service - Maximum concurrent connections: 1,000
    • Maximum WAF-to-server persistent connections: 60,000
  • Specifications: WI-500. Estimated performance:
    • HTTP services: 10,000 QPS (recommended)
    • HTTPS services: 8,000 QPS (recommended)
  • Specifications: WI-100. Estimated performance:
    • HTTP services: 2,000 QPS (recommended)
    • HTTPS services: 1600 QPS (recommended)