Updated on 2025-11-14 GMT+08:00

Editions

You can check the regions where each CFW edition is available on the console.

Table 1 Editions

Function

Standard

Professional

Application scenario

Suitable for SMEs that need to defend against network intrusions and server compromises, or need to obtain Multi-Layer Protection Scheme (MLPS) certification.

Suitable for large and medium-sized enterprises that need to defend against network intrusions and server compromises, control internal network security, obtain MLPS certification, or have key event assurance requirements.

Protection capacity

Protected EIPs at Internet border

20 (scalable)

50 (scalable)

Protected VPCs

-

2 (scalable)

Peak Protection Traffic at Internet Border

10 Mbit/s (scalable)

50 Mbit/s (scalable)

Peak Protection Traffic at VPC Border

-

200 Mbit/s (can be increased with the number of VPCs)

Access traffic control

ACL access control for public network assets (based on IP addresses, domain names, domain groups, and geographical locations)

Supported

Supported

North-south traffic protection and cloud resource (such as EIP) protection against risks on the Internet

Supported

Supported

North-south traffic audit and log query

Supported

Supported

East-west traffic protection, asset protection between VPCs, and full traffic analysis

-

Supported

East-west traffic monitoring to obtain inter-VPC traffic data in real time

-

Supported

Protection policies

Intrusion prevention system (IPS)

Supported

Supported

Custom IPS signature database

-

Supported

Virtual patch

Supported

Supported

Sensitive directories and reverse shells

Supported

Supported

Antivirus

-

Supported