All Products
Search
Document Center

Web Application Firewall:Plans and versions

Last Updated:Jan 23, 2026

Web Application Firewall (WAF) supports the subscription billing method. This topic describes the applicable business scales and protection features of the subscription billing method.

WAF plans and versions

For the subscription billing method, WAF provides an on-cloud deployment plan (On-cloud WAF) and a hybrid cloud deployment plan (Hybrid Cloud WAF). Based on the supported business scale and protection features, On-cloud WAF instances are available in Pro, Business, Enterprise, and Exclusive (sales suspended) editions. Hybrid Cloud WAF instances are available only in the Exclusive edition.

Applicable business scales

The following table describes the applicable business scales for different WAF editions. For medium-sized enterprise websites, you can select the Business or Enterprise edition.

Specification

On-cloud WAF Pro

On-cloud WAF Business

On-cloud WAF Enterprise

On-cloud WAF Exclusive (sales suspended)

Hybrid Cloud WAF Exclusive

Site scale

Small and medium-sized websites that have no special security requirements.

Medium-sized enterprise websites or services that are open to the public on the Internet, focus on data security, and have high security requirements.

Medium and large-sized enterprise websites that have a large business scale or have special custom security requirements.

Large-sized enterprise websites that have a large business scale and require custom configurations based on business features.

Medium and large-sized enterprise websites that have on-premises services and web traffic that cannot be protected by On-cloud WAF. These websites require the same high-standard web security protection as On-cloud WAF.

Peak concurrent requests for On-cloud WAF

2,000 QPS

5,000 QPS

Over 10,000 QPS

5,000 QPS

0 QPS. This is extendable.

Number of on-premises cluster nodes and the corresponding peak concurrent requests

Not supported

Supported for a fee

Supported for a fee

Supported for a fee

2 protection nodes, 10,000 QPS.

Service bandwidth threshold (origin server deployed on Alibaba Cloud)

50 Mbps

100 Mbps

200 Mbps

100 Mbps

0 Mbps. This is extendable.

Service bandwidth threshold (origin server not deployed on Alibaba Cloud)

10 Mbps

30 Mbps

50 Mbps

30 Mbps

Default number of protected root domain names

1

1

1

1,000

200 (regardless of domain name level). You can add 100 for each additional node.

Default total number of protected domain names (wildcard domain names are supported)

10

10

10

1,000

Feature list by version (the Chinese mainland)

The following table describes the features supported by different editions of WAF instances in the Chinese mainland (subscription instances for which you select the Chinese mainland region).

Legend:

  • 支持

  • 不支持

  • 增值服务

Feature Module

Description

On-cloud WAF Pro

On-cloud WAF Business

On-cloud WAF Enterprise

On-cloud WAF Exclusive (sales suspended)

Hybrid Cloud WAF Exclusive

Service access

HTTPS security protection

Provides one-click, site-wide HTTPS protection.

支持

支持

支持

支持

支持

Asset discovery

Proactively discovers and manages site assets. Supports one-click protection.

支持

支持

支持

支持

支持

Transparent proxy mode

Directly forwards service traffic from origin servers (SLB instances and ECS instances) to WAF for protection.

支持

支持

支持

支持

不支持

HTTP/2 security protection

Protects websites that use HTTP/2.

不支持

支持

支持

支持

支持

Non-standard port protection

Protects services on specific non-standard ports other than 80, 8080, 443, and 8443.

不支持

支持

支持

支持

支持

IPv6 protection

Detects and protects against IPv6-based requests.

不支持

支持

支持

支持

支持

Exclusive cluster

Provides custom access and protection capabilities based on business features.

不支持

不支持

不支持

支持

支持

On-premises protection cluster deployment

Deploys a WAF protection cluster in an on-premises data center to protect web traffic that does not pass through Alibaba Cloud.

不支持

增值服务

增值服务

增值服务

支持

Intelligent load balancing

Uses multi-node intelligent access technology to implement automatic scheduling and disaster recovery for origin servers across multiple nodes and lines.

增值服务

增值服务

增值服务

增值服务

增值服务

Exclusive Resource Plan for Domain Names

Lets you enable exclusive IP address protection for a domain name.

增值服务

增值服务

增值服务

增值服务

增值服务

Website protection

Protection Rules Engine

Defends against common web attacks, such as SQL injection and XSS.

支持

支持

支持

支持

支持

Automatically updates protection rules against web 0-day vulnerabilities.

支持

支持

支持

支持

支持

Website tamper-proofing

Locks website pages to prevent malicious tampering.

支持

支持

支持

支持

支持

Data leakage prevention

Prevents sensitive data leakage, including important private data such as phone numbers, ID card numbers, and bank card numbers.

支持

支持

支持

支持

支持

CC attack protection

Defends against common CC attacks. Supports built-in protection and emergency mode.

支持

支持

支持

支持

支持

Account security

Detects dictionary attacks, brute-force attacks, spam registrations, weak password sniffing, and bot traffic on CAPTCHA interfaces for services related to accounts, such as registration and logon.

支持

支持

支持

支持

支持

IP blacklist

Provides one-click blocking of access from specific IP addresses and CIDR blocks.

支持

支持

支持

支持

支持

Includes the preceding feature and provides one-click blocking of access from IP addresses in specified geographic locations.

不支持

支持

支持

支持

支持

Scan protection

Supports high-frequency web attack blocking (default rule), directory traversal blocking (default rule), scan tool blocking, and collaborative defense.

支持

支持

支持

支持

支持

Includes the preceding features and lets you customize rules for high-frequency web attack blocking and directory traversal blocking.

不支持

支持

支持

支持

支持

Custom mitigation policies

Basic precise access control: Provides ACL-based access control based on basic fields, including IP, URL, Referer, User-Agent, and Params.

支持

支持

支持

支持

支持

Advanced precise access control: Includes basic fields and supports advanced fields, such as Cookie, Content-Type, Header, and Http-Method.

不支持

支持

支持

支持

支持

Supports rate limiting (custom CC attack protection rules). You can define rate limiting conditions based on precise match conditions to accurately filter abnormal requests. Lets you set rate limiting policies based on the number of requests from an IP address or session.

不支持

支持

支持

支持

支持

Supports rate limiting. Lets you set rate limiting policies based on the number of requests from custom fields, including IP and Session.

不支持

不支持

支持

支持

支持

DDoS attack prevention

Provides free DDoS attack prevention. For more information about the mitigation capabilities, see thresholds that trigger blackhole filtering in Anti-DDoS Basic.

支持

支持

支持

支持

不支持

Custom protection rule groups

Supports custom protection rule groups.

不支持

支持

支持

支持

支持

Proactive defense

Provides proactive defense capabilities based on deep learning of website traffic.

不支持

不支持

支持

支持

支持

Data risk control

Defends against bot-driven fraudulent activities on key services of your website, such as registration, logon, campaigns, and forums.

增值服务

增值服务

增值服务

增值服务

不支持

Legitimate bots

Provides a whitelist of legitimate search engine bots to allow their access requests to your domain name.

增值服务

增值服务

增值服务

增值服务

增值服务

Bot threat intelligence

Provides bot threat intelligence rules from multiple dimensions, such as dial-up IP pools, data center IP addresses, malicious scan tool IP addresses, and a malicious bot library generated by a real-time cloud model. This helps you block access requests from malicious bots to an entire domain name or a specific path.

增值服务

增值服务

增值服务

增值服务

增值服务

App protection

Provides security protection for native apps, such as trusted communication and bot traffic prevention. It can effectively detect requests from proxies, emulators, and illegally signed apps.

增值服务

增值服务

增值服务

增值服务

增值服务

Security analytics and support

Alerting settings

Lets you configure WAF event monitoring and threshold-based monitoring rules using CloudMonitor.

支持

支持

支持

支持

支持

Simple Log Service

Collects all WAF logs and stores them in Simple Log Service. Provides features such as near real-time query and analysis and online report display.

增值服务

增值服务

增值服务

增值服务

增值服务

Feature list by version (outside the Chinese mainland)

The following table describes the features supported by different editions of WAF instances outside the Chinese mainland (subscription instances for which you select a region outside the Chinese mainland).

Legend:

  • 支持

  • 不支持

  • 增值服务

Features

Description

On-cloud WAF Pro

On-cloud WAF Business

On-cloud WAF Enterprise

On-cloud WAF Exclusive (sales suspended)

Hybrid Cloud WAF Exclusive

Service access

HTTPS security protection

Provides one-click, site-wide HTTPS protection.

支持

支持

支持

支持

支持

Transparent proxy mode

Directly forwards service traffic from origin servers (SLB instances and ECS instances) to WAF for protection.

支持

支持

支持

支持

不支持

HTTP/2 security protection

Protects websites that use HTTP/2.

不支持

支持

支持

支持

支持

Non-standard port protection

Protects services on specific non-standard ports other than 80, 8080, 443, and 8443.

不支持

支持

支持

支持

支持

Exclusive cluster

Provides custom access and protection capabilities based on business features.

不支持

不支持

不支持

支持

支持

IPv6 protection

Detects and protects against IPv6-based requests.

不支持

不支持

不支持

不支持

支持

Intelligent load balancing

Uses multi-node intelligent access technology to implement automatic scheduling and disaster recovery for origin servers across multiple nodes and lines.

不支持

增值服务

增值服务

增值服务

增值服务

On-premises protection cluster deployment

Deploys a WAF protection cluster in an on-premises data center to protect web traffic that does not pass through Alibaba Cloud.

不支持

增值服务

增值服务

增值服务

支持

Dedicated resource plan for Domain Names

Lets you enable exclusive IP address protection for a domain name.

增值服务

增值服务

增值服务

增值服务

增值服务

Website protection

Account security

Detects dictionary attacks, brute-force attacks, spam registrations, weak password sniffing, and bot traffic on CAPTCHA interfaces for services related to accounts, such as registration and logon.

支持

支持

支持

支持

支持

Protection Rules Engine

Defends against common web attacks, such as SQL injection and XSS.

支持

支持

支持

支持

支持

Automatically updates protection rules against web 0-day vulnerabilities.

支持

支持

支持

支持

支持

CC attack protection

Defends against common CC attacks. Supports built-in protection and emergency mode.

支持

支持

支持

支持

支持

IP blacklist

Provides one-click blocking of access from specific IP addresses and CIDR blocks.

支持

支持

支持

支持

支持

Includes the preceding feature and provides one-click blocking of access from IP addresses in specified geographic locations.

不支持

支持

支持

支持

支持

Scan protection

Supports high-frequency web attack blocking (default rule), directory traversal blocking (default rule), scan tool blocking, and collaborative defense.

支持

支持

支持

支持

支持

Includes the preceding features and lets you customize rules for high-frequency web attack blocking and directory traversal blocking.

不支持

支持

支持

支持

支持

Custom mitigation policies

Basic precise access control: Provides ACL-based access control based on basic fields, including IP, URL, Referer, User-Agent, and Params.

支持

支持

支持

支持

支持

Advanced precise access control: Includes basic fields and supports advanced fields, such as Cookie, Content-Type, Header, and Http-Method.

不支持

支持

支持

支持

支持

Supports rate limiting (custom CC attack protection rules). You can define rate limiting conditions based on precise match conditions to accurately filter abnormal requests. Lets you set rate limiting policies based on the number of requests from an IP address or session.

不支持

支持

支持

支持

支持

Supports rate limiting. Lets you set rate limiting policies based on the number of requests from custom fields, including IP and Session.

不支持

不支持

支持

支持

支持

Website tamper-proofing

Locks website pages to prevent malicious tampering.

不支持

支持

支持

支持

支持

Data leakage prevention

Prevents sensitive data leakage, including important private data such as phone numbers, ID card numbers, and bank card numbers.

不支持

支持

支持

支持

支持

Custom protection rule groups

Supports custom protection rule groups.

不支持

不支持

支持

支持

支持

Proactive defense

Provides proactive defense capabilities based on deep learning of website traffic.

不支持

不支持

支持

支持

不支持

Data risk control

Defends against bot-driven fraudulent activities on key services of your website, such as registration, logon, campaigns, and forums.

不支持

不支持

不支持

不支持

不支持

DDoS attack prevention

Provides free DDoS attack prevention. For more information about the mitigation capabilities, see thresholds that trigger blackhole filtering in Anti-DDoS Basic.

不支持

不支持

不支持

不支持

不支持

Legitimate bots

Provides a whitelist of legitimate search engine bots to allow their access requests to your domain name.

增值服务

增值服务

增值服务

增值服务

增值服务

Bot threat intelligence

Provides bot threat intelligence rules from multiple dimensions, such as dial-up IP pools, data center IP addresses, malicious scan tool IP addresses, and a malicious bot library generated by a real-time cloud model. This helps you block access requests from malicious bots to an entire domain name or a specific path.

增值服务

增值服务

增值服务

增值服务

增值服务

App protection

Provides security protection for native apps, such as trusted communication and bot traffic prevention. It can effectively detect requests from proxies, emulators, and illegally signed apps.

增值服务

增值服务

增值服务

增值服务

增值服务

Security analytics and support

Alerting settings

Lets you configure WAF event monitoring and threshold-based monitoring rules using CloudMonitor.

支持

支持

支持

支持

支持

Simple Log Service

Collects all WAF logs and stores them in Simple Log Service. Provides features such as near real-time query and analysis and online report display.

增值服务

增值服务

增值服务

增值服务

增值服务