Item | Personal | Basic | Standard | Enterprise | |
Price | | 4.2 USD/month | 57 USD/month | 590 USD/month | Contact us for custom price |
Extra free quota | Traffic | 50 GB | 500 GB | 3 TB | On-demand |
| Requests | 3 million | 20 million | 50 million | On-demand |
| Connected sites | 1 | 1 | 1 | 10 Exclusive to the EdgeOne Enterprise |
| Connected sub-domains | 200/site | 300/site | 500/site | 1,000/site |
Basic services | Static content distribution | ✓ | ✓ | ✓ | ✓ |
| DDoS mitigation | ✓ | ✓ | ✓ | ✓ |
| (Support Client IP, region, Referer, User-Agent, ASN, URL control Type) | ✓ | ✓ | ✓ | ✓ |
| CC attack defense | ✓ | ✓ | ✓ | ✓ |
Value-added services | 1 VAU/10,000 requests | 1 VAU/10,000 requests | 1 VAU/10,000 requests | 1 VAU/10,000 requests | |
| 0.5 VAU/10,000 requests | 0.5 VAU/10,000 requests | 0.5 VAU/10,000 requests | 0.5 VAU/10,000 requests | |
| 1 VAU/million logs | 1 VAU/million logs | 1 VAU/million logs | 1 VAU/million logs | |
| ✕ | ✕ | 1 VAU/10,000 requests | 1 VAU/10,000 requests | |
Applied Security protection | IP group configuration | ✕ | ✕ | ✓ | ✓ |
| ✕ | ||||
| Custom rule - Precise access control configurations | ✕ | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) Request method (Method) Cookie Domain (Host) XFF extended headers Request header Path (Path) Request content type Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) Support regular expression matching method |
| Custom Rule - Precise Matching Strategy - Action | ✕ | Action Option: Observe Block | Action support options: Observe Allow Block IP blocking Redirect to URL Usage of custom responded content JavaScript challenge | Action support options: Observe Allow Block IP blocking Redirect to URL Usage of custom responded content JavaScript challenge |
| |||||
| Accurate rate limiting rule configurations option | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) Request method (Method) Cookie Request domain (Host) XFF extended headers Request header Request path (Path) Request content type Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint (subscription to Bot Management required) Supports regular expression method matching |
| Rate Limiting Rule - Statistics of Request Features | Statistics of request features support options: Client IP | Statistics of request features support options: Client IP Client IP (priority match XFF headers) | Statistics of request features support options: Client IP Client IP (priority match XFF headers) | Statistics of request features support options: Client IP Client IP (priority match XFF headers) Specified name of HTTP headers Specified name of Cookie Specified name of the URL Query parameter Request's JA3 fingerprint (subscribe to bot management) |
| Rate Limiting Rule - Action Duration | Minimum 1 second Maximum 120 seconds | Minimum 1 second Maximum 120 minutes | Minimum 1 second Maximum 48 hours | Minimum 1 second Maximum 30 days |
| Precise Rate Limiting Rules - Statistical Window Duration | 10 seconds | minimum 10 seconds maximum 1 hour | minimum 10 seconds maximum 1 hour | minimum 10 seconds maximum 1 hour |
| Accurate Rate Limiting Rule - Action | Action support option: Block
| Action support options: Observe Block JavaScript challenge
| Action support options: Observe Block JavaScript challenge Redirect to URL Usage custom responded content
| Action support options: Observe Block JavaScript challenge Redirect to URL Usage custom responded content |
| Custom page | ✕ | ✓ | ✓ | ✓ |
| Managed rules - Free vulnerability protection rule set | ✓ | ✓ | ✓ | ✓ |
| Managed rules - Basic protection rule set (Includes OWASP Top 10 Threat scenario protection rules) | ✕ | ✓ | ✓ | ✓ |
| Managed rules - Intelligent engine protection | ✕ | ✕ | ✓ | ✓ |
| ✕ | ✕ | ✓ | ✓ | |
| ✕ | ✕ | ✓ | ✓ | |
| ✕ | ✕ | ✕ | Need to subscribe to exclusive DDoS protection | |
| Policy Template | ✕ | ✕ | ✕ | |
| ✓ | ✓ | ✓ | ✓ | |
| ✓ | ✓ | ✓ | ✓ | |
| ✕ | ✕ | ✓ | ✓ | |
| ✕ | ✕ | ✕ | ✓ | |
L3/L4 network transmission layer security protection function | Automatic cleaning DDoS attack | ✓ | ✓ | ✓ | ✓ |
| Exclusive DDoS protection (For Web site) | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits |
| Exclusive DDoS protection (For L4 proxy) | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits |
| DDoS protection level | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection (for L4 proxy) |
| IP blocklist/allowlist | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection |
| Port filtering | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection |
| Protocol filtering | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection |
| Traffic features filtering | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection |
| DDoS attack event query | ✕ | ✕ | ✕ | Requires subscribing to exclusive DDoS protection |
| ✕ | ✕ | ✓ | ✓ | |
| Exclusive protection resources | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits |
| Custom DDoS rules configuration | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits |
L4 Proxy | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits | |
Site acceleration | ✓ | ✓ | ✓ | ✓ | |
| Maximum timeout period for WebSocket | 300 seconds | 300 seconds | 300 seconds | 300 seconds |
| 800 MB | 800 MB | Unlimited | Unlimited | |
| ✓ | ✓ | ✓ | ✓ | |
| ✓ | ✓ | ✓ | ✓ | |
| 20 | 50 | 100 | 200 | |
| Rule engine - number of nested IF rule | 3/rule | 5/rule | 10/rule | 20/rule |
| Rule engine - number of nested ELSE IF rule | 5 rules/IF statement | 5 rules/IF statement | 5 rules/IF statement | 5 rules/IF statement |
| 20/site | 50/site | 100/site | 100/site | |
| Limited-time free | Limited-time free | Limited-time free | Limited-time free | |
| ✕ | ✕ | ✕ | ✓ | |
| ✕ | ✕ | ✕ | ✓ | |
| Down to the second level | Down to the second level | Down to the second level | Down to the second level | |
| Down to the second level | Down to the second level | Down to the second level | Down to the second level | |
| Quota per request: 1,000 | Quota per request: 1,000 | Quota per request: 2,000 | Quota per request: 5,000 | |
| Cache purging (host/directory) | Quota per request: 100
Daily quota: 100 | Quota per request: 1,000 Daily quota: 1,000 | Quota per request: 1,000 Daily quota: 10,000 | Quota per request: 1,000 Daily quota: 20,000 |
| Cache purging (all) | Daily quota: 30 | Daily quota: 50 | Daily quota: 100 | Daily quota: 100 |
| Cache purging (Cache - tag) | ✕ | ✕ | ✕ | Quota per request: 100
Daily quota: 30,000 |
| Quota per request: 1,000 Daily quota: 5,000 | Quota per request: 1,000 Daily quota: 10,000 | Quota per request: 1,000 Daily quota: 50,000 | Quota per request: 5,000 Daily quota: 100,000 | |
Data and logs | Maximum query time range for data analysis | 31 days | 62 days | 92 days | 180 days |
| Filters for traffic analysis | Supports filtering by host, geolocation, network protocol, status code, TLS version, and IP version | Supports filtering by host, geolocation, network protocol, status code, TLS version, and IP version | Supports filtering by host, geolocation, network protocol, status code, TLS version, IP version, URL, Referer, resource type, device, browser, and OS | Supports filtering by host, geolocation, network protocol, status code, TLS version, IP version, URL, Referer, resource type, device, browser, and OS |
| Site security overview | ✓ | ✓ | ✓ | ✓ |
| Web security analysis | Query Security events within 1 days | Query Security events within 7 days | Query Security events within 30 days | Query Security events within 30 days |
| 2 task/log type | 2 task/log type | 3 tasks/log type | 5 tasks/log type | |
| ✓ | ✓ | ✓ | ✓ | |
| Web attack log | Query Security events within 1 days | Query Security events within 7 days | Query Security events within 30 days | Query Security events within 30 days |
Speed test tools | ✓ | ✓ | ✓ | ✓ | |
Edge functions | Free for a limited time | Free for a limited time | Free for a limited time | Free for a limited time |
Was this page helpful?