Plan | Suitable for | Price |
Free | Individual developers, non-profit/educational projects, and startup websites in technical validation phase - providing basic protection and static acceleration. | 0 USD/month Limited beta |
Personal | Small-scale blogs/forums/communities, wallpaper/file-sharing sites - offering fundamental security protection with dynamic/static acceleration. | 4.2 USD/month |
Basic | SME official websites, e-commerce platforms and login systems - delivering enhanced security with dynamic/static acceleration. | 57 USD/month |
Standard | Medium/large enterprises, gov/financial (security compliance), e-commerce/payment systems - providing advanced, reliable security and acceleration. | 590 USD/month |
Enterprise | Large enterprises, major e-commerce platforms, and online games - delivering customized, professional-grade security and acceleration services. |
Item | Free | Personal | Basic | Standard | Enterprise | |
Traffic | | Unlimited | 50 GB | 500 GB | 3 TB | On-demand |
Requests | | Unlimited | 3 million | 20 million | 50 million | On-demand |
Edge Function Request Count | | Edge function rule becomes invalid after exceeding 3 million times. | 3 million | 20 million | 50 million | On-demand |
Edge Function CPU Time | | Edge function rule becomes invalid after exceeding 3 million milliseconds. | 3 million milliseconds | 20 million milliseconds | 50 million milliseconds | On-demand |
Connected sites | | 1 | 1 | 1 | 1 | 10 Exclusive to the EdgeOne Enterprise |
Connected sub-domains | | 200/site | 200/site | 300/site | 500/site | 1,000/site |
Item | Free | Personal | Basic | Standard | Enterprise | |
SLA | | ✕ | ✓ | ✓ | ✓ | ✓ |
Static content distribution | | ✓ | ✓ | ✓ | ✓ | ✓ |
| ✓ | ✓ | ✓ | ✓ | ✓ | |
Access Control (Support Client IP, region, Referer, User-Agent, ASN, URL control Type) | | ✓ | ✓ | ✓ | ✓ | ✓ |
Free Vulnerability Protection Ruleset | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| ✓ | ✓ | ✓ | ✓ | ✓ | |
Item | Free | Personal | Basic | Standard | Enterprise | |
| ✕ | 100 VAU/million requests | 100 VAU/million requests | 100 VAU/million requests | 100 VAU/million requests | |
| ✕ | 100 VAU/million requests | 100 VAU/million requests | 100 VAU/million requests | 100 VAU/million requests | |
| ✕ | ✕ | ✕ | 100 VAU/million requests | 100 VAU/million requests | |
| ✕ | ✓ | ✓ | ✓ | ✓ | |
| ✕ | ✓ | ✓ | ✓ | ✓ | |
| ✕ | ✕ | ✕ | ✕ | 0.57 USD/GB | |
| ✕ | ✕ | ✕ | ✕ | ✓ | |
| ✓(Excessive termination) | ✓(overuse payment) | ✓(overuse payment) | ✓(overuse payment) | ✓(overuse payment) | |
Item | Free | Personal | Basic | Standard | Enterprise | ||
Static content distribution | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | Pay-as-you-go | Pay-as-you-go | Pay-as-you-go | Pay-as-you-go | |
Cache Configuration | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Ignore all query string | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | Ignore case | ✓ | ✓ | ✓ | ✓ | ✓ |
| | Cookie | ✕ | ✓ | ✓ | ✓ | ✓ |
| | HTTP header | ✕ | ✓ | ✓ | ✓ | ✓ |
| | Request protocol | ✕ | ✓ | ✓ | ✓ | ✓ |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
File Optimization | | ✓ | ✓ | ✓ | ✓ | ✓ | |
Media processing | | ✕ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | ✓ | ✓ | ✓ | ✓ | |
Cache purging (URL) | Quota per request | 500 | 1,000 | 1,000 | 2,000 | 5,000 | |
| Cache purging (host/directory) | Quota per request | 50 | 100 | 1,000 | 1,000 | 1,000 |
| | Daily quota | 50 | 100 | 1,000 | 10,000 | 20,000 |
| Cache purging (Cache - tag) | Quota per request | ✕ | ✕ | ✕ | ✕ | 50 |
| | Daily quota | | | | | 15,000 |
| Cache purging (all) | Daily quota | 10 | 30 | 50 | 100 | 100 |
| Quota per request | ✕ | 1,000 | 1,000 | 1,000 | 5,000 | |
| | Daily quota | ✕ | 5,000 | 10,000 | 50,000 | 100,000 |
HTTPS Configuration | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| HSTS (HTTP Strict Transport Security) | | ✓ | ✓ | ✓ | ✓ | ✓ |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
Network Optimization | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | Pay-as-you-go | Pay-as-you-go | Pay-as-you-go | Pay-as-you-go | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| WebSocket Maximum timeout | | 300 seconds | 300 seconds | 300 seconds | 300 seconds | 300 seconds |
| | 800 MB | 800 MB | 800 MB | Unlimited | Unlimited | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | Pay-as-you-go | |
Modifying HTTP Headers | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
Origin-pull configuration | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
URL Rewrite | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
Modify the response content | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
Configurable number of rules | | 20 | 20 | 50 | 100 | 200 | |
| Number of nested IF rules | | 3/rule | 3/rule | 5/rule | 10/rule | 20/rule |
| Number of nested ELSE IF rules | | 5 rules/IF statement | 5 rules/IF statement | 5 rules/IF statement | 5 rules/IF statement | 5 rules/IF statement |
Configurable number of groups | | 5/site | 20/site | 50/site | 100/site | 100/site | |
| | ✕ | | | | ||
Usage Policy | | ✕ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | 5 rules/site | |
Tools | | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✓ | ✓ | ✓ | ✓ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | ✓ | |
| | ✕ | ✕ | ✕ | ✕ | ✓ | |
| | ✓(Excessive termination) | ✓(overuse payment) | ✓(overuse payment) | ✓(overuse payment) | ✓(overuse payment) | |
Item | Free | Personal | Basic | Standard | Enterprise | |
| ✕ | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits | |
Item | Free | Personal | Basic | Standard | Enterprise | |
Skip full request | ✕ | ✓ | ✓ | ✓ | ✓ | |
| Skip partial request | ✕ | ✕ | ✕ | ✕ | ✓ |
| Match Condition | ✕ | The matching field supports the following options: Client IP Request URL | The matching field supports the following options: Client IP User-Agent Request URL Request sources (Referer) | The matching field supports the following options: Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Request content type Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) | The matching field supports the following options: Request domain name (Host) Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Session Cookie XFF Header Request Header Request content type (Accept) Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) Supports regular expression method matching |
Basic access control-Configurable quota | Unlimited | Unlimited | Unlimited | Unlimited | ||
| Basic access control-Control field | Support Client IP, Region, Referer, User-Agent, ASN, URL. | | | | |
| Monitor,Block | Monitor,Block | Monitor,Block | Monitor,Block | Monitor,Block,Allow | |
| Precise access control-quota | ✕ | ✕ | |||
| Precise access control-Match Condition | ✕ | ✕ | The matching field supports the following options: Request domain name (Host) Client IP Request method User-Agent Request path Request URL Request sources (Referer) | The matching field supports the following options: Request domain name (Host) Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Request content type (Accept) Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) | The matching field supports the following options: Request domain name (Host) Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Session Cookie XFF Header Request Header Request content type (Accept) Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) Supports regular expression method matching |
| Precise access control-Action | ✕ | ✕ | The Action supports the following options: Monitor Block JavaScript Challenge | The Action supports the following options: Monitor Block IP Blocking Redirect to URL Use custom response content JavaScript Challenge | The Action supports the following options: Monitor Allow Block IP Blocking Redirect to URL Use custom response content JavaScript Challenge |
Adaptive frequency control | ✓ | ✓ | ✓ | ✓ | ✓ | |
| ✓ | ✓ | ✓ | ✓ | ✓ | |
| Client filtering | ✕ | ✕ | ✕ | ✓ | ✓ |
| Slow attack defense | ✕ | ✕ | ✕ | ✕ | ✓ |
Configurable quota | ||||||
| The matching field supports the following options: Request domain name (Host) Request path Request URL | The matching field supports the following options: Request domain name (Host) Request path Request URL | The matching field supports the following options: Request domain name (Host) Client IP Request method User-Agent Request path Request URL Request sources (Referer) | The matching field supports the following options: Request domain name (Host) Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Request content type (Accept) Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) | The matching field supports the following options: Request domain name (Host) Client IP Real Client IP Request method User-Agent Request path Request URL Request sources (Referer) Session Cookie XFF Header Request Header Request content type (Accept) Network layer protocol (IPv4/IPv6) Application layer protocol (HTTP/HTTPS) JA3 fingerprint(subscription to Bot Management required) Supports regular expression method matching | |
| Statistics request feature | Statistics request feature supports options: Client IP | Statistics request feature supports options: Client IP | Statistics request feature supports options: Client IP Real Client IP | Statistics request feature supports options: Client IP Real Client IP | Statistics request feature supports options: Client IP Real Client IP Request's path HTTP header of specified name Cookie of specified name Cookie of specified name JA3 fingerprint(subscription to Bot Management required) |
| Maximum statistics duration | 10 seconds | 10 seconds | 1 hour | 1 hour | 1 hour |
| Maximum Action duration | 120 seconds | 120 seconds | 120 minutes | 48 hours | 30 days |
| The Action supports the following options: Block | The Action supports the following options: Block | The Action supports the following options: Monitor Block JavaScript Challenge | The Action supports the following options: Monitor Block JavaScript Challenge Redirect to URL Use custom response content | The Action supports the following options: Monitor Block JavaScript Challenge Redirect to URL Use custom response content | |
| ✕ | ✕ | ✕ | Pay-as-you-go | Pay-as-you-go | |
Evaluation Mode | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Free Vulnerability Protection Ruleset | ✓ | ✓ | ✓ | ✓ | ✓ |
| Basic protection rule set (including OWASP Top 10 threat scenario protection rules) | ✕ | ✕ | ✓ | ✓ | ✓ |
| Deep analysis | ✕ | ✕ | ✕ | ✓ | ✓ |
Interception page with Managed rules | ✕ | ✕ | ✓ | ✓ | ✓ | |
| Interception page with Web Security (except for Managed rules) | ✕ | | | | |
General Settings | ✕ | ✕ | ✕ | 100 groups/main accounts can be configured | 100 groups/main accounts can be configured | |
| ✕ | ✕ | ✕ | ✕ | ||
Request body scan length limit | | Scan only the first 10 KB | Scan only the first 10 KB | Scan only the first 10 KB | Scan only the first 10 KB | |
| ✕ | ✓ | ✓ | ✓ | ✓ | |
(Coming offline soon) | Web security monitoring rules | ✕ | ✕ | ✕ | ✓ | ✓ |
| DDoS alarms | ✕ | ✕ | ✕ | ✕ | Subscribe to Exclusive DDoS protection |
Item | Free | Personal | Basic | Standard | Enterprise | ||
Platform default DDoS protection | | | Automated scrubbing protects against attack traffic exceeding 100 Mbps | | | | |
Subscription required | Applicable to Website | | ✕ | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits |
| | | | | | | |
| Applicable to L4 proxy | | ✕ | ✕ | ✕ | ✕ | |
| | ✕ | ✕ | ✕ | ✕ | Enterprise exclusive purchase benefits(Applicable to L4 proxy) | |
| | ✕ | ✕ | ✕ | ✕ | | |
| | ✕ | ✕ | ✕ | ✕ | | |
| ✕ | ✕ | ✕ | ✕ | ✕ | | |
| | ✕ | ✕ | ✕ | ✕ | | |
| | ✕ | ✕ | ✕ | ✕ | | |
| | ✕ | ✕ | ✕ | ✕ | | |
Item | Free | Personal | Basic | Standard | Enterprise | |
14 days | 31 days | 62 days | 92 days | 180 days | ||
1 days | 1 days | 7 days | 30 days | 30 days | ||
Log Services | Real-time Logs Push | 1 task/log types | 2 task/log types | 2 task/log types | 3 task/log types | 5 task/log types |
| ✕ | Maximum storage time: 31 days | Maximum storage time: 31 days | Maximum storage time: 183 days | Maximum storage time: 183 days | |
| ✕ | ✕ | ✕ | Feature in beta test, if needed | | |
| ✕ | ✕ | ✕ | ✓ | ✓ | |
Alarm Service | ✕ | ✕ | ✕ | ✓ | ✓ | |
Feedback