Cloud Firewall
Cloud Firewall (CFW) is a next-generation cloud-native firewall. It protects Internet and VPC borders on the cloud by real-time intrusion detection and prevention, global unified access control, and full traffic analysis.
Progressive Knowledge
ECS knowledge for users from beginner level to expert level
01
![](https://support.huaweicloud.com/eu/cfw/files/6408a53924b4fe2ce61efbe2e6090785.jpg)
Understand
Learn what is CFW, its features and editions, and when you will need them.
Service Overview
03
![](https://support.huaweicloud.com/eu/cfw/files/6408a53924b4fe2ce61efbe2e6090785.jpg)
Start
After creating an ECS, you can log in to it and initialize data disks in multiple ways to start your ECS.
Enabling Protection
Configuring a Protection Policy
05
![](https://support.huaweicloud.com/eu/cfw/files/6408a53924b4fe2ce61efbe2e6090785.jpg)
Deploy
Use CFW to routinely check and handle security risks, protecting your cloud border.
Best Practices About Security Configurations
02
![](https://support.huaweicloud.com/eu/cfw/files/6408a53924b4fe2ce61efbe2e6090785.jpg)
Purchase
Learn how to choose, purchase HSS editions and how much you will be charged.
Specifications
How to Buy
04
![](https://support.huaweicloud.com/eu/cfw/files/6408a53924b4fe2ce61efbe2e6090785.jpg)
Be a Power User
You can configure intrusion prevention policies, the blacklist, and the whitelist, and increase quota to protect more EIPs. You can also adjust protection policies based on real-time protection logs and event statistics.
Common Operations
FAQs
Learn more about common issues and solutions.
Typical Cases
-
Can CFW Be Used Across Clouds or Regions
-
Can CFW Protect Servers Off the Cloud?
-
What Are the Differences Between CFW and WAF?
-
Can I Share My CFW with Other Accounts?
-
Do I Need to Increase My Bandwidth If the Rate of a Flow Exceeds the Threshold?
-
What Details Can I Get from Log Audit?
-
How Does CFW Detect and Defend Against Attacks Exploiting the Apache Log4j Remote Code Execution Vulnerability?
About CFWs
About Functions
Troubleshooting
-
Why Are Traffic and Attack Logs Incomplete on the Traffic Analysis Page?
-
(Apache Log4j)How Does CFW Detect and Defend Against Attacks Exploiting the Apache Log4j Remote Code Execution Vulnerability?
-
(Spring Framework )How Does CFW Detect and Defend Against Attacks Exploiting the Spring Framework Remote Code Execution Vulnerability?
Technical Topics
Technologies, expert opinions, and courses