Overview
Cloud Firewall (CFW) provides traffic protection for cloud services at the Internet border, VPC border, and NAT gateway.
This section describes the configuration processes in different scenarios.
Internet Border Traffic Protection
Procedure |
Description |
Reference |
---|---|---|
Purchasing CFW |
Purchase a CFW instance in the region where you want to protect traffic. |
|
Enabling EIP protection |
Enable protection for one or more EIPs. CFW protects Internet border traffic by protecting EIPs. |
|
Configuring protection policies |
By default, CFW allows all traffic. You need to configure protection policies to protect traffic.
The following protection policies are provided:
|
Protection rules: Blacklist/Whitelist: Intrusion prevention: Antivirus: |
Checking logs |
View the traffic protection outcomes in logs. |
|
Example scenarios:
|
VPC Border Traffic Protection
Procedure |
Description |
Reference |
---|---|---|
Purchasing CFW |
Purchase a CFW instance in the region where you want to protect traffic. |
|
Enabling VPC protection |
Enable protection for two or more VPCs. CFW protects VPC border traffic by protecting the VPCs. |
|
Configuring protection policies |
By default, CFW allows all traffic. You need to configure protection policies to protect traffic.
The following protection policies are provided:
|
Protection rules: Blacklist/Whitelist: Intrusion prevention: Antivirus: |
Checking logs |
View the traffic protection outcomes in logs. |
|
Example scenarios: Configure CFW protection rules to control inter-VPC traffic. For details, see . |
NAT gateway traffic protection
Procedure |
Description |
Reference |
---|---|---|
Purchasing CFW |
Purchase a CFW instance in the region where you want to protect traffic. |
|
Enabling VPC (NAT) protection |
Enable protection for two or more VPCs. CFW protects the traffic of the NAT gateway by protecting the VPC where the NAT gateway resides. |
|
Configuring protection policies |
By default, CFW allows all traffic. You need to configure protection policies to protect traffic.
The following protection policies are provided:
|
Protection rules: Blacklist/Whitelist: Intrusion prevention: Antivirus: |
Checking logs |
View the traffic protection outcomes in logs. |
|
Example scenarios: Configure CFW protection rules to control NAT gateway traffic. For details, see |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.