Help Center/ Cloud Firewall/ Service Overview/ Application Scenarios
Updated on 2025-07-23 GMT+08:00

Application Scenarios

Unified Security Management of Cloud Resources

You can protect resources and check their traffic changes in a timely manner, securing cloud assets in diverse scenarios.
  • Internet border: The border between cloud assets and the Internet. It controls the inbound (from the Internet to the cloud) and outbound (from the cloud to the Internet) traffic.
  • VPC border: The border between a VPC and an on-premises integrated data center (IDC), or between two VPCs. It controls internal service access.

External Intrusion Prevention

New attacks continue to emerge, and cybersecurity incidents occur frequently. With CFW, you can tally assets accessible from the Internet, enable intrusion detection and prevention in one click, and intelligently block intrusions and viruses.

Control Over Server Originated Traffic

Unauthorized outbound access from intranet servers may cause sensitive data leakage. CFW enables multi-dimensional access control based on domain names. It can block unauthorized outbound access based on refined policies, enhancing your asset security.

Inter-VPC Access Control (Available in Professional Edition)

Unauthorized intranet access can expand the scope of lateral movement attacks. CFW supports inter-VPC traffic access control to visualize and protect internal service access.