Application Scenarios
Unified Security Management of Cloud Resources
- Internet border: The border between cloud assets and the Internet. It controls the inbound (from the Internet to the cloud) and outbound (from the cloud to the Internet) traffic.
- VPC border: The border between a VPC and an on-premises integrated data center (IDC), or between two VPCs. It controls internal service access.
External Intrusion Prevention
New attacks continue to emerge, and cybersecurity incidents occur frequently. With CFW, you can tally assets accessible from the Internet, enable intrusion detection and prevention in one click, and intelligently block intrusions and viruses.
Control Over Server Originated Traffic
Unauthorized outbound access from intranet servers may cause sensitive data leakage. CFW enables multi-dimensional access control based on domain names. It can block unauthorized outbound access based on refined policies, enhancing your asset security.
Inter-VPC Access Control (Available in Professional Edition)
Unauthorized intranet access can expand the scope of lateral movement attacks. CFW supports inter-VPC traffic access control to visualize and protect internal service access.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.