Help Center/ Cloud Firewall/ User Guide/ Access Control/ Configuring an Access Control Policy/ Example 1: Allowing the Inbound Traffic from a Specified IP Address
Updated on 2025-07-23 GMT+08:00

Example 1: Allowing the Inbound Traffic from a Specified IP Address

This section describes how to allow access traffic from a specified IP address in the inbound direction. For more parameter settings, see Configuring Protection Rules to Block or Allow Internet Border Traffic.

Allowing the Inbound Traffic from a Specified IP Address

Configure two protection rules. One of them blocks all traffic. Its priority is the lowest. The other allows the traffic of a specified IP address, and its priority is the highest. Configure other parameters as needed.

  • One of them blocks all traffic and has the lowest priority. Configure the following parameters and set the rest of the parameter as needed:
    Figure 1 Blocking all traffic


    Table 1 Blocking all traffic

    Parameter

    Example Value

    Description

    Direction

    Inbound

    Direction of the protected traffic.

    Source

    Any

    Origin of network traffic.

    Destination

    Any

    Receiver of network traffic.

    Service

    Any

    Protocol, source port, and destination port of network traffic.

    Application

    Any

    Protection policy for application layer protocols.

    Action

    Block

    Action taken when traffic passes through the firewall.

  • The other rule allows traffic from a specified IP address to pass through and has the highest priority. Configure the following parameters and set the rest of the parameter as needed:
    Figure 2 Allowing a specified IP address


    Table 2 Allowing a specified IP address

    Parameter

    Example Value

    Description

    Direction

    Inbound

    Direction of the protected traffic.

    Source

    IP Address

    192.168.0.0

    Origin of network traffic.

    Destination

    Any

    Receiver of network traffic.

    Service

    Any

    Protocol, source port, and destination port of network traffic.

    Application

    Any

    Protection policy for application layer protocols.

    Action

    Allow

    Action taken when traffic passes through the firewall.

Follow-up Operations

Checking protection outcomes

References