Configuring Access Policies for IP Address Groups and Service Groups
After a protected object is connected to CFW, you can configure access control policies for IP address groups and service groups, and verify the effect of the policies. This section uses the configuration of IP address and service groups as an example to describe how to configure IP address and service access control policies in batches.
Scenario
If your service is deployed in an enterprise that has many IP addresses and services, you need to configure access control policies for users' IP address groups and service groups to permit or block certain access requests.
Prerequisites
- A website to be protected has been connected to CFW.
- Intrusion prevention has been enabled and Action has been set to Block.
For details about how to configure IP address and service access control policies, see Configuring an Access Control Policy.
Configuring an Access Control Policy
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation pane, click
and choose . The Dashboard page will be displayed, as shown in Dashboard, as shown in Figure 1.
- Choose Access Control > IP Address Group Management, and add two IP address groups sourceA and destB. Add IP addresses to the IP address groups.
Figure 2 Adding an IP address group
- Choose Access Control > Service Groups, add a service group, and add a protocol to the service group.
Figure 3 Adding a service group
- Choose Access Control > Access Policies.
Figure 4 Access policies
- Click Add Rule. Configure parameters in the Add Rule dialog box. For more information, see Table 1.
Figure 5 Protection rule
Table 1 Internet boundary rule parameters Parameter
Description
Example Value
Direction
Direction of protected traffic.
- Outbound: Traffic from external networks to the internal server.
- Inbound: Traffic from the customer server to external networks.
Outbound
Name
Name of the rule
test
Source Type
Select a type. Its value can be:
- IP Address. You can configure a single IP address, consecutive IP addresses, or an IP address segment.
- IP Address Group. You can configure multiple IP addresses.
IP Address
Source Address
Data packet source.
It can be:
- A single IP address, for example, 192.168.10.5
- Consecutive IP addresses, for example, 192.168.0.2-192.168.0.10
- Address segment, for example, 192.168.2.0/24
192.168.10.5
Destination Type
Select a type. Its value can be:
- IP Address. You can configure a single IP address, consecutive IP addresses, or an IP address segment.
- IP Address Group. You can configure multiple IP addresses.
- Domain name: A domain name consists of letters separated by dots (.). It is a human readable address that maps to the machine readable IP address of your server.
IP Address
Destination Address
Data packet destination.
It can be:
- A single IP address, for example, 192.168.10.5
- Consecutive IP addresses, for example, 192.168.0.2-192.168.0.10
- Address segment, for example, 192.168.2.0/24
- Domain name. It can consist of multiple levels. For example, it can be a level-1 domain name (example.com) or a level-2 domain name (www.example.com). After entering a domain name, click Test on the right to check whether it is valid.
NOTE:
If Destination Address is set to a domain name, you need to configure DNS resolution. For more information, see Configuring DNS Resolution.
192.168.10.6
Service Type
Service type. It can be:
- Service. You can configure a single service.
- Service Group. You can configure multiple services.
Service
Protocol Type
Its value can be TCP, UDP, ICMP, Any, or ICMPV6.
TCP
Source Port
Source ports to be enabled or disabled. You can configure a single port or consecutive port groups (example: 80-443).
80
Destination Port
Destination ports to be enabled or disabled. You can configure a single port or consecutive port groups (example: 80-443).
443
Action
Allow or Block. Determines whether to allow the traffic to pass through the cloud firewall.
Allow
Priority
Priority of the rule. Its value can be:
- Pin on top: indicates that the policy is set to the highest priority.
- Lower than the selected rule: indicates that the policy priority is lower than a specified rule.
NOTE:
A smaller value indicates a higher priority.
Pin on top
Status
Whether a policy is enabled.
: enabled
: disabled
Description
Usage and application scenario of a rule
-
- Click OK.
Verifying a Rule
After an access control policy is configured, perform the following steps to verify it:
- In the navigation pane, choose Traffic Analysis. Check the Internet inbound and outbound traffic, attack trend, and frequently accessed IP addresses.
Figure 6 Internet access
- Click the Server Originated Access tab. Check server originated traffic and the attack trend.
Figure 7 Server originated access
- In the navigation pane, choose Log Audit. On the Attack Event Logs tab, check the details about attack events in the past week.
Figure 8 Attack event logs
- In the navigation pane, choose Traffic Analysis. Check the Internet inbound and outbound traffic, attack trend, and frequently accessed IP addresses.
Figure 9 Internet access
- Click the Traffic Logs tab and check the bytes and packets in the past week.
Figure 10 Traffic logs
Feedback
Was this page helpful?
Provide feedbackFor any further questions, feel free to contact us through the chatbot.
Chatbot