Help Center> Cloud Firewall> FAQs> Consulting> What Are the Differences Between CFW and WAF?
Updated on 2024-05-10 GMT+08:00

What Are the Differences Between CFW and WAF?

CFW and WAF are two different Huawei Cloud products that can be used to protect your Internet borders, VPC borders, and web services.

Table 1 describes the differences between WAF and CFW.

Table 1 Differences between CFW and WAF





Cloud Firewall (CFW) is a next-generation cloud-native firewall. It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing. It employs AI for intelligent defense, and can be elastically scaled to meet changing business needs, helping you easily handle security threats. CFW is a basic service that provides network security protection for user services on the cloud.

WAF keeps web services stable and secure. It examines all HTTP and HTTPS requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site scripting (XSS), web shells, command and code injections, file inclusion, sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF).

For details about WAF, see What Is Web Application Firewall?


  • EIP border and VPC border
  • Basic protection against web attacks
  • Defense against external intrusions and protection of proactive connections to external systems
  • WAF protects web applications on Huawei Cloud and other clouds and on-premises applications through domain names or IP addresses.
  • Comprehensive protection against web attacks


  • Asset management and intrusion defense: It detects and defends against intrusions into cloud assets that are accessible over the Internet in real time.
  • Access control: You can control access at Internet borders.
  • Traffic Analysis and log audit: CFW controls, analyzes, and visualizes VPC traffic, audits logs, and traces traffic sources.

WAF identifies and blocks a wide range of suspicious attacks, such as SQL injections, XSS attacks, web shell upload, command or code injections, file inclusion, unauthorized sensitive file access, third-party vulnerability exploits, CC attacks, malicious crawlers, and CSRF.

Consulting FAQs