- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Creating a User Group and Granting Permissions
- Purchasing and Changing the Specifications of CFW
- CFW Dashboard
- CFW Protection
-
Access Control
- Access Control Policy Overview
-
Configuring an Access Control Policy
- Configuring Protection Rules to Block or Allow Internet Border Traffic
- Configuring Protection Rules to Block or Allow VPC Border Traffic
- Configuring Protection Rules to Block or Allow NAT Gateway Border Traffic
- Example 1: Allowing the Inbound Traffic from a Specified IP Address
- Example 2: Blocking Access from a Region
- Example 3: Allowing Traffic from a Service to a Platform
- Example 4: Configuring SNAT Protection Rules
- Adding Blacklist or Whitelist Items to Block or Allow Traffic
- Quickly Block Malicious Traffic Through Traffic Blocking
- Viewing Protection Information Using the Policy Assistant
- Managing ACL Policies
- Managing Object Groups
- Attack Defense
- Traffic Analysis
- Log Audit
- System Management
- Permissions Management
- Using Cloud Eye to Monitor CFW
- CTS Auditing
-
Best Practices
- CFW Best Practice Summary
- Purchasing and Querying CFW via API
- Migrating Security Policies to CFW in Batches
- Configuration Suggestions for Using CFW with WAF, Advanced Anti-DDoS, and CDN
- Allowing Internet Traffic Only to a Specified Port
- Allowing Outbound Traffic from Cloud Resources Only to a Specified Domain Name
- Using CFW to Defend Against Network Attacks
- Configuring a Protection Rule to Protect Traffic Between Two VPCs
- Configuring a Protection Rule to Protect SNAT Traffic
- Using CFW to Protect Enterprise Resources
- Using CFW to Protect EIPs Across Accounts
- Using CFW to Protect VPCs Across Accounts
- CFW Security Best Practices
-
API Reference
- Before You Start
- API Overview
- API Calling
-
API
-
Firewall Management
- Creating a Firewall
- Obtaining the Status of a CFW Task
- Deleting a Firewall
- Querying the Firewall List
- Changing the East-West Firewall Protection Status
- Querying Firewall Details
- Obtaining East-West Firewall Information
- Creating an East-West Firewall
- Querying the Number of Protected VPCs
- Creating a Tag
- Deleting a Tag
- Querying the Protection Status of a Firewall
- EIP Management
-
ACL Rule Management
- Creating an ACL Rule
- Deleting an ACL Rule
- Deleting ACL Rules in Batches
- Deleting the Number of Rule Hits
- Updating an ACL Rule
- Updating Rule Actions in Batches
- Setting the Priority of an ACL Protection Rule
- Querying a Protection Rule
- Querying Rule Tags
- Obtaining the Number of Rule Hits
- Viewing the Region List
- Checking the ACL Import Status
- Blacklist/Whitelist Management
-
Address Group Management
- Adding an Address Group
- Adding an Address Group Member
- Deleting an Address Group
- Deleting an Address Group Member
- Deleting Address Group Members in Batches
- Updating Address Group Information
- Querying the Address Group List
- Querying Address Group Details
- Querying Address Group Members
- Updating the Object Configuration Description
- Service Group Management
-
Domain Name Resolution and Domain Name Group Management
- Adding a Domain Name Group
- Deleting a Domain Name Group
- Updating a Domain Name Group
- Updating the DNS Server List
- Querying the Domain Name Group List
- Querying the DNS Server List
- Querying the IP Address for Domain Name Resolution
- Obtain the list of domain names in a domain name group
- Adding a Domain Name List
- Deleting a Domain Name List
- Viewing Domain Group Details
- Obtaining the DNS Resolution Result of a Domain Name
- Deleting Domain Groups in Batches
-
IPS management
- Querying the Status of the IPS Feature
- Changing the IPS Feature Status
- Querying a Protection Mode
- Changing the Protection Mode
- Changing the IPS Rule Mode
- Updating a Frequency IPS Rule
- Querying Frequency IPS Rule Information
- Obtaining the IPS Rule List
- Obtaining the IPS Rule Update Time
- Obtaining Custom IPS Rules
- Log Management
- Packet Capture Management
- Antivirus Management
- Alarm Configuration Management
- Tag Management
-
Filtering traffic
- Importing an IP Address Blacklist for Traffic Filtering
- Obtain the imported IP address blacklist.
- Deleting the Imported IP Address Blacklist
- Exporting the IP Address Blacklist for Traffic Filtering
- Re-importing the IP Address Blacklist Used for Traffic Filtering After an Import Failed
- Enabling or Disabling the IP Address Blacklist for Traffic Filtering
- Obtaining the Traffic Filtering Switch Information
-
Firewall Management
- Appendix
- SDK Reference
-
FAQs
-
About the Product
- Does CFW Support On-premises Servers?
- What Traffic Does CFW Protect?
- What Are the QPS, New Connections, and Concurrent Connections Supported by CFW?
- Can CFW Be Shared Across Accounts?
- What Are the Differences Between CFW and WAF?
- What Are the Differences Between CFW, Security Groups, and Network ACLs?
- How Does CFW Control Access?
- What Are the Priorities of the Protection Settings in CFW?
- Can WAF, Advanced Anti-DDoS, and CFW Be Deployed Together?
- Can CFW Protect Resources Across Enterprise Projects?
- How Long Are CFW Logs Stored by Default?
- Regions and AZs
-
Troubleshooting
- Why Are Traffic and Attack Logs Incomplete?
- Why Does a Protection Rule Not Take Effect?
- Why Is No Data Displayed on the Access Control Logs Page?
- What Can I Do If Services Cannot Be Accessed After a Policy Is Configured on CFW?
- What Do I Do If IPS Blocks Normal Services?
- Why Is the IP Address Translated Using NAT64 Blocked?
- Why Some Permissions Become Invalid After a System Policy Is Granted to an Enterprise Project?
- What Do I Do If a Message Indicating Insufficient Permissions Is Displayed When I Configure LTS Logs?
- What Can I Do If Automatic EIP Protection Does Not Take Effect?
-
Network Traffic
- How Do I Calculate the Number of Protected VPCs and the Peak Protection Traffic at the VPC Border?
- How Does CFW Collect Traffic Statistics?
- What Is the Protection Bandwidth Provided by CFW?
- What Do I Do If My Service Traffic Exceeds the Protection Bandwidth?
- What Are the Differences Between the Data Displayed in Traffic Trend Module and the Traffic Analysis Page?
- How Do I Verify the Validity of an Outbound HTTP/HTTPS Domain Protection Rule?
- How Do I Obtain the Real IP Address of an Attacker?
- What Do I Do If a High Traffic Warning Is Received?
-
About the Product
- Videos
-
More Documents
-
User Guide (Ankara Region)
- Product Overview
- Checking the Dashboard
- Creating Cloud Firewall
- Enabling Internet Border Traffic Protection
- Enabling VPC Border Traffic Protection
-
Configuring Access Control Policies to Control Traffic
- Access Control Policy Overview
- Configuring Protection Rules to Block or Allow Traffic
- Adding Blacklist or Whitelist Items to Block or Allow Traffic
- Viewing Protection Information Using the Policy Assistant
- Managing Access Control Policies
- Managing IP Address Groups
- Domain Name Management
- Service Group Management
- Attack Defense
- Viewing Traffic Statistics
- Viewing CFW Protection Logs
- System Management
-
FAQs
-
About the Product
- Does CFW Support Off-Cloud Servers?
- What Are the QPS, New Connections, and Concurrent Connections Supported by CFW?
- Can CFW Be Shared Across Accounts?
- What Are the Differences Between CFW and WAF?
- What Are the Differences Between CFW, Security Groups, and Network ACLs?
- How Does CFW Control Access?
- What Are the Priorities of the Protection Settings in CFW?
- Can WAF and CFW Be Deployed Together?
- Troubleshooting
- Network Traffic
-
About the Product
- Change History
- API Reference (Ankara Region)
-
User Guide (Ankara Region)
- General Reference
Show all
Function Overview
-
CFW
-
Cloud Firewall (CFW) is a next-generation cloud-native firewall. It protects Internet and VPC borders on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing. CFW employs AI for intelligent defense, and can be elastically scaled to meet changing business needs, helping you easily handle security threats.
The standard and professional editions are available. Below are the regions available for yearly/monthly instances.
The billing mode can be yearly/monthly or pay-per-use. Note that only the professional edition supports pay-per-use billing.
Regions available for yearly/monthly subscriptions: CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou, CN Southwest-Guiyang1 (Only CN Southwest-Guiyang1 supports the basic edition of CFW.)
Regions available for pay-per-use instances: CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh
-
-
EIP Protection
-
After the EIP information is synchronized and EIP is enabled, the system automatically checks the security of your cloud assets and can provide protection for external services within seconds.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Firewalls Between VPCs
-
Inter-VPC protection detects and controls traffic communication between two VPCs, and provides asset protection, access control, full traffic analysis, and intrusion prevention between VPCs.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Access Control Policy
-
Configure a proper access control policy for fine-grained management of the traffic exchanged between internal servers and the external network, preventing the spread of internal threats and enhancing security.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Blacklist/Whitelist
-
You can configure a blacklist to block specific IP addresses, and can configure a whitelist to allow access from specific IP addresses.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
IP Address Group
-
An IP address group contains multiple IP addresses. An IP address group frees you from repeatedly modifying access rules and simplifies security group rule management.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Service Group
-
A service group is a collection of services (protocols, source ports, and destination ports). A service group frees you from repeatedly modifying access rules and simplifies security group rule management.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Intrusion Prevention Policy
-
Configure the intrusion prevention mode to detect, log, and block attack traffic. CFW basic defense functions are developed based on years of cybersecurity practices, checking the access traffic to your assets and protecting them from common network attacks.
Basic defense functions scan traffic for attacks, threats, and vulnerabilities, such as phishing, Trojans, worms, hacker tools, spyware, password attacks, vulnerability attacks, SQL injection attacks, XSS attacks, and web attacks. CFW can also check for exceptions in protocols, buffer overflow, access control, and suspicious DNS activities.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Antivirus
-
The anti-virus function identifies and processes virus files through virus feature detection to prevent data damage, permission change, and system breakdown caused by virus files.
The antivirus function can check access via HTTP, SMTP, POP3, FTP, IMAP4, and SMB.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
System Management
-
Alarm Notification: If you configure attack alarms and high traffic warnings, CFW will send IPS attack logs and high traffic warnings by using the notification method (such as email or SMS) you configured.
Network Packet Capture: You can create network packet capture tasks to locate network faults and attacks.
Multi-Account Management: If the accounts in your organization are centrally managed, you can use CFW to protect the EIPs of all member accounts in the organization in a unified manner.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
Log Audit
-
You can check the events, access control, traffic bytes, and number of packets in the past week.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
-
EIP Protection Capacity Expansion
-
After EIP protection is enabled, you can increase the number of protected EIPs on the console.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, AP-Jakarta, AP-Manila, AF-Johannesburg, AF-Cairo, TR-Istanbul, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, ME-Riyadh, CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN East2, CN East-Qingdao, CN South-Guangzhou and CN Southwest-Guiyang1.
-
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot