- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Creating a User Group and Granting Permissions
- Checking the Dashboard
- Purchasing and Changing the Specifications of CFW
- Enabling Internet Border Traffic Protection
- Enabling VPC Border Traffic Protection
- Enabling NAT Gateway Traffic Protection
-
Configuring Access Control Policies to Control Traffic
- Access Control Policy Overview
- Configuring Protection Rules to Block or Allow Traffic
- Adding Blacklist or Whitelist Items to Block or Allow Traffic
- Viewing Protection Information Using the Policy Assistant
- Managing Access Control Policies
- Managing IP Address Groups
- Domain Name Management
- Service Group Management
- Attack Defense
- Viewing Traffic Statistics
- Viewing CFW Protection Logs
- System Management
- Permissions Management
- Using Cloud Eye to Monitor CFW
- CTS Auditing
-
Best Practices
- CFW Best Practice Summary
- Purchasing and Querying CFW via API
- Migrating Security Policies to CFW in Batches
- Configuration Suggestions for Using CFW with WAF, Advanced Anti-DDoS, and CDN
- Allowing Internet Traffic Only to a Specified Port
- Allowing Outbound Traffic from Cloud Resources Only to a Specified Domain Name
- Using CFW to Defend Against Network Attacks
- Configuring a Protection Rule to Protect Traffic Between Two VPCs
- Configuring a Protection Rule to Protect SNAT Traffic
- Using CFW to Protect Enterprise Resources
- Using CFW to Protect EIPs Across Accounts
- Using CFW to Protect VPCs Across Accounts
-
API Reference
- Before You Start
- API Overview
- API Calling
-
API
-
Firewall Management
- Creating a Firewall
- Obtaining the Status of a CFW Task
- Deleting a Firewall
- Querying the Firewall List
- Changing the East-West Firewall Protection Status
- Querying Firewall Details
- Obtaining East-West Firewall Information
- Creating an East-West Firewall
- Querying the Number of Protected VPCs
- Creating a Tag
- Deleting a Tag
- EIP Management
-
ACL Rule Management
- Creating an ACL Rule
- Deleting an ACL Rule
- Deleting ACL Rules in Batches
- Deleting the Number of Rule Hits
- Updating an ACL Rule
- Updating Rule Actions in Batches
- Setting the Priority of an ACL Protection Rule
- Querying a Protection Rule
- Querying Rule Tags
- Obtaining the Number of Rule Hits
- Viewing the Region List
- Checking the ACL Import Status
- Blacklist/Whitelist Management
- Address Group Management
- Service Group Management
-
Domain Name Resolution and Domain Name Group Management
- Adding a Domain Name Group
- Deleting a Domain Name Group
- Updating a Domain Name Group
- Updating the DNS Server List
- Querying the Domain Name Group List
- Querying the DNS Server List
- Querying an IP Address for Domain Name Resolution
- Obtain the list of domain names in a domain name group
- Adding a Domain Name List
- Deleting a Domain Name List
- Viewing Domain Group Details
- Obtaining the DNS Resolution Result of a Domain Name
- Deleting Domain Groups in Batches
- IPS management
- Log Management
- Packet Capture Management
- Antivirus Management
- Alarm Configuration Management
- Tag Management
- IPS Management
-
Firewall Management
- Appendix
- SDK Reference
-
FAQs
-
About the Product
- Does CFW Support Off-Cloud Servers?
- What Are the QPS, New Connections, and Concurrent Connections Supported by CFW?
- Can CFW Be Shared Across Accounts?
- What Are the Differences Between CFW and WAF?
- What Are the Differences Between CFW, Security Groups, and Network ACLs?
- How Does CFW Control Access?
- What Are the Priorities of the Protection Settings in CFW?
- Can WAF, Advanced Anti-DDoS, and CFW Be Deployed Together?
- Can CFW Protect Resources Across Enterprise Projects?
- How Long Are CFW Logs Stored by Default?
- Regions and AZs
-
Troubleshooting
- What Do I Do If Service Traffic is Abnormal?
- Why Are Traffic and Attack Logs Incomplete?
- Why Does a Protection Rule Not Take Effect?
- What Do I Do If IPS Blocks Normal Services?
- Why Is No Data Displayed on the Access Control Logs Page?
- Why Is the IP Address Translated Using NAT64 Blocked?
- Why Some Permissions Become Invalid After a System Policy Is Granted to an Enterprise Project?
- What Do I Do If a Message Indicating Insufficient Permissions Is Displayed When I Configure LTS Logs?
-
Network Traffic
- How Do I Calculate the Number of Protected VPCs and the Peak Protection Traffic at the VPC Border?
- How Does CFW Collect Traffic Statistics?
- What Is the Protection Bandwidth Provided by CFW?
- What Do I Do If My Service Traffic Exceeds the Protection Bandwidth?
- What Are the Differences Between the Data Displayed in Traffic Trend Module and the Traffic Analysis Page?
- How Do I Verify the Validity of an Outbound HTTP/HTTPS Domain Protection Rule?
- How Do I Obtain the Real IP Address of an Attacker?
- What Do I Do If a High Traffic Warning Is Received?
-
About the Product
- Videos
-
More Documents
-
User Guide (Ankara Region)
- Product Overview
- Checking the Dashboard
- Creating Cloud Firewall
- Enabling Internet Border Traffic Protection
- Enabling VPC Border Traffic Protection
-
Configuring Access Control Policies to Control Traffic
- Access Control Policy Overview
- Configuring Protection Rules to Block or Allow Traffic
- Adding Blacklist or Whitelist Items to Block or Allow Traffic
- Viewing Protection Information Using the Policy Assistant
- Managing Access Control Policies
- Managing IP Address Groups
- Domain Name Management
- Service Group Management
- Attack Defense
- Viewing Traffic Statistics
- Viewing CFW Protection Logs
- System Management
-
FAQs
-
About the Product
- Does CFW Support Off-Cloud Servers?
- What Are the QPS, New Connections, and Concurrent Connections Supported by CFW?
- Can CFW Be Shared Across Accounts?
- What Are the Differences Between CFW and WAF?
- What Are the Differences Between CFW, Security Groups, and Network ACLs?
- How Does CFW Control Access?
- What Are the Priorities of the Protection Settings in CFW?
- Can WAF and CFW Be Deployed Together?
- Troubleshooting
- Network Traffic
-
About the Product
- Change History
- API Reference (Ankara Region)
-
User Guide (Ankara Region)
- General Reference
Copied.
Yearly/Monthly Billing
If you expect to use resources for a longer period, you can save money by selecting yearly/monthly billing. You can pre-purchase CFW resources at discounted prices. This section describes the billing rules of yearly/monthly CFW resources.
Application Scenarios
If you want to ensure resource stability over a certain period of time, yearly/monthly billing is a good choice for the following types of workloads:
- Long-term workloads with stable resource requirements
- For long-term projects
- Workloads with predictable traffic bursts
- Workloads with high data security requirements
Billed Items
You are billed for the following items on a yearly/monthly basis.
Billing Item |
Description |
|
---|---|---|
Edition |
Edition of the purchased service |
|
Extended package |
Protected EIPs at Internet boundary |
If you have purchased a yearly/monthly CFW edition, the extended package is also billed on a yearly/monthly basis. |
Peak protection traffic at Internet boundary |
||
Protected VPCs |
Billed Usage Period
A yearly/monthly CFW instance is billed for the purchased duration. The billing starts when you activated or renewed the subscription (accurate to seconds), and ends at 23:59:59 of the expiry date.
For example, if you purchased a one-month CFW instance on June 30, 2023, 15:50:04, the billed usage period is from June 30, 2023, 15:50:04 to July 30, 2023, 23:59:59.
Billing Examples
- The first billing period is from 15:50:04 on June 30, 2023 to 23:59:59 on July 30, 2023.
- The second billing period is from 23:59:59 on July 30, 2023 to 23:59:59 on Aug. 30, 2023.
You will be billed for both usage periods. CFW resources are billed individually as follows:
Product Information |
Formula |
---|---|
Edition |
Price of the purchased service edition x Required duration |
Add EIP protection capacity |
Unit price of expansion package for the protected public IP address x Number of protected public IP addresses x Required duration |
Add peak traffic protection capacity |
Unit price of expansion package for the peak protection traffic x Traffic x Required duration |
Added VPCs |
Unit price of VPC expansion package x Number of VPCs x Required duration |
Figure 1 shows how the total price is calculated.
The prices in the figure are just examples. The actual prices are those displayed on CFW Pricing Details.
Price Change After Specification Change
If the specifications of yearly/monthly CFW resources no longer meet your needs, you can change the specifications on the console. The system will recalculate the price and either bill or refund you the difference.
- If you upgrade your CFW specifications, you need to pay the difference in price.
Suppose there is no discount for resource upgrade and you purchased a one-month standard edition CFW with one EIP and 5 Mbit/s peak traffic on June 8, 2023, and added one VPC on June 18, 2023. The price of the original specifications was $462 USD/month, and that for the new specifications was $1792 USD/month. The price difference will be calculated as follows:
Specification upgrade fee = New specification price × Remaining period - Old specification price × Remaining period
The remaining period is the remaining days of each calendar month divided by the maximum number of days in each calendar month. In this example, Remaining period = 12 (Remaining days in June)/30 (Maximum number of days in June) + 8 (Remaining days in July)/31 (Maximum number of days in July) = 0.6581. Cost of upgrade = 1792 x 0.6581 - 462 x 0.6581 = $875.273 USD
For more information, see Pricing of a Changed Specification.
Impact of Expiration
Figure 2 shows the statuses a yearly/monthly CFW can go through throughout its lifecycle. After CFW is purchased, it enters the valid period and runs normally during this period. If CFW is not renewed after it expires, before being deleted, it first enters a grace period and then a retention period.
Expiration Reminder
The system will send you a reminder (by email, SMS, or in-app message) 7 days before a yearly/monthly CFW subscription expires to remind you to renew the subscription.
Impact After Expiration
If your yearly/monthly CFW instance expires and is not renewed, after it expires, it changes to the Expired state and enters a grace period. During the grace period, you can access CFW.
If you do not renew your yearly/monthly CFW instance before the grace period ends, it goes into the retention period and its status turns to Frozen. You cannot perform any operations on such instances in the retention period.
If the yearly/monthly CFW resources are not renewed by the time the retention period ends, the CFW instance and protection configurations will be released and data cannot be restored.
- Huawei Cloud offers a 15-day grace period and a 15-day retention period.
- For details about renewal, see Overview.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot