Editions
CFW provides the standard edition and the professional edition. You can use access control, intrusion prevention, traffic analysis, and log audit functions on the console.
For details about their functions, see Features.
For details about the differences, see Table 1.
Description:
- √: The function is included in the current edition.
- x: The function is not included in the current edition.
Feature |
Standard |
Professional |
|
---|---|---|---|
Protection |
Protected EIPs at Internet boundary |
20 (expandable) |
50 (expandable) |
Peak protection traffic at Internet boundary |
10 Mbit/s (expandable) |
50 Mbit/s (expandable) |
|
Protected VPCs |
× |
2 (expandable) |
|
Max. peak protection traffic between VPCs |
× |
200 Mbit/s (can be increased with the number of VPCs) |
|
Access traffic control |
ACL access control for public network assets (based on IP addresses, domain names, domain groups, and geographical locations) |
√ |
√ |
North-south traffic protection and cloud resource (including EIP) protection against risks on the Internet |
√ |
√ |
|
North-south traffic audit and log query |
√ |
√ |
|
East-west traffic protection, asset protection between VPCs, and full traffic analysis |
× |
√ |
|
East-west traffic monitoring to obtain inter-VPC traffic data in real time |
× |
√ |
|
Protection policies |
Intrusion prevention system (IPS) |
√ |
√ |
Custom IPS signature database |
× |
√ |
|
Sensitive directories and reverse shells |
√ |
√ |
|
Antivirus |
× |
√ |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot