Updated on 2024-10-30 GMT+08:00

Overview

Cloud Firewall (CFW) provides traffic protection for cloud services at the Internet border, VPC border, and NAT gateway.

This section describes the configuration processes in different scenarios.

Internet Border Traffic Protection

Procedure

Description

Reference

Purchasing CFW

Purchase a CFW instance in the region where you want to protect traffic.

Purchasing CFW

Enabling EIP protection

Enable protection for one or more EIPs.

CFW protects Internet border traffic by protecting EIPs.

Enabling EIP Protection

Configuring protection policies

By default, CFW allows all traffic. You need to configure protection policies to protect traffic.

The following protection policies are provided:
  • Protection rules: You can set rules to control traffic by IP address, IP address group, region, or domain name.
  • Blacklist/Whitelist: Traffic is controlled based on specific rules configured for IP addresses and IP address groups. Traffic that matches the whitelist is directly allowed without being checked by other functions.
  • Intrusion prevention: Network attacks are blocked based on multiple IPS rule databases.
  • Antivirus: Virus-infected files are blocked based on protocol types.

Protection rules: Adding Protection Rules to Block or Allow Traffic

Blacklist/Whitelist: Adding Blacklist or Whitelist Items to Block or Allow Traffic

Intrusion prevention: Blocking Network Attacks

Antivirus: Blocking Virus-infected Files

Checking logs

View the traffic protection outcomes in logs.

Viewing Logs

Example scenarios:

VPC Border Traffic Protection

Procedure

Description

Reference

Purchasing CFW

Purchase a CFW instance in the region where you want to protect traffic.

Purchasing CFW

Enabling VPC protection

Enable protection for two or more VPCs.

CFW protects VPC border traffic by protecting the VPCs.

Enabling VPC Border Traffic Protection

Configuring protection policies

By default, CFW allows all traffic. You need to configure protection policies to protect traffic.

The following protection policies are provided:
  • Protection rules: You can set rules to control traffic by IP address, IP address group, region, or domain name.
  • Blacklist/Whitelist: Traffic is controlled based on specific rules configured for IP addresses and IP address groups. Traffic that matches the whitelist is directly allowed without being checked by other functions.
  • Intrusion prevention: Network attacks are blocked based on multiple IPS rule databases.
  • Antivirus: Virus-infected files are blocked based on protocol types.

Protection rules: Adding Protection Rules to Block or Allow Traffic

Blacklist/Whitelist: Adding Blacklist or Whitelist Items to Block or Allow Traffic

Intrusion prevention: Blocking Network Attacks

Antivirus: Blocking Virus-infected Files

Checking logs

View the traffic protection outcomes in logs.

Viewing Logs

Example scenarios:

Configure CFW protection rules to control inter-VPC traffic. For details, see Configuring a Protection Rule to Protect Traffic Between Two VPCs.

NAT gateway traffic protection

Procedure

Description

Reference

Purchasing CFW

Purchase a CFW instance in the region where you want to protect traffic.

Purchasing CFW

Enabling VPC (NAT) protection

Enable protection for two or more VPCs.

CFW protects the traffic of the NAT gateway by protecting the VPC where the NAT gateway resides.

Enabling NAT Gateway Traffic Protection

Configuring protection policies

By default, CFW allows all traffic. You need to configure protection policies to protect traffic.

The following protection policies are provided:
  • Protection rules: You can set rules to control traffic by IP address, IP address group, region, or domain name.
  • Blacklist/Whitelist: Traffic is controlled based on specific rules configured for IP addresses and IP address groups. Traffic that matches the whitelist is directly allowed without being checked by other functions.
  • Intrusion prevention: Network attacks are blocked based on multiple IPS rule databases.
  • Antivirus: Virus-infected files are blocked based on protocol types.

Protection rules: Adding Protection Rules to Block or Allow Traffic

Blacklist/Whitelist: Adding Blacklist or Whitelist Items to Block or Allow Traffic

Intrusion prevention: Blocking Network Attacks

Antivirus: Blocking Virus-infected Files

Checking logs

View the traffic protection outcomes in logs.

Viewing Logs

Example scenarios:

Configure CFW protection rules to control NAT gateway traffic. For details, see Configuring a Protection Rule to Protect SNAT Traffic