Updated on 2024-04-09 GMT+08:00

Configuring an Access Control Policy

The default status of an access control policy is Allow. Configure a proper access control policy for fine-grained management and control, preventing the spread of internal threats and enhancing security. For details about how to configure an access control policy, see Adding an Internet Boundary Protection Rule. For details about how to block all access and allow only certain traffic, see Configuration Example - Allowing the Inbound Traffic from a Specified IP Address. For details about how to block the access traffic of a region, see Configuration Example - Blocking Access from a Region.

Configuration Example - Allowing the Inbound Traffic from a Specified IP Address

Configure two protection rules. One of them blocks all traffic, as shown in Figure 1. Its priority is the lowest. The other allows the traffic of a specified IP address, as shown in Figure 2. Its priority is the highest.
Figure 1 Blocking all traffic
Figure 2 Allowing a specified IP address

Configuration Example - Blocking Access from a Region

The following figure shows a rule that blocks all access traffic from Singapore.
Figure 3 Intercepting the access traffic from Singapore