Updated on 2024-12-05 GMT+08:00

Application Scenarios

External Intrusion Prevention

You can use CFW to perform security stocktaking on service assets accessible to the public network and enable intrusion detection and prevention in one click.

Control Over Server Originated Traffic

Implement domain-based precise control over server originated traffic.

Inter-VPC Access Control (Available in Professional Edition)

Check inter-VPC traffic and control internal access.

Security and Compliance

You can use CFW to meet the requirements for regional border protection, network intrusion prevention, network access control, and security log audit in the DJCP MLPS 2.0 certification.