Application Scenarios
External Intrusion Prevention
You can use CFW to perform security stocktaking on service assets accessible to the public network and enable intrusion detection and prevention in one click.
Control Over Server Originated Traffic
Implement domain-based precise control over server originated traffic.
Inter-VPC Access Control (Available in Professional Edition)
Check inter-VPC traffic and control internal access.
Security and Compliance
You can use CFW to meet the requirements for regional border protection, network intrusion prevention, network access control, and security log audit in the DJCP MLPS 2.0 certification.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot