Editions
You can check the regions where each CFW edition is available on the console.
Function |
|
| |
|---|---|---|---|
Application scenario | Suitable for SMEs that need to defend against network intrusions and server compromises, or need to obtain Multi-Layer Protection Scheme (MLPS) certification. | Suitable for large and medium-sized enterprises that need to defend against network intrusions and server compromises, control internal network security, obtain MLPS certification, or have key event assurance requirements. | |
Protection capacity | Protected EIPs at Internet border | 20 (scalable) | 50 (scalable) |
Protected VPCs | - | 2 (scalable) | |
Peak Protection Traffic at Internet Border | 10 Mbit/s (scalable) | 50 Mbit/s (scalable) | |
Peak Protection Traffic at VPC Border | - | 200 Mbit/s (can be increased with the number of VPCs) | |
Access traffic control | ACL access control for public network assets (based on IP addresses, domain names, domain groups, and geographical locations) | Supported | Supported |
North-south traffic protection and cloud resource (such as EIP) protection against risks on the Internet | Supported | Supported | |
North-south traffic audit and log query | Supported | Supported | |
East-west traffic protection, asset protection between VPCs, and full traffic analysis | - | Supported | |
East-west traffic monitoring to obtain inter-VPC traffic data in real time | - | Supported | |
Protection policies | Intrusion prevention system (IPS) | Supported | Supported |
Custom IPS signature database | - | Supported | |
Virtual patch | Supported | Supported | |
Sensitive directories and reverse shells | Supported | Supported | |
Antivirus | - | Supported | |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot


