Enabling Internet Border Traffic Protection

CFW protects Internet border traffic by protecting EIPs. After EIP protection is enabled, your service traffic will pass through CFW. By default, all traffic is allowed.

To use CFW to protect traffic, you also need to configure access control policies or enable IPS. For details about how to configure access control policies, see Adding a Protection Rule. For details about IPS, see Configuring Intrusion Prevention Policies.

Constraints

  • Currently, IPv6 addresses cannot be protected.

  • An EIP can only be protected by one firewall.

  • Only EIPs in the enterprise project to which the current account belongs can be protected.

Impacts on Services

Enabling or disabling EIP protection does not interrupt services, ensuring smooth traffic switchover.

Important

If a protection rule or blacklist has been configured to block all traffic before an EIP is protected, the rule or blacklist will take effect for the EIP when protection is enabled for it.

Enabling Internet Border Traffic Protection

  1. Log in to the management console.

  2. In the navigation pane on the left, click image1 and choose Security > Cloud Firewall. The Dashboard page will be displayed.

  3. (Optional) Switch to another firewall instance: Select a firewall from the drop-down list in the upper left corner of the page.

  4. In the navigation pane, choose Assets > EIPs. The EIPs page is displayed. The EIP information is automatically updated to the list.

  1. Enable EIP protection.

    • Enable protection for a single EIP: In the row of the EIP, click Enable Protection in the Operation column.

    • Enable protection for multiple EIPs: Select the EIPs that you want to enable protection and click Enable Protection above the list.

    Important

    • Currently, IPv6 addresses cannot be protected.

    • An EIP can only be protected by one firewall.

    • Only EIPs in the enterprise project to which the current account belongs can be protected.

  2. On the page that is displayed, check the information and click Bind and Enable. Then the Protection Status changes to Protected.

    Note

    After EIP protection is enabled, the default action of the access control policy is Allow.

Follow-up Operations

After protection is enabled, all traffic is allowed by default. CFW will block traffic based on the policies you configure.

  • To implement traffic control, configure a protection policy. For details, see Adding an Internet Boundary Protection Rule or Adding Blacklist or Whitelist Items to Block or Allow Traffic.

    • Allow or block traffic based on protection rules.

      • Traffic allowing rule: The allowed traffic will be checked by functions such as intrusion prevention system (IPS) and antivirus.

      • Traffic blocking rule: Traffic will be directly blocked.

    • Allow or block traffic based on the blacklist and whitelist:

      • Whitelist: Traffic will be directly allowed without being checked by other functions.

      • Blacklist: Traffic will be directly blocked.

  • For details about how to block network attacks, see Blocking Network Attacks.