Fine-Grained Access Control
You can control access traffic in all directions and block intrusions in real time. Access from the Internet, between VPCs, or at a specific granularity can be controlled.
Control Server Originated Traffic
You can check external connections, identifying and blocking malicious access.
Statistics about servers requesting external connections are displayed on the CFW console, helping you identify malicious or intruded servers.
Intrusion Detection and Prevention
CFW's intrusion prevention engine detects and intercepts malicious traffic in real time to implement intelligent and accurate protection based on Huawei's network-wide threat intelligence.
For assets that can access the Internet, CFW can identify their attack surface and allow you to enable protection in a few clicks.
Log Audit and Traffic Visualization
All traffic is logged and can be presented in reports. You can audit events and trace threats back to their sources.
All of the traffic on your network is visualized.
You can use CFW to perform security stocktaking on service assets accessible to the public network, and enable intrusion detection and prevention in one click.
Automatic Stocktaking of Public Network Assets
CFW can identify the threat exposure for your assets. You can enable protection in a few clicks.
Huawei's threat and vulnerability databases are integrated in CFW, enabling you to defend against threats with great precision.
You can implement domain-based precise control over server originated traffic.
Logs are recorded for all server originated connections.
Intelligent Analytics and Protection
You can analyze server originated connections, evaluate server intrusion risks, and block malicious connections in real time to protect your assets.
Check inter-VPC traffic and control internal access.
Control the traffic and access between VPCs, identifying and blocking malicious access.
Visualization and Traceability
Access between internal service systems can be recorded, analyzed, and displayed. Events can be audit and traced back to their sources.