检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing.
In the navigation pane, choose Log Audit > Log Query. Click the Traffic Logs tab and click VPC Border Firewall. If a log is generated, CFW is protecting the traffic between VPCs. If no logs are recorded, check the configurations of the enterprise router.
In the navigation pane on the left, choose Log Audit > Log Management. The Log Management page is displayed. Click Configure LTS Synchronization. Toggle on to enable the cloud log interconnection service. Create log groups and log streams.
In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab. In the rows where Destination IP is a domain name matching example.com, the corresponding Action is Allow. For other traffic, the Action is Block.
Step 6: View the Protection Effect Through Attack Event Logs In the navigation pane, choose Log Audit > Log Query.
It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing.
It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing.
Figure 2 EIPs The administrator chose Log Audit > Log Query and clicked the Access Control Logs tab. He searched for the blocking logs of the access source IP address xx.xx.xx.94.
How to Defend Against Access Control Attacks In addition to access control policy design, identity authentication, security audit and monitoring, security configuration and patch management, access control, vulnerability defense, security training and awareness improvement, and security
In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab and click VPC Border Firewall. References For details about how to add other protection rules, see Adding a Protection Rule.
Step 5: Viewing Rule Hits in Access Control Logs In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab.