All Products
Search
Document Center

Cloud Firewall:Getting started with pay-as-you-go Cloud Firewall

Last Updated:Feb 27, 2026

This guide walks you through setting up pay-as-you-go Cloud Firewall to protect your Internet-facing assets, from enabling firewalls to reviewing your first bill.

In this guide, you will learn how to:

  • Enable firewalls and add assets for protection

  • Configure intrusion prevention to detect and block threats

  • View traffic statistics to monitor network activity

  • Create access control policies to manage traffic flow

  • Set up notifications for security events

  • View and understand your pay-as-you-go bills

Flowchart

image

Prerequisites

Purchase Cloud Firewall with the pay-as-you-go billing method. For details, see Purchase Cloud Firewall.

Step 1: Enable firewalls

The first time you log on to the Cloud Firewall console after purchase, a dialog box prompts you to add assets. Click Automatic Full Access for Internet-facing Assets or Quick Manual Access for Internet-facing Assets to add the assets you want to protect.

If you selected Automatic Protection for Assets on the buy page, all new assets are automatically added to Cloud Firewall. If you did not select this option, go to Firewall Settings > Internet Firewall in the left-side navigation pane and enable protection for new assets manually. For details, see Internet Firewall.

image.png

Step 2: Configure intrusion prevention

(Optional) Configure intrusion prevention policies

Cloud Firewall includes a built-in intrusion prevention system (IPS) that detects and intercepts malicious traffic and attacks in real time. The IPS identifies request payloads and malicious files containing trojans and webshells, and blocks intrusions based on threat intelligence. Detection relies on threat intelligence, intrusion prevention rules, intelligent model-based recognition algorithms, and the virtual patching feature. For details, see IPS configuration.

The threat detection engine operates in two modes: Monitor Mode and Block Mode.

  • In Monitor Mode, Cloud Firewall generates alerts for malicious traffic only.

  • In Block Mode, Cloud Firewall generates alerts and automatically blocks attack payloads.

Cloud Firewall provides different levels of Block Mode for different attack types. The following table describes the usage scenarios for each level.

__

Important

Start with Monitor Mode when you modify prevention configurations. After a trial run, analyze false positives, then switch to Block Mode based on the results.

For more information about intrusion prevention, see the following topics:

View intrusion prevention results

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Detection and Response > IPS.

  3. Review the intrusion prevention results, including source IP addresses, destination IP addresses, applications, sources, and blocking event details.

For details, see Intrusion prevention.

image.png

Step 3: View traffic statistics

Traffic analysis provides real-time statistics such as outbound connections and Internet exposures. Use these statistics to monitor traffic and identify anomalies.

Important

Review traffic statistics before you configure access control policies. These statistics provide the context needed to set appropriate rules.

FeatureDescriptionDetails
Outbound ConnectionView domain names and IP addresses of cloud assets. Check outbound access control policies based on intelligence tags, access details, and logs.Outbound Connection
Internet ExposureView services, ports, public IP addresses, and cloud service information exposed on the Internet. Strengthen access control policies based on recommended intelligent policies and open public IP address information.Internet Exposure

Step 4: Create access control policies

Configure access control policies

Without an access control policy, Cloud Firewall allows all traffic. Configure access control policies for the Internet firewall to manage access between your Internet-facing assets and the Internet.

ScenarioDescriptionDetails
Create policiesCreate inbound and outbound access control policies for the Internet firewall.Create access control policies for the Internet firewall
Example configurationsAllow inbound Internet traffic over specific ports, restrict an ECS instance to access a specific domain name only, or deny traffic between ECS instances in different VPCs.Configure access control policies
MongoDB protectionDefend against unauthorized access to MongoDB databases.Defend against unauthorized access to MongoDB databases

View hit details of an access control policy

An access control policy takes effect immediately after creation.

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Access Control > Internet Border.

  3. Check the hit details of a policy in the Hits/Last Hit At column.

For details, see Create access control policies for the Internet firewall.

image.png

Step 5: Configure notifications

Configure notifications to receive alerts when asset attack risks occur or new assets are added. This helps you analyze asset status and handle exceptions promptly. For details about supported notification types and configuration steps, see Notifications.

Step 6: View pay-as-you-go bills

The billing cycle for pay-as-you-go Cloud Firewall is one day. Bills are generated and fees are deducted from your account balance at 18:00 the next day.

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose System Settings > Bill Management.

  3. On the Bill Management page, view usage details for pay-as-you-go Cloud Firewall, including protected asset statistics, enabled features, and traffic data.

  4. Click View Bill Details to open the Expenses and Costs console. For details, see Bill details.

References