All Products
Search
Document Center

Cloud Firewall:Internet firewall

Last Updated:Jan 30, 2026

Use the Internet firewall for fine-grained control over traffic between your public assets and the Internet. This reduces the Internet exposure of your public assets and lowers security risks for your service traffic. When you enable the Internet firewall, you do not need to change your current network topology. You can protect your resources with one-click protection that takes only seconds to apply. This lets you quickly implement features such as visual analytics, attack prevention, access control, and log auditing for inbound and outbound Internet traffic.

Features

How it works

After you enable the Internet firewall for your public assets, Cloud Firewall filters outbound and inbound traffic using technologies such as deep packet inspection (DPI) traffic analysis, intrusion prevention system (IPS) rules, threat intelligence, virtual patching, and access control policies. This process determines whether to allow the traffic, effectively blocks malicious access, and ensures the security of traffic between your public assets and the Internet.

Protected public assets (outbound and inbound): Assets such as ECS, EIP (including L2 EIP), load balancing, Bastionhost, NAT Gateway, HaVip, and GA EIP, which support both IPv4 and IPv6.

Click to view the detailed asset types that can be protected

IPv4

IPv6

  • ALB EIP

  • Bastionhost outbound IP address

  • Bastionhost IP address

  • Bastionhost inbound IP address

  • EIP

  • ECS EIP

  • ECS public IP address

  • ENI EIP

  • GA EIP

    Note
    • The GA instance to which the accelerated IP addresses belong must be a standard GA instance.

    • The accelerated IP addresses must be of the EIP type.

    • The acceleration region to which the accelerated IP addresses belong cannot be an Alibaba Cloud point of presence (POP).

      To check whether an acceleration region is a POP of Alibaba Cloud, call the ListAvailableBusiRegions operation.

  • HAVIP

  • NAT EIP

  • NAT public IP address

  • NLB EIP

  • SLB EIP

  • SLB public IP address

  • ALB IPv6

  • ECS IPv6

  • ENI EIP IPv6

  • GA EIP IPv6

    Note
    • The GA instance to which the accelerated IP addresses belong must be a standard GA instance.

    • The accelerated IP addresses must be of the EIP type.

    • The acceleration region to which the accelerated IP addresses belong cannot be an Alibaba Cloud point of presence (POP).

      To check whether an acceleration region is a POP of Alibaba Cloud, call the ListAvailableBusiRegions operation.

  • NLB IPv6

  • SLB IPv6

The following figure shows an example of a protection scenario for the Internet firewall.

image

Impact on services

Creating, enabling, or disabling the Internet firewall does not require changes to your network topology. You can enable or disable protection for resources with one click in seconds, which does not impact your services. We recommend that you enable the Internet firewall during off-peak hours.

Protection specifications

Starting from October 15, 2025, Cloud Firewall will release Billing Method 2.0. New users use Billing Method 2.0 by default. Existing users continue to use Billing Method 1.0. The protection specifications for the Internet firewall differ between the two billing methods.

Billing Method 2.0

Protection specification

Description

Cloud Firewall Subscription (Premium, Enterprise, and Ultimate Editions)

Cloud Firewall Pay-As-You-Go

Number of firewall instances

The number of protectable regions. Each protected region corresponds to one Internet firewall instance.

Depends on the number of purchased instances and bandwidth. For information about the number of instances and bandwidth provided by different editions, see Subscription 2.0. If the quota is insufficient, you can upgrade the specifications. For more information, see View the protection status of assets.

You are charged based on the actual number of firewall instances and the total traffic processed.

The maximum supported peak bandwidth is 10 Gbps. To request a higher specification, contact your account manager or architect. For more information about billing, see Pay-as-you-go 2.0.

Protected Internet Traffic

The peak of the total Internet traffic processed by the firewall. The billing is based on the sum of inbound and outbound Internet traffic bandwidth.

Billing Method 1.0

Protection specification

Description

Cloud Firewall Subscription (Premium, Enterprise, and Ultimate Editions)

Cloud Firewall Pay-As-You-Go

Number of protectable public IP addresses

The number of public IP addresses for which the Internet firewall can be enabled.

Depends on the number of protectable public IP addresses you purchased and the peak of the total traffic that can be processed. If the quota is insufficient, you can upgrade the specifications.

Different Cloud Firewall editions have different public IP address quota limits. For more information, see Subscription 1.0.

Note

If your service traffic exceeds the purchased processing capacity of Cloud Firewall, the Service-Level Agreement (SLA) is not guaranteed. This may trigger downgrade rules, such as disabling security features (access control list (ACL), IPS, log auditing), shutting down the firewall for assets with excessive traffic, or rate limiting and packet loss.

If your service traffic is at risk of exceeding the limit, see Pay-as-You-Go for Elastic Traffic on Subscription.

You are charged based on the actual number of protected public IP addresses and the peak of the total traffic processed. There is no quota limit. For more information about billing, see Pay-as-you-go 1.0.

Protected Internet Traffic

The peak of the total Internet traffic processed. The billing is based on the higher value between the inbound and outbound Internet traffic bandwidth.

View the protection status of assets

Cloud Firewall collects statistics on the current number of Internet firewall instances and unprotected public IP addresses. You can enable protection for public assets as needed.

Note

To ensure the security of your service traffic, enable Internet firewall protection for all public assets under your Alibaba Cloud account.

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. On the Internet Firewall tab, view the protection status of the public assets under your Alibaba Cloud account.

    image..png

  4. (Optional) If the Available Quotas is insufficient, click Upgrade to upgrade the specifications. For more information, see Subscription 2.0.

Enable the firewall

Manually enable protection for assets

If you have not enabled the Automatic Protection for New Assets feature, you can manually enable Internet Border protection for public assets.

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. On the Internet Firewall tab, click the IPv4 or IPv6 tab to manually enable protection for public assets.

    If the asset that you want to protect is not in the public asset list, click Synchronize Assets in the upper-right corner of the list. This synchronizes the asset information from your Alibaba Cloud account and its member accounts. The synchronization process takes 1 to 2 minutes.

    • Enable protection for a single asset: In the public asset list, find the public asset that you want to protect. In the Actions column, click Enable Protection.

    • Enable protection for multiple assets in a batch: In the public asset list, select the public assets that you want to protect. Below the list, click Enable Protection.

Enable automatic protection for new assets

After you enable Automatic Protection for New Assets, if new public assets are added to the current Alibaba Cloud account or its member accounts, Cloud Firewall automatically enables Internet Border protection for the new assets.

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. Enable the Automatic Protection for New Assets feature: On the Internet Firewall tab, turn on the switch next to Automatic Protection for New Assets.

  4. Select the types of new assets to automatically protect: Click Automatic Protection for New Assets. In the configuration panel that appears, select the new assets to protect based on asset type and region. After you complete the configuration, click Save.

    image

What to do next

After you create an Internet firewall, you can configure access control policies and view access logs for public assets to better manage traffic between your public assets and the Internet.

Configure access control policies

If you do not configure any access control policies, Cloud Firewall allows all traffic by default. You can create Internet firewall access control policies for fine-grained control over traffic between your public assets and the Internet.

On the Firewall Settings > Internet Firewall page, find the target Internet firewall. In the Actions column, click Configure Policy and select whether to configure an outbound or inbound access control policy for the public asset. For more information, see Configure access control policies for the Internet firewall.

Query audit logs

On the Traffic Logs > Internet Border tab of the Log Monitoring > Log Auditing page, you can set filter conditions to view access logs for traffic between public assets and the Internet. For more information, see Log auditing.

View traffic analysis

  • On the Traffic Analysis > Outbound Connections page, you can view traffic data for assets that actively access the Internet. This includes data for outbound unusual traffic tracing, Internet destinations accessed by assets, outbound connections from public assets, and outbound connections from private network assets. This helps you identify suspicious assets and secure your services. For more information, see Outbound connections.

  • On the Traffic Analysis > Internet Exposure page, you can view data about Internet access to your service assets. This includes data for inbound unusual traffic tracing, open public IP addresses, open ports, open applications, and the number of public IP addresses for cloud products. This helps you identify suspicious assets and secure your services. For more information, see Internet Exposure.

View attack prevention data

On the Firewall Settings > Internet Firewall page, find the target Internet firewall. In the Actions column, click View Attacks and select to view outbound or inbound attack prevention data for the public asset. For more information, see Intrusion prevention.

View Internet traffic processing status

In the navigation pane on the left, click Overview. Then, in the Asset Protection section of the Overview page, you can view the number of firewall instances, purchased traffic, and recent peak bandwidth.

image

More operations

Apply default Allow policies for security groups

Note

The Internet firewall protects traffic to and from the Internet. Therefore, you must confirm that the protected public assets are configured to allow Internet traffic. For more information, see the official documentation for the corresponding public asset.

When you protect ECS assets, including ECS public IP addresses and ECS EIPs, you can apply default Allow policies for Internet traffic with one click in the Cloud Firewall console. This lets you manage rules centrally without having to go to the ECS console to modify security group configurations.

How it works

Cloud Firewall applies four rules with the lowest priority (priority 100) to the security groups associated with your ECS assets. These rules allow Internet access for the ECS assets.

For rules with the same priority, ECS security groups match Deny rules first. Therefore, if you have a Deny rule with priority 100, the Allow policy applied by Cloud Firewall does not override your existing Deny rule.

Notes

  • The one-click default Allow policies for security groups affect all resources associated with the security group. Before you apply the policies, enable Cloud Firewall protection for all associated resources and properly configure inbound access control policies for the Internet firewall. Otherwise, you risk Internet exposure.

    Do not apply default Allow policies for resources that do not have Cloud Firewall enabled. For resources that already have an Allow policy, do not disable the Cloud Firewall protection.

  • After your Cloud Firewall service expires, the four Allow policies automatically added by Cloud Firewall remain in the security group and are still in effect. If you no longer use the Cloud Firewall service, you must manually delete the four default Allow policies applied by Cloud Firewall. For more information, see delete security group rules.

Limits

  • The feature to apply default Allow policies for security groups supports only inbound rules for ECS public IP addresses and ECS EIPs.

  • You cannot apply default Allow policies for enterprise security groups.

Apply Allow policies

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. On the Internet Firewall tab, click the IPv4 or IPv6 tab.

  4. In the public asset list, find the ECS asset for which you want to apply the default policy. In the Default Allow Policies column, click Apply.

  5. (Optional) If a rule in the current security group conflicts with the rule to be applied, adjust the policy first.

    • Adjustable policy conflict: A rule in the security group has the same priority as the rule to be applied, but they have different protocol types, port ranges, or authorization objects.

      In the Default Allow Policies dialog box, click Quick Modify to resolve the conflict by increasing the priority of the original rule in the security group.

    • Non-adjustable policy conflict: A rule in the security group has the same priority, protocol type, port range, and authorization object as the rule to be applied.

      We recommend that you go to the Security Group page in the ECS console to view and adjust conflicting rule priorities. For more information, see Modify security group rules. Alternatively, you can submit a ticket to contact a product technical expert for consultation.

  6. In the Actions column for the security group, click Quick Apply. View the four Allow policies to be applied, and then click OK.

    If an ECS instance is associated with multiple security groups, you must apply the Allow policies for all associated security groups for the default Allow policy of the ECS instance to take effect.

    image.png

After the security group is configured, you can view the status of the default Allow policy on the Firewall Settings > Internet Firewall page. This helps you confirm whether the policy was successfully applied and promptly troubleshoot any issues.

The security group policy application statuses include the following:

  • Applied: The default Allow policies have been applied to all security groups associated with the ECS asset.

  • Not Applied: The default Allow policies have not been applied to some or all of the security groups associated with the ECS asset, or there is a configuration conflict.

  • -: The one-click application of default Allow policies is not supported for this asset type.

Download the public asset list

You can download the asset information from the public asset list to your computer as a CSV file.

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. On the Internet Firewall tab, click the IPv4 or IPv6 tab.

  4. In the upper-right corner of the public asset list, click the image.png icon.

  5. In the upper-right corner of the Internet Firewall tab, click Download Task Management to view the download progress. After the task is complete, click Download in the Actions column.

Disable Internet firewall protection

Warning

If you disable Internet firewall protection for a public asset, Cloud Firewall can no longer manage the traffic of that asset. This may expose the asset to risks such as malicious attacks and data breaches. Proceed with caution.

  1. Log on to the Cloud Firewall console.

  2. In the navigation pane on the left, click Firewall Settings.

  3. On the Internet Firewall tab, click the IPv4 or IPv6 tab. In the public asset list, find the public asset for which you want to disable protection. In the Actions column, click Disable Protection.