Cloud Firewall - Access Control Policies of NAT Firewall Support Threat Intelligence Address Books
Mar 01 2024
Cloud FirewallContent
Target customers: enterprises and organizations that want to create access control policies based on threat intelligence address books for private IP addresses. Features released: 1. Threat intelligence address books can be referenced when users create access control policies for NAT firewalls and set the destination type to IP address or domain name. 2. Threat intelligence address books support various threat intelligence, including malicious IP addresses in Tor networks, central control IP addresses of remote control software, central control IP addresses of mining programs, central control IP addresses of command and control (C&C) servers, central control IP addresses of botnets, malicious domain names of DNSlog attacks, other malicious domain names, common online document websites, common social websites, and common disk websites. The threat intelligence address books are automatically updated.