All Products
Search
Document Center

Cloud Firewall:Intrusion Prevention

Last Updated:Mar 18, 2026

Cloud Firewall’s intrusion prevention system (IPS) detects and blocks malicious traffic in real time. This includes hacker attacks, vulnerability exploits, brute-force attacks, worms, mining programs, backdoor trojans, and DoS attacks. It protects your cloud-based information systems and network architecture from unauthorized access, data breaches, service damage, or breakdowns.

Limits

  • Cloud Firewall intrusion prevention supports decrypting and inspecting encrypted traffic through TLS inspection for outbound traffic at the Internet Border. For inbound traffic at the Internet Border, combine Cloud Firewall with the Web Application Firewall to enhance protection. TLS/SSL decryption and inspection are not supported at the VPC border.

  • Data aggregation introduces a delay in Cloud Firewall’s intrusion prevention statistics. To query real-time data, use log audit or log analysis. For details, see log audit or query and analyze logs.

    • When you query defense data for the last hour, results have a 10-minute delay. Events that occurred in the last 10 minutes do not appear in the results.

    • When you query defense data for more than one hour — including the most recent 30 minutes — results have a 30-minute delay. Events that occurred in the last 30 minutes do not appear in the results.

      For example, if the current time is 15:00:00, querying data from 12:00:00 to 15:00:00 excludes data from 14:30:00 to 15:00:00. Querying data from 12:00:00 to 14:30:00 returns complete results for that period.

View or modify intrusion prevention rules

After you activate Cloud Firewall, the threat engine in Mitigation Settings defaults to Block Mode. In this mode, Cloud Firewall automatically blocks attacks. Cloud Firewall selects an appropriate block mode level — Loose, Moderate, or Strict — based on your service traffic. Threat intelligence, basic defense, and virtual patches are enabled by default.

You can go to the IPS Configuration page using either of these methods:

  • From the IPS page, click the link in the upper-right corner of the Protection Details List.

    image

  • In the navigation pane on the left, select Prevention Configuration > IPS Configuration.

On the Basic Protection card, view the default intrusion prevention rules. To change a rule, find it in the list and update its action in the Current Action column. For more information, see IPS Configuration.

Enable IPS Private IP Tracing

  • Entry point:

    From the IPS page, click the link in the upper-right corner of the Protection Details List to go directly to the IPS Private IP Tracing Configuration page.

    image

  • Enable

    On the IPS Private IP Tracing page, enable tracing for specific resources. This helps you quickly locate risky assets without exposing internal network asset IP addresses.

    Note

    IPS Private IP Tracing requires both Internet firewall protection and NAT session log service to be enabled for the same asset. For step-by-step instructions, see IPS Private IP Tracing Configuration.

    image

  • Traceability:

    After you enable the feature, view risky asset IP addresses in the Protection Details List and Details sections of the IPS page.

    List

    Details

    image

    image

View Internet blocking events

Cloud Firewall provides statistics on inbound and outbound Internet traffic for your cloud assets. These statistics help you assess how well Cloud Firewall protects your assets and keep them secure. You can query Internet blocking data for up to the last 90 days. Each query covers a maximum of 31 days.

Go to the Detection and Response > Security Events > IPS page. On the Protection Status tab, set a time range and view protection statistics and the protection details list.

  • The Protection Statistics module shows total attacks, Attack Type Distribution, and blocking data. 互联网防护

    Blocking data metrics include the following:

    • Top Blocked Destinations: Displays the top 5 destination IP addresses among traffic blocked by Cloud Firewall.

      Hover over a blocked destination IP and click the 查看日志 icon to open the Log Audit page. There, view detailed information such as destination port, application type, and action for that IP.

    • Top Blocked Sources: Shows the top three source types by percentage among traffic blocked by Cloud Firewall.

    • Top Blocked Applications: Displays the top five application types among traffic blocked by Cloud Firewall.

  • Protection Details List: Lists protection details for attack traffic, based on your query conditions. Details include risk level, event count, source IP address, and destination IP address.

    image

    Note

    If the source IP is a WAF or DDoS back-to-origin IP address, Cloud Firewall detects such back-to-origin IP addresses and displays WAF Back-to-origin IP Address and Anti-DDoS Back-to-origin IP Address.

    In this section, you can:

    • Search for events: Set filters such as risk level, defense status, attack type, source, direction, and time range. Then click Search to view matching events.

    • View event details: In the Actions column, click Details to open the blocked event details page. View Basic Information, Attack Payload, and other details. The Attack Payload shows 5-Tuple Information and content of the payloads. This helps you trace attacks and reduce security risks.

    • Download blocked events: Click the 下载图标 icon to the right of the search bar. Then download the events from the Download Task Management panel in the upper-right corner.

    • AI-assisted event analysis: Click the AI Analysis column's image icon to use the Security AI Assistant for quick event analysis assistance.

      This includes:

      Payload content analysis: A brief description of the request and AI analysis of the requested action.

      image

      Threat intelligence: Comparison result between the destination address and the threat intelligence database.

      Note

      This feature is not available in the Cloud Firewall Premium Edition or pay-as-you-go edition.

      Attacker intent: AI-predicted attacker behavior.

      Mitigation recommendations: Suggestions for Cloud Firewall mitigation settings (such as ACL policies and IPS configuration) and asset checks.

View VPC blocking events

Cloud Firewall provides traffic protection statistics for traffic between VPCs. You can view traffic flow and blocking status for your VPCs. You can query VPC blocking data for up to the last 90 days. Each query covers a maximum of 31 days.

Note

Cloud Firewall Premium Edition does not support VPC firewall and does not display the VPC Protection tab.

Go to the Detection and Response > Security Events > IPS page. On the VPC Protection tab, view details such as event name, risk level, and attack type for VPC blocking events in your selected time range.

image

You can:

  • Search for events: Set filters such as risk level, defense status, attack type, and time. Then click Search to view matching events.

  • View event details: In the Actions column, click Details to open the blocked event details page. View Basic Information, Attack Payload, and other details. The Attack Payload shows 5-Tuple Information and content of the payloads. This helps you trace attacks and reduce security risks.

  • Download protection events: Click the 下载图标 icon to the right of the search bar. Then download the events from the Download Task Management panel in the upper-right corner.

  • AI-assisted event analysis: Click the image icon in the AI Analysis column to quickly analyze the event with the Security AI Assistant.

    This includes:

    Payload content analysis: A brief description of the request and AI analysis of the requested action.

    image

    Threat intelligence: Comparison result between the destination address and the threat intelligence database.

    Note

    This feature is not available in the Cloud Firewall Premium Edition or pay-as-you-go edition.

    Attacker intent: AI-predicted attacker behavior.

    Mitigation recommendations: Suggestions for Cloud Firewall mitigation settings (such as ACL policies and IPS configuration) and asset checks.