All Products
Search
Document Center

Cloud Firewall:Cloud Firewall product selection guide

Last Updated:Mar 31, 2026

Cloud Firewall protects your cloud services by isolating security domains and controlling traffic at every boundary—Internet, NAT, VPC, and on-premises connections. This guide explains the deployment scenarios and helps you choose the right edition.

Security domain isolation

After migrating to the cloud, many enterprises leave their network architecture in a default state. As the business grows, this leads to exposed ports, excessive access privileges, and significant blast radius when any service is compromised. Dividing your assets into security domains—by function and communication relationship—contains risk and limits lateral movement.

Cloud Firewall enforces this isolation across four traffic directions.

Cloud Firewall covers Internet, NAT, VPC, and on-premises traffic boundaries. It does not inspect traffic within a single VPC at the host level—use the ECS firewall for microsegmentation within a VPC.

Protect inbound Internet traffic

Configure an Internet firewall to control all inbound traffic to your public IP assets.

Optionally, set up a virtual private cloud (VPC) as a demilitarized zone (DMZ). Use the DMZ VPC with elastic IP addresses (EIPs), Server Load Balancer (SLB), and public IP addresses of Elastic Compute Service (ECS) instances to receive inbound Internet connections before traffic reaches internal services.

Protect outbound Internet traffic

Configure an Internet firewall and NAT firewalls together to control outbound traffic—from private IP assets to the Internet and from internal networks.

Optionally, set up a VPC for a DMZ or separate VPCs per service. Combine them with EIPs and NAT Gateways to route outbound connections through controlled exit points.

Protect east-west traffic in the cloud

  1. Configure Cloud Enterprise Network (CEN) with an Enterprise Edition transit router. Attach VPCs to the transit router to connect network instances, and attach virtual border routers (VBRs) to enable cross-cloud interconnection.

  2. Configure a VPC firewall to secure traffic crossing VPC boundaries. The VPC firewall provides Layer 4 to Layer 7 access control, protection against lateral movement attacks, and log tracing.

  3. Configure an ECS firewall for microsegmentation within a single VPC.

Protect traffic between cloud and on-premises

Configure CEN or Express Connect. Connect your on-premises data center to CEN or Express Connect through a VBR to communicate with your cloud VPCs.

Configure a VPC firewall to monitor unusual traffic on these connections, apply fine-grained Layer 4 to Layer 7 access control policies, protect against lateral movement attacks, and run log audits.

Reference architectures

Large enterprises

For large enterprises, security domains are split into group-level and subsidiary-level domains. Group domains include Internet-facing production zones, internal-facing production zones, and production DMZs. The internal production network is further divided into general business domains, core business domains, and database domains.

image

Small companies

For small companies, security domains are divided into general business domains, core business domains, data security domains, and DMA security domains (for email systems and portal websites).

image

Choose an edition

Cloud Firewall offers two billing methods: subscription and pay-as-you-go (including pay-as-you-go savings plans).

Subscription includes three editions—Premium, Enterprise, and Ultimate—each with fixed asset quotas and bandwidth. Pay-as-you-go is billed based on actual usage.

Before selecting an edition, review the protection scope to confirm it matches your environment.

Quick decision guide

If your situation is...Start here
Fewer than 10 public assets, traffic peaks below 10 Mbps, and you only need north-south protectionPremium Edition (subscription) or pay-as-you-go
More than 10 public assets or traffic peaks above 10 Mbps, and you need VPC firewall for east-west traffic or classified protection complianceEnterprise Edition (subscription)
Large-scale deployment with 5 firewall instances, 800 Mbps bandwidth, and 100,000+ policy rules, or extra-large enterprise requiring maximum coverageUltimate Edition (subscription)
Temporary workloads, burst traffic, or you prefer to scale protection with usagePay-as-you-go

Edition overview

Premium EditionEnterprise EditionUltimate Edition
Best forSmall and medium-sized enterprises protecting public assets against north-south threats, with fewer than 10 public assets and peak bandwidth under 10 MbpsMedium and large enterprises that need VPC firewall for east-west traffic protection and classified protection complianceLarge and extra-large enterprises that need maximum scale (800 Mbps, 5 instances, 100,000 policies) and classified protection compliance
Firewall instances135
Bandwidth30 Mbps200 Mbps800 Mbps
Access control policies10,00050,000100,000 (customizable)
Base price

$420/month

$1,450/month

$3,900/month

Capability comparison

CategoryCapabilityDescriptionPremiumEnterpriseUltimatePay-as-you-go
Traffic protectionInternet firewallFine-grained protection for traffic between the Internet and public IP assets, including IPv4 and IPv6SupportedSupportedSupportedSupported
NAT firewallFine-grained protection for traffic from private IP assets to the InternetSupportedSupportedSupportedSupported
VPC firewallFine-grained protection for cross-VPC trafficNot supportedSupportedSupportedSupported
Operations and managementNetwork traffic analysisAnalyzes traffic at the Internet border, NAT border, and between VPCsSupportedSupportedSupportedSupported
Attack preventionDetects and blocks intrusion threatsSupportedSupportedSupportedSupported
Log analysisCollects, stores, and analyzes traffic logs in real time for event tracing and troubleshootingSupportedSupportedSupportedSupported
Multi-account managementShares resources and secures traffic access across multiple accountsSupportedSupportedSupportedSupported
Asset exception alertSends SMS or email notifications when an asset anomaly is detectedSupportedSupportedSupportedSupported
VPC firewall is not available in Premium Edition. If your environment includes cross-VPC traffic or requires east-west traffic protection, use Enterprise Edition or higher.

Billing method comparison

SubscriptionPay-as-you-go
Payment modelUpfrontBilled based on usage
Best forStable, predictable resource needs and long-term Cloud Firewall usageWorkloads that change frequently, temporary deployments, or burst scenarios
Asset volumeTypically more than 10 public assets or peak bandwidth above 10 MbpsSmaller asset footprint or lower traffic

For the full feature list, see Features.

What's next

  • Protection scope — Confirm which assets and traffic types are covered before purchasing

  • Features — Full feature list per edition