All Products
Search
Document Center

Cloud Firewall:Features supported by different Cloud Firewall editions

Last Updated:Mar 31, 2026

Cloud Firewall offers four editions. This page lists the features each edition supports so you can choose the right one before you purchase.

Important

Starting October 15, 2025, Cloud Firewall uses Billing 2.0. New users use Billing 2.0 by default. Existing users can stay on Billing 1.0 or upgrade. See Billing 1.0 and upgrade instructions for details.

Feature list

The table below covers all features under Billing 2.0.

错 — Not supported
对 — Supported

Dashboard

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
OverviewShows protected assets, traffic data for the last 7 days, and defended security risks.对对对对Data overview
Traffic topology graphDisplays a visual traffic topology graph for cloud assets protected by Cloud Firewall.错错对对Traffic topology graph

Firewall switch

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Internet firewallProtects inbound and outbound traffic between the Internet and public assets (IPv4 and IPv6).对对对对Internet firewall
NAT firewallProtects traffic from private IP assets that access the Internet through a NAT gateway.对对对对NAT firewall
VPC firewallProtects traffic between virtual private clouds (VPCs) and between VPCs and data centers.对错对对VPC firewall

Network traffic analysis

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Suspicious outbound connectionsMonitors outbound connections from public and private assets to the Internet in real time to detect unusual traffic.对对对对Outbound connections
Internet exposureDetects the IP addresses, ports, and applications of protected assets exposed to the Internet, with visual analytics reports.对对对对Internet Exposure
VPC accessMonitors traffic between interconnected VPCs in real time to detect and troubleshoot unusual traffic.对错对对VPC Access

Attack prevention

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Intrusion preventionDetects and blocks malicious traffic in real time, including hacker attacks, exploits, brute-force attacks, worms, mining programs, backdoor trojans, and DoS attacks.对对对对Intrusion prevention
Vulnerability preventionSyncs vulnerabilities detected by Security Center on public assets and provides attack prevention for them, closing the loop between detection and protection.对对对对Vulnerability Prevention
Breach awarenessDetects server intrusion events to prevent business losses.对对对对Breach awareness
Data breachDetects sensitive data leaks and risky payloads in outbound connections from your cloud assets.对对对对Data breach
IPS configurationConfigures the threat detection engine with five protection modes: Basic protection intercepts common cloud attacks such as port scans, database attacks, reverse shells, and exploits. Virtual patching blocks popular vulnerabilities and high-risk exploits without requiring patches. Threat intelligence draws on Alibaba Cloud's global database of malicious IPs and domains to block unknown threats (not available in Premium). Intelligent defense uses AI to detect advanced unknown attacks. Protection whitelist lets normal service traffic pass even if it resembles attack traffic.对对 (threat intelligence not available)对对IPS Configuration

Access control

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Internet borderLayer 4–7 access control (north-south) for inbound and outbound traffic on public assets. Blocks external attacks and controls active outbound connections.对对对对Configure an access control policy for the Internet border
NAT borderLayer 4–7 access control (north-south) for private IP traffic behind a NAT gateway that accesses the public network.对对对对Configure an access control policy for the NAT border
VPC borderAccess control (east-west) for traffic between VPCs, between VPCs and data centers, or between VPCs and third-party clouds.对错对对Configure an access control policy for the VPC border
Internal borderAccess control for inbound and outbound traffic between ECS instances to restrict unauthorized lateral movement.错错对对Internal firewall
Security group checkAudits high-risk rules in ECS security groups and suggests remediation.对对对对Security group check
Address booksGroups IP addresses, ports, or domain names into reusable address books — custom, cloud service, or threat intelligence. Reference and auto-update them in access control policies with one click.对对对对Manage address books

Synchronization nodes

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
ACK cluster synchronization nodesDynamically collects pod IP addresses from ACK container environments and syncs them to address books. Eliminates manual updates caused by frequent IP changes.对 Up to 5对 Up to 2image Up to 5image Up to 10ACK cluster
Private DNS synchronization nodesAutomatically resolves domain name-to-IP mappings from PrivateZone or self-managed DNS servers for use in domain-based access control policies.Private DNS

Log monitoring

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Log auditingRetains 7 days of logs by default for event tracing and troubleshooting. Covers three log types: Event logs (traffic that matched an access control policy, including threat type, source and destination IPs, application type, and severity), Traffic logs (all traffic through Cloud Firewall for post-incident analysis), and Operation logs (all configuration changes, such as enabling the firewall or modifying IPS settings).对对对对Log auditing
Log analysisCollects and analyzes all traffic logs in real time. Storage duration is configurable from 7 to 730 days, and you can customize the delivery switch. Supports custom real-time alerts on specific metrics.对对对对Log analysis

Management and monitoring

FeatureDescriptionPay-as-you-goPremiumEnterpriseUltimateReferences
Business visualizationGroups cloud assets into applications, application groups, and business groups. Visualizes asset information and access relationships across your entire cloud environment.错错对对Custom groups, Security group visualization, Application Group Visualization
Multi-account managementManages multiple Alibaba Cloud accounts from a single console to share resources and ensure secure traffic access.对对对对Multi-account management
Alert notificationsSends SMS or email alerts when traffic anomalies, host compromises, suspicious outbound connections, vulnerability threats, disabled protection, or disabled intrusion prevention are detected.对对对对Alert notifications

References