All Products
Search
Document Center

Cloud Firewall:Cloud Firewall product selection guide

Last Updated:Nov 10, 2025

Cloud Firewall helps you isolate and protect your services in the cloud. This helps ensure service security and meet compliance requirements. This topic describes how to use Cloud Firewall to protect your services.

Selection overview

After cloud adoption, an enterprise's security domains are often left in a default state due to factors such as business type, network scale, and service management. As the business grows, this can result in a disorganized network architecture. For example, unnecessary ports might be exposed to the Internet, or internal services might have excessive access privileges. If a service is attacked, it can create significant security risks. Therefore, enterprises must plan their security domains in the cloud.

A network security domain is like a hotel where different guests can stay on different floors and in different rooms without interfering with each other. In an IT environment, a database server and a customer-facing web server have different security levels. A server in a test environment also has a different security level than a server in a production environment. Therefore, you should divide your business assets into security domains based on their functions and communication relationships.

Cloud Firewall for security domain isolation

Scenario 1: Protect inbound Internet traffic

  • Principle: Ensure flexibility, elastic scaling, and security.

  • Configuration recommendations:

    • Configure an Internet firewall to manage inbound Internet traffic.

    • Optional: Configure a virtual private cloud (VPC) for demilitarized zones (DMZ). Use the VPC with Elastic IP Addresses (EIPs), Server Load Balancer (SLB), and public IP addresses of Elastic Compute Service (ECS) instances to provide inbound Internet connections.

Scenario 2: Protect outbound Internet traffic

  • Principle: Ensure flexibility, elastic scaling, and security.

  • Configuration recommendations:

    • Configure an Internet firewall and NAT firewalls to manage outbound traffic to the Internet and from private networks.

    • Optional: Configure a VPC for a DMZ or different VPCs for different services. Use the VPCs with EIPs and NAT Gateways to provide outbound Internet connections.

Scenario 3: Protect east-west traffic in the cloud

  • Principle: Isolate environments and ensure necessary connectivity and security.

  • Configuration recommendations:

    • Configure Cloud Enterprise Network (CEN). We recommend that you use an Enterprise Edition transit router. Attach VPCs to the transit router to connect network instances in the cloud. You can also attach virtual border routers (VBRs) to the transit router to implement cross-cloud interconnection.

    • Configure a VPC firewall to secure service traffic across VPCs or clouds. This includes Layer 4 to Layer 7 access control, protection against lateral movement attacks, and log tracing.

    • Configure an internal firewall to implement microsegmentation within a VPC.

Scenario 4: Protect traffic between cloud assets and on-premises data centers

  • Principle: Enable communication between cloud assets and on-premises data centers and ensure security.

  • Configuration recommendations:

    • Configure CEN or Express Connect. Connect your on-premises data center to CEN or Express Connect through a VBR to enable communication with your business groups in VPCs.

    • Configure a VPC firewall to monitor unusual traffic between your on-premises data center and business groups in your VPCs. You can also implement fine-grained Layer 4 to Layer 7 access control policies, protect against lateral movement attacks, and perform log audits.

Network structure for security domain isolation using Cloud Firewall

Large groups

For large enterprises, the security domains of the production network are divided into group security domains and subsidiary security domains. Group security domains are further divided into Internet-facing production zones, internal-facing production zones, and production DMZs. The internal production network is further divided into general business security domains, core business security domains, and database security domains based on business type.

image

Small companies

For small companies, security domains are divided into general business security domains, core business security domains, data security domains, and DMA security domains (for email systems and portal websites) based on business type, functional modules, and network communication relationships.

image

Select an edition: A multi-dimensional comparison

Before you select a Cloud Firewall edition, you should understand the protection scope of Cloud Firewall to ensure it matches your business needs. For more information, see Protection scope.

Cloud Firewall offers two billing methods: pay-as-you-go (which includes pay-as-you-go savings plans) and subscription. The subscription method includes three editions: Premium Edition, Enterprise Edition, and Ultimate Edition. Each edition offers different features, asset quotas, and bandwidth extension specifications.

You can use the following comparison tables to select a suitable edition. For more information, see Functions and features.

Capability comparison

Professional protection capabilities

Capability

Description

Subscription

Pay-as-you-go edition

Premium Edition

Enterprise Edition

Ultimate Edition

Internet firewall

Provides fine-grained protection for traffic between the Internet and your public IP assets, including IPv4 and IPv6.

Support

Supported

Supported

Supported

NAT firewall

Provides fine-grained protection for traffic from private IP assets to the Internet.

Supported

Supported

Supported

Supported

VPC firewall

Provides fine-grained protection for cross-VPC traffic.

Not supported

Supported

Support

Supported

Enterprise-level O&M capabilities

Capability

Description

Subscription

Pay-as-you-go edition

Premium Edition

Enterprise Edition

Ultimate Edition

Network traffic analysis

Helps you analyze traffic on the Internet border, NAT border, and between VPCs.

Supported

Support

Supported

Supported

Attack prevention

Helps you accurately detect and block intrusion threats.

Supported

Support

Supported

Supported

Log analysis

Automatically collects, stores, and analyzes traffic logs in real time to help you trace events and troubleshoot faults.

Supported

Supported

Supported

Supported

Multi-account management

Helps you share resources and secure traffic access across multiple accounts.

Supported

Supported

Supported

Supported

Asset exception alert

The feature promptly notifies you by text message or email when an asset is abnormal.

Support

Supported.

Support

Supported.

Scenario comparison

Subscription

Pay-as-you-go edition

Premium Edition

Enterprise Edition

Ultimate Edition

  • Suitable for enterprises with stable service usage and resource consumption.

  • Applicable to scenarios with many assets (typically more than 10 public assets) or high traffic (typically with a peak bandwidth of more than 10 Mbps).

  • Suitable for enterprises where service usage often changes, and resource use is temporary or has bursts.

  • Applicable to small and medium-sized enterprises with fewer assets or lower traffic.

An entry-level firewall that helps small and medium-sized enterprises protect inbound and outbound traffic for public assets in the cloud.

A mid-range firewall that helps medium and large enterprises protect north-south and east-west traffic in the cloud and fully meet classified protection compliance requirements.

An advanced firewall that helps large and extra-large enterprises protect north-south and east-west traffic in the cloud and fully meet classified protection compliance requirements.

Metric comparison

Metric

Subscription

Premium Edition

Enterprise Edition

Ultimate Edition

Number of firewall instances

1

3

5

Bandwidth

30 Mbps

200 Mbps

800 Mbps

Access Control Policy Specifications

10,000

50,000

100,000 (customizable)

Cost comparison

Cost

Subscription

Pay-as-you-go edition

Premium Edition

Enterprise Edition

Ultimate Edition

Billing method

Subscription (upfront). Suitable for scenarios where resource needs are stable and predictable, and you plan to use Cloud Firewall for a long time.

Pay-as-you-go. Suitable for scenarios where service usage often changes, and resource use is temporary or has bursts.

Base price per edition

$420/month

$1,450/month

$3,900/month

Billed based on usage