All Products
Search
Document Center

Cloud Firewall:Configure the mode of the access control engine

Last Updated:May 22, 2025

After you configure access control policies, Cloud Firewall matches traffic packets against the 4-tuple, application type, and domain name in sequence. A 4-tuple refers to the source address, destination address, destination port, and transport layer protocol. If Cloud Firewall cannot identify the application type or domain name of traffic, Cloud Firewall automatically allows the traffic to ensure normal business operations. If you do not want to allow the unidentified traffic, you can enable the strict mode.

Traffic matching rules of Cloud Firewall

After you configure access control policies, Cloud Firewall matches traffic packets against the 4-tuple, application type, and domain name in sequence when traffic passes through Cloud Firewall.

  • Loose mode: When traffic packets do not contain standard application information or domain names, Cloud Firewall may not be able to identify the application type or domain name of the traffic. In this case, Cloud Firewall automatically allows the traffic.

    • The application type in the policy is other than ANY.

    • A domain name is specified, and Domain Name Identification Mode is set to FQDN-based Dynamic Resolution (Extract Host and SNI Fields) or FQDN and DNS-based Dynamic Resolution.

  • Strict mode: Cloud Firewall does not directly allow traffic whose application type or domain name is unidentified. Cloud Firewall continues to match the traffic against the access control policy that has a lower priority until an access control policy is hit. Then, Cloud Firewall performs the action specified in the access control policy. If no access control policy is hit after Cloud Firewall matches traffic against all access control policies, Cloud Firewall automatically allows the traffic.

image
Important
  • If normal traffic is blocked after the strict mode is enabled, we recommend that you add the required application information to the request packets or disable the strict mode.

  • By default, the strict mode is enabled for new VPC firewalls.

Enable or disable the strict mode of the access control engine

You can configure the mode of the access control engine for the Internet firewall and NAT firewalls. By default, the access control engine is in Loose Mode. In this mode, the traffic whose application type or domain name is identified as Unknown is automatically allowed to prevent negative impacts on your workloads. You can change the mode to Strict Mode if required.

FAQ

How do I view the logs of unidentified traffic?

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Log Monitoring > Log Audit.

  3. On the Traffic Logs > Internet Border tab, select Access Control for Rule Source, select Application Unidentified or Domain Name Unidentified for All Pre-match Access Control Policy Statuses, and then click Search.

    image.png

  4. View the logs of traffic in strict mode. The logs include the following information: time, source IP addresses, destination IP addresses, and destination ports.

References