Cloud Firewall provides default allow policies. You can apply the default allow policies to security groups of Elastic Compute Service (ECS) instances with a few clicks. This topic describes how to apply default allow policies to security groups.
Background information
How default allow policies work
Cloud Firewall applies four access control policies with the lowest priority to the security groups of an ECS instance that has a public IP address. These policies allow traffic from the Internet to the public IP address. The access control policies are considered security group rules. The lowest priority is 100. The four policies are automatically created. You need only to confirm and save them for the security groups.
Limits
- Advanced security groups do not support default allow policies. For more information, see Advanced security groups. If an advanced security group contains ECS instances in a VPC, default allow policies cannot be applied to the security groups that contain the ECS instances in the VPC.
- Default allow policies can be applied only to security groups of an ECS instance that has a public IP address or an elastic IP address (EIP) to allow inbound traffic from the Internet to the public IP address or EIP. You cannot apply default allow policies to security groups to allow inbound traffic from the Internet to Internet-facing Server Load Balancer (SLB) instances.
- To better protect your assets, we recommend that you do not apply default allow policies to IP addresses for which the firewalls provided by Cloud Firewall are disabled. We recommend that you do not disable the firewalls for IP addresses to which you have applied default allow policies. Otherwise, the IP addresses may be exposed to the Internet.
Apply default allow policies
To apply default allow policies, perform the following steps:
- Do not apply the default allow policies to IP addresses for which the firewalls provided by Cloud Firewall are disabled.
- If traffic redirection is not supported for the public IP address of an ECS instance or an Internet-facing SLB instance, we recommend that you do not apply the default allow policies to that IP address.
- If your Cloud Firewall expires and you no longer need it, you can go to the ECS console to delete the four default allow policies. page in the
What to do next
After you apply the default allow policies, you can go to the
page to check whether the policies are applied to the security groups of your ECS instance. If the policies fail to be applied, troubleshoot the failure in time.The default allow policies can be in the following state:
- Applied: The policies are applied to all security groups of the ECS instance that has the IP address. All inbound traffic from the Internet to the ECS instances in the security groups are allowed. If an ECS instance is added to multiple security groups, you must apply the default allow policies to all the security groups before the policies can take effect.
- Not Applied: The policies are applied only to some security groups of the ECS instance that has the IP address. In this case, the security group rules control inbound traffic from the Internet to the ECS instance. If configuration conflicts among security group rules exist or you did not perform the One-click Apply operation, the policies may be in the Not Applied state.
- -: This type of asset does not support default allow policies. Default allow policies are supported only for public IP addresses and EIPs of ECS instances. IP addresses such as IP addresses of SLB instances, EIPs of elastic network interfaces (ENIs), and EIPs of network address translation (NAT) gateways are not supported.