Virtual Fire Wall (VFW)

The virtual fire wall product is a professional boundary security protection product for cloud tenants, which solves security problems such as boundary access control, intrusion prevention, and virus protection in the current cloud environment. Virtual Fire Wall is delivered in the form of virtual machine instances, and achieves hierarchical, comprehensive, and scalable security isolation and security protection for north-south traffic with the intelligent traffic diversion technology.

  • Product advantages
  • Product functions
  • Application scenarios
  • solution

Product advantages

  • Flexible engine technology

    Virtual Fire Wall products use the HOOK architecture, integrate multiple security engines, and provide flexible scalability.

  • 安全稳定.png
    Intrusion detection/prevention technology

    The Virtual Fire Wall Attack Detection Engine uses a variety of comprehensive technical means to determine intrusion behaviors.

  • Dual virus detection engine

    It supports fast scanning and deep scanning, and selects different virus detection engines according to the protocol and application scenario of the application layer to be detected.

  • 可拓展.png
    Stable and reliable

    The system is designed with full-link and high availability and high reliability for the underlying data storage, supporting non-disruptive storage elastic scaling of applications.

Product functions

  • Fine-grained access control

    A protection-in-depth rule includes the source address, destination address, source port, source MAC address, incoming network port, and outgoing network port.

  • Integrated security protection

    Through a single security policy, you can formulate multi-dimensional access control policies and integrate multiple protection capabilities.

  • Deep content filtering

    The full content detection technology is adopted; Deep filtering of content across multiple protocols based on streams and transparent proxies.

  • Intrusion prevention

    The product has a built-in database of more than 4,000 intrusion attack signatures, and has complete defense methods such as detection, blocking, and current limiting.

  • Virus protection

    The number of built-in virus signatures is not less than 3 million. Different defense strategies are adopted based on source/destination IP addresses, etc.

  • Application control

    According to different times and groups, strict management policies are issued for instant chat software, online games, etc.

  • Session management

    It has a complete status detection table and supports the restriction of concurrent sessions and new sessions based on IP globally.

Application scenarios

  • Department-level/user-level access control within the tenant

  • Virtual area boundary intrusion & virus attack protection

  • Audit of virtual area boundary access behavior

  • There are people in different departments and different roles, and they have different access rights to data. If there is no control over the access to data, it may lead to unauthorized access to the data, which in turn leads to the leakage of sensitive data. Through Virtual Fire Wall, the control over personnel or tenants' data access permission can be achieved.

  • This solution can effectively prevent threats to the virtual area boundary, including viruses carried by internal access to tenant units, attacks brought about by opening to the outside world, and other intrusion attacks and viruses.

  • Effectively audit network access and exit behaviors for the virtual boundary audit, including recording internal access behaviors, discovering illegal access, auditing external network access, and discovering illegal outreach.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.