Filter traffic based on HTTP headers, paths, and application-specific patterns.
Block or allow traffic based on geographic location of the source IP.
Protect against brute force attacks by limiting requests per IP or user.
Detailed logs of all firewall decisions with real-time analytics dashboards.
Track connection states and automatically allow return traffic for established connections.
Built-in protection against volumetric attacks up to 10 Tbps with automatic mitigation.
Control incoming traffic to your instances.
Control outgoing traffic from your instances.
Instance-level virtual firewall rules.
Subnet-level access control lists.