tencent cloud

Network Detection and Response Switch
Last updated: 2025-12-19 15:53:24
Network Detection and Response Switch
Last updated: 2025-12-19 15:53:24

Configure Network Detection and Response Switch

1. Log in to the CFW console, in the left sidebar, click Network Detection and Response.
Note:
Go to CFW purchase page to purchase the Network Detction and Response feature.
To try out, you can submit a ticket to apply for a trial of the Network Detction and Response feature.
2. On the Network Detection and Response page, container clusters support enabling the Network Detction and Response based on nodes, and CVM supports enabling the Network Detction and Response switch based on assets.
After the Network Detction and Response switch is enabled, CFW mirrors outbound/inbound server traffic to perform the following analyses:
All traffic will pass through the Intrusion Defense engine for detection and analysis based on rules, and alarms will be triggered.
Logs record all traffic entering and exiting the server, including packet headers (Header) and payloads (Payload). For non-encrypted traffic, the Payload will be analyzed and interpreted to restore the protocol and application, with each packet recorded up to a maximum of 1000 bytes.
CVM supports enabling the Encrypted Traffic Detection feature, which can analyze and detect encrypted traffic. For more details, see Encrypted Traffic Detection.

Note:
If you need to enable Network Detection and Response for the public network traffic of GAAP assets, please first enable the corresponding CFW switches for the assets. You can click Go and Enable to quickly jump to the CFW console and complete the configuration.

Network Detection and Response Settings

Basic Settings

On the Network Detection and Response page, click Network Detction and Response Settings in the upper-right corner, go to Basic Settings to configure Settings for New Asset Traffic Analysis, Network Detction and Response Bandwidth Settings, and Network Detction and Response Overrun Handling.
New Asset Traffic Analysis Settings: Allows you to set whether new assets Auto on all traffic detect and respond and Automatically enable encrypted traffic analysis.
When the asset type is set to All New Assets
When Enable is selected for the switch for Auto on all traffic detect and respond, traffic analysis will be automatically enabled upon discovery of new public/non-public network CVMs, containers, and public network traffic assets.
When Disable is selected for the switch for Auto on all traffic detect and respond traffic analysis will not be automatically enabled upon discovery of new assets (public/non-public network CVMs, containers, and public network traffic assets).
When Enable is selected for the switch for Automatically enable encrypted traffic analysis, encrypted traffic analysis will be automatically enabled upon discovery of new public/non-public network CVMs, containers, and public network traffic assets.
When Disable is selected for the switch for Automatically enable encrypted traffic analysis, encrypted traffic analysis will not be automatically enabled upon discovery of new assets (public/non-public network CVMs, containers, and public network traffic assets).
When the asset type is set to Only New Public Network Assets
When Enable is selected for the switch for Auto on all traffic detect and respond, traffic analysis will be automatically enabled upon discovery of new public network CVM assets and public network traffic assets; non-public network assets will not have traffic analysis automatically enabled.
When Disable is selected for the switch for Auto on all traffic detect and respond, traffic analysis will not be automatically enabled upon discovery of new assets (public/non-public network CVMs, containers, and public network traffic assets).
When Enable is selected for the switch for Automatically enable encrypted traffic analysis, traffic analysis will be automatically enabled upon discovery of new public network CVM assets and public network traffic assets; encrypted traffic analysis will not be automatically enabled for non-public network assets.
When Disable is selected for the switch for Automatically enable encrypted traffic analysis, encrypted traffic analysis will not be automatically enabled upon discovery of new assets (public/non-public network CVMs, containers, and public network traffic assets).
Network Detection and Response bandwidth settings
Total traffic is the sum of peak inbound and outbound traffic of all instances. Please ensure the traffic analysis bandwidth or elastic analysis bandwidth is larger than the total traffic.
Elastic Protection: Set elastic analysis bandwidth. Analyze when traffic is less than the elastic analysis bandwidth. Perform overage handling when traffic is larger than the elastic analysis bandwidth. For details on billing and excess traffic handling, see Bandwidth Details. You can adjust the elastic analysis bandwidth value as needed. Click Edit to modify, and after completion, click Confirm to Adjust to save the settings.

Network Detection and Response overage handling: Exceeding bandwidth for traffic analysis will not cause packet loss or impact traffic rates in customer services, but will disable the Network Detction and Response feature.
Bandwidth specification exceeded traffic throttling and recovery mechanism
Weight range: 0 - 100 (default 50), larger values represent higher priorities.
Traffic throttling mechanism: when real-time bandwidth exceeds purchase specs, the system automatically closes high-weight resolutions first (if weights are identical, close in descending order of peak bandwidth) until real-time bandwidth drops to within purchase specs.
The recovery mechanism: when real-time bandwidth ≤ purchase specs, the system preferentially enables high-weight resolution (if weights are identical, start in descending order of peak bandwidth), with auto on for Network Detection and Response.
Single machine bandwidth overload self-protection and recovery mechanism
Cooldown: default 24 hours, shortest 10 minutes, longest 7 days, customizable configuration.
Self-protection mechanism: Every 30s detect server bandwidth utilization. When server bandwidth utilization > 40% (due to mirror traffic, corresponding total bandwidth utilization > 80%), the system disables Network Detection and Response for this server.
Recovery mechanism: every 30s detect server bandwidth utilization. When server bandwidth utilization remains ≤ 40% during the last 2 minutes of cooldown, the system automatically activates Network Detection and Response.
Supports batch editing of weights.
Excess of bandwidth specification triggers system banner alerts; both excess alarms and excess handling will send notifications via in-site messages, emails, SMS, and so on.


Storage Settings

On the Network Detection and Response page, click Network Detction and Response Settings in the upper-right corner, go to Storage Settings to Message Storage Configuration for Traffic, Traffic Log Storage Configuration, and Alarm Log Storage Configuration.
Note:
Enterprise Edition or higher users can modify the log storage type and storage duration, with a limit of once per month and takes effect within approximately 10 minutes.

Parameter Name
Parameter Description
Traffic Message Storage Configuration
Original Traffic Package Storage
Supports setting the storage length for the req_hex, rsp_hex, http_request_body, and http_response_body fields, defaults to 1024 bytes.
Optional values: 64, 128, 256, 512, 1024 bytes.
Traffic Log Storage Configuration
Traffic Log Retention Period
Go to the Log Storage Type Configuration page; default is 180 days.
Optional values: 7, 30, 60, 90, 180 days.
Log Storage Type
Go to the Log Storage Type Configuration page, where multiple selections can be made from Traffic in、Traffic out and east-west traffic.
Payload Storage
When enabled: HTTP data parsing fully saved.
When closed: Only retain the protocol header (http_request_header and http_response_header), not retain payload details (req_hex, rsp_hex, http_request_body, http_response_body).
Protocol Log Storage Range
Set the network protocol scope for storing Network Detection and Response traffic logs.
Basic Protocol Class: ICMP, TCP, UDP
Email: SMTP, SMTPS
Internet Type HTTP, HTTPS, DNS
File Transfer: FTP, SMB, FTP-DATA
Log-in Authentication: TLS
Remote Management Class: SSH, DCERPC
Alarm Log Storage Configuration
Alarm/Risk Log Retention Period
Go to the Log Storage Type Configuration page; you can set the log retention period to 7, 30, 60, 90, or 180 days.
Alarm Log Storage Type
Go to the Log Storage Type Configuration page, where multiple selections can be made from Threat Intelligence, Basic Rule, Virtual Patch, Blocked list and Honeypot.
Risk Log Storage Type
Network Detection and Response risk logs do not support configuration of storage type. By default, for weak password and API Sensitive Information Transmission, they are selected and cannot be modified.

File Detection Settings

On the Network Detction and Response page, click Network Detction and Response Settings in the upper-right corner, go to and select File Detection Settings to enable detection of abnormal file transfers.
Detection of abnormal file transfers: When it is enabled, it restores files transmitted in network traffic and leverages the Threat Intelligence cloud-based query scanning engine to accurately identify malicious files.


Configuration of Risk Policy

On the Network Detction and Response page, click Network Detction and Response Settings in the upper-right corner, go to Risk Analysis Settings to enable or disable port risks, weak credential risks, and sensitive data leakage risks:
Port Risk Detection Switch: Detect high-risk port exposure in real time, accurately locate the access source, destination IP, and destination port, and help determine whether the asset exposure surface converges.
Weak Password Risk Detection Switch: Detect weak password transmission, and locate low-security accounts. Click Rule Configuration to view specific detection rules.
Sensitive Data Leakage Risk Detection Switch: Analyze data leakage risks in real time and detect whether open apis leak sensitive information.


Notification Settings

On the Network Detction and Response page, click Network Detction and Response Settings in the upper-right corner, go to Notification Setting to configure overrun of bandwidth specification and overload of single-machine bandwidth.
receive notifications: When it is enabled, relevant alarm notifications will be received; when it is disabled, they will no longer be received.
Sent to: Select the sub-accounts to be notified from the sub-account list, and simultaneously select the master account for notification.
Alerting period: The time period to send alerts. Alerts triggered outside the time period will be ignored by default. The minimum time period is 1 hour. Up to five periods can be configured.


Log Parsing Settings

1. On the Network Detction and Response page, click Network Detction and Response Settings in the upper-right corner, go to and select Log Parsing Settings.
2. In the custom parsing field list, select the field to be edited and click Edit to parse special fields in HTTP Headers and add them to traffic logs. Currently, up to 3 custom fields can be parsed.


View Alarms Detected by Network Detction and Response

On the Alarm Center page, view threat alarms detected by Network Detction and Response. It supports analysis and detection of 8 alarm types including lateral movement and active outbound connections, and enables determination of attack results.
New Version of Alarm Center

Old Version of Alarm Center


View Logs Detected by Network Detction and Response

On the Network Detction and Response page, select the target CVM, container cluster, or public network traffic instance. Click View Alarm Logs or View Traffic Logs in the operation column to jump to the detailed alarm logs or traffic logs page for that instance. For specific operational guidance on the log page, see Viewing Network Detction and Response Logs.
On the Log Auditing > Network Detction and Response Logs page, you can view core log information related to Network Detction and Response, including: traffic analysis logs, traffic alarm logs, traffic risk logs, and detected file lists. The page provides basic log overview features. For specific operational guidance, see Viewing Network Detction and Response Logs.
On the Log Analysis page, you can obtain complete information of all Network Detction and Response logs stored in the past, quickly locate target logs based on custom search statements, and deeply mine the value of log data through reporting and statistical analysis services. The page supports advanced analysis and visualization features. For specific operational guidance, see Log Analysis.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback