[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-01。"],[],[],null,["# Troubleshoot Cloud NGFW policies for RoCE network profiles\n\n| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nThis page describes how to troubleshoot common issues that you might encounter\nwhen setting up Cloud Next Generation Firewall policies for\nVirtual Private Cloud (VPC) networks with the remote direct\nmemory access (RDMA) over converged ethernet (RoCE) network profile.\n\n### Default policy allows all connections\n\nThis issue occurs when you don't associate any firewall policy for a\na VPC network with the RoCE network profile.\n\nTo resolve this issue, define a firewall policy for your VPC\nnetwork with the RoCE network profile. If you don't define a policy, all\nvirtual machine (VM) instances in the same VPC network\nconnect to one another by default. For more information, see\n[Create a network with the RDMA network profile](/firewall/docs/create-manage-roce-vpcs#create_a_network_with_the_rdma_network_profile).\n\n### Implied firewall rule allows ingress traffic\n\nThis issue occurs when a RoCE firewall policy attaches to a\nVPC network by using the RoCE network profile and no other\nmatching rules.\n\nTo resolve this issue, understand that the implied firewall rule for a\nRoCE network firewall policy is `INGRESS ALLOW ALL`. This rule\napplies if no other rules match.\n\n### Cannot enable logging on implied deny rule\n\nThis issue occurs when you attempt to enable logging on the implied\n`DENY` rule for a RoCE firewall policy.\n\nTo resolve this issue, create a separate `DENY` rule. Use the\n`--src-ip-range=0.0.0.0/0` and `--enable-logging` flags with this rule. You\ncannot enable logging directly on the implied rule.\nFirewall action logs include the following connection information:\n\n- `ALLOW` logs are published once, at connection establishment, and provide 2-tuple (source IP address, destination IP address) information.\n- `DENY` logs provide 5-tuple information for the denied packet. These logs are repeated as long as traffic attempts continue, with a maximum rate of once every 5 seconds.\n\nFor more information about limits, see\n[Per firewall rule](/firewall/docs/quotas#per-firewall-rule).\n\nWhat's next\n-----------\n\n- [Cloud NGFW for the RoCE network profile](/firewall/docs/firewall-for-roce)\n- [Create and manage firewall rules for RoCE](/firewall/docs/create-manage-roce-vpcs)\n- [Network profiles overview](/firewall/docs/network-profiles)"]]