Checking the CFW Dashboard
The dashboard page displays the CFW overview, edition, and protection statistics, including the engine type, total number of EIPs and protected EIPs, peak traffic available for protection, and log storage space.
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation pane, click
and choose . The Dashboard page will be displayed, as shown in Figure 1.
- (Optional) If the current account has only one firewall instance, the firewall details page will be automatically displayed. In this case, skip this step.
Check the information about each firewall instance under the account. Click a name in the Name/ID column or click View in the Operation column.
Table 1 Firewall instance parameters Parameter
Description
Name/ID
Name and ID of the firewall.
Status
Firewall status.
Edition
Firewall edition. Standard and professional editions are supported.
Available EIP Protection
Maximum number of EIPs that can be protected by the firewall.
Peak Traffic Protection
Maximum peak traffic that can be protected by the firewall.
Billing Mode
Billing mode of the current firewall.
Enterprise Project
Enterprise project that the firewall belongs to.
Operation
Check instance details.
- View details about the firewall. For more information, see Table 2.
Figure 2 Firewall details
Table 2 Detailed firewall information Parameter
Description
Firewall Name
Firewall instance name. You can click
to change the name.
Firewall ID
Firewall instance ID.
Status
Firewall status. It takes about 5 minutes to update the firewall status after purchase or unsubscription.
Engine
Firewall engine type.
Used/Available EIP Protection Quota
Number of protected EIPs/Total number of EIPs under a CFW instance.
Protected VPCs/VPC Protection Quota
Number of protected VPCs/Total number of VPCs under a firewall instance.
Peak Traffic Protection
Peak north-south traffic that can be protected.
Protected Peak Traffic Between VPCs
Peak east-west traffic that can be protected.
Used/Available Protection Rules
Number of created protection rules/Total number of protection rules that can be created under a firewall instance.
Billing Mode
Bling mode
- View firewall protection statistics. For more information, see Table 3.
- EIP Protection
- Inter-VPC Protection
Figure 3 Protection statisticsTable 3 Firewall protection statistics Parameter
Description
Total EIPs
The total number of EIPs, both the protected and the unprotected.
Total VPCs
The total number of VPCs, both the protected and the unprotected.
Unprotected
The number of unprotected EIPs/VPCs.
Protected
Number of protected EIPs/VPCs.
Protection Rate
The percentage of the number of protected EIPs/VPCs to the total number of EIPs/VPCs.
- In the Security Dashboard area, view the CFW protection details at the Internet and VPC borders. For details about the parameters, see Table 4.
The query time can be Last 1 hour, Last 24 hours, or Last 7 days.Figure 4 Security Dashboard
Table 4 Security Dashboard Parameter
Description
Blocked Accesses
Number of times accesses are blocked based on protection rules.
Intrusion Prevention
Intrusion prevention mode and the number of intercepted attacks.
Peak Outbound Traffic
Maximum traffic initiated from internal services to the Internet.
Peak Inbound Traffic
Maximum traffic initiated from the Internet to internal servers.
Peak Inter-VPC Traffic
Maximum traffic between VPCs.
- In the Traffic Situation area, check the Internet and VPC border traffic trends. Table 5 describes the traffic trend parameters.
The query time can be Last 1 hour, Last 24 hours, or Last 7 days.
Figure 5 Traffic Situation - In the Traffic Trend area, click Internet Boundaries or Inter-VPC Borders to check the corresponding statistics.
Internet Boundaries: Select an EIP and a query duration from the drop-down list boxes to view inbound and outbound traffic.
VPC boundary: Select a query duration to view the traffic between VPCs.
The traffic data of all EIPs and VPCs under the current account is displayed.
- Configure tags to identify firewalls so that you can classify and trace firewall instances.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.