Help Center> Cloud Firewall> User Guide> Checking the CFW Dashboard
Updated on 2024-04-09 GMT+08:00

Checking the CFW Dashboard

The dashboard page displays the CFW overview, edition, and protection statistics, including the engine type, total number of EIPs and protected EIPs, peak traffic available for protection, and log storage space.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. In the navigation pane on the left, click and choose Security & Compliance > Cloud Firewall. The Dashboard page will be displayed.
  4. (Optional) If the current account has only one firewall instance, the firewall details page will be automatically displayed. In this case, skip this step.

    Check the information about each firewall instance under the account. Click View in the Operation column.
    Figure 1 Firewall instances
    Table 1 Firewall instance parameters

    Parameter

    Description

    Name/ID

    Name and ID of the firewall.

    Status

    Firewall status.

    Edition

    Firewall edition. Standard and professional editions are supported.

    Available EIP Protection

    Maximum number of EIPs that can be protected by the firewall.

    Peak Traffic Protection

    Maximum peak traffic that can be protected by the firewall.

    Billing Mode

    Billing mode of the current firewall.

    Enterprise Project

    Enterprise project that the firewall belongs to.

    Operation

    Check instance details.

  5. View details about the firewall. For more information, see Table 2.

    Figure 2 Firewall details
    Table 2 Detailed firewall information

    Parameter

    Description

    Firewall Name

    Firewall instance name. You can click to change the name.

    Firewall ID

    Firewall instance ID.

    Status

    Firewall status. It takes about 5 minutes to update the firewall status after purchase or unsubscription.

    Engine

    Firewall engine type.

    Used/Available EIP Protection Quota

    Number of protected EIPs/Total number of EIPs under a CFW instance.

    Protected VPCs/VPC Protection Quota

    Number of protected VPCs/Total number of VPCs under a firewall instance.

    Peak Traffic Protection

    Peak north-south traffic that can be protected.

    Protected Peak Traffic Between VPCs

    Peak east-west traffic that can be protected.

    Used/Available Protection Rules

    Number of created protection rules/Total number of protection rules that can be created under a firewall instance.

    Billing Mode

    Bling mode

    Auto-renewal

    Indicates whether the system automatically renews the service based on the subscription period when the service expires.

    Upon Expiration

    Billing policy after the firewall instance expires.

    Last Transaction Order

    Latest transaction order of the firewall instance.

    Created

    Time at which the firewall instance is created.

    Expires

    Estimated expiration time of the firewall instance.

    Upon Expiration

    Billing policy after the firewall instance expires.

  6. View firewall protection statistics. For more information, see Table 3.

    • EIP Protection
    • Inter-VPC Protection
    Figure 3 Protection statistics
    Table 3 Firewall protection statistics

    Parameter

    Description

    Total EIPs

    Total number of EIPs, both the protected and the unprotected.

    Total VPCs

    Total number of VPCs, both the protected and the unprotected.

    Unprotected

    The number of unprotected EIPs/VPCs.

    Protected

    Number of protected EIPs/VPCs.

    Protection Rate

    The percentage of the number of protected EIPs/VPCs to the total number of EIPs/VPCs.

  7. Operation Dashboard: View the Internet border and VPC border protection details. For details about the parameters, see Table 4.

    The query time can be Last 1 hour, Last 24 hours, or Last 7 days.
    Figure 4 Operations Dashboard
    Table 4 Operations Dashboard

    Parameter

    Description

    Blocked Accesses

    Number of times accesses are blocked based on protection rules.

    Intrusion Prevention

    Intrusion prevention mode and the number of intercepted attacks.

    Peak Outbound Traffic

    Maximum traffic initiated from internal services to the Internet.

    Peak Inbound Traffic

    Maximum traffic initiated from the Internet to internal servers.

    Peak Inter-VPC Traffic

    Maximum traffic between VPCs.

  8. Traffic Situation: View the traffic trend at the Internet border and VPC border. For details, see Table 5.

    The query time can be Last 1 hour, Last 24 hours, or Last 7 days.

    Figure 5 Traffic Situation
    Table 5 Traffic trend parameters

    Parameter

    Description

    Attacks

    Blocked and allowed accesses.

    Access Control

    Traffic blocked and allowed based on protection rules.

  9. In the Traffic Trend area, click Internet Boundaries or Inter-VPC Borders to check the corresponding statistics.

    Figure 6 Traffic Trend

    Internet Boundaries: Select an EIP and a query duration from the drop-down list boxes to view inbound and outbound traffic.

    VPC boundary: Select a query duration to view the traffic between VPCs.

    The traffic data of all EIPs and VPCs under the current account is displayed.

  10. Configure tags to identify firewalls so that you can classify and trace firewall instances.