Help Center/ Cloud Firewall/ User Guide/ Checking the Dashboard
Updated on 2024-10-22 GMT+08:00

Checking the Dashboard

On the Dashboard page, you can view the basic information, overall protection capabilities, traffic topology , and statistics of firewall instances to learn about the security status and traffic of cloud assets at any time.

Constraints

VPC border protection details can be viewed only after a VPC border firewall is configured.

Checking the Dashboard

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. In the navigation pane on the left, click and choose Security & Compliance > Cloud Firewall. The Dashboard page will be displayed.
  4. (Optional) Switch or view firewall instances.

    • Switch to another firewall instance: Select a firewall from the drop-down list in the upper left corner of the page.
      Figure 1 Switching to another firewall instance
    • View firewall instance information: Click Firewall List in the upper right corner. For details about parameters, see Firewall instance information.
      Figure 2 Viewing firewall instance information
      Table 1 Firewall instance information

      Parameter

      Description

      Firewall Name/ID

      Name and ID of the firewall.

      Status

      Firewall status.

      Edition

      Edition of a firewall.

      Available EIP Protection Quota

      Maximum number of EIPs that can be protected by the firewall.

      Peak Traffic Protection

      Maximum peak traffic that can be protected by the firewall.

      Billing Mode

      Billing mode of the current firewall.

      Enterprise Project

      Enterprise project that the firewall belongs to.

      Operation

      Check instance details.

  5. In the Resource Overview area, view the protection status of all cloud resources (EIPs and VPCs) in the current region under the current account.
  6. In the Security Events area, view the overall protection details of the intrusion prevention function to quickly locate the cloud assets to be protected.

    • In the upper right corner, change the query range, from 5 minutes to 7 days.
    • Add a protection policy to handle the IP addresses or domain names of the abnormal external connections.
      1. Click the number of Abnormal External Destination IP Addresses or Abnormal External Destination Domain Names.
      2. In the displayed dialog box, select an IP address or domain name.
      3. Generate an address group or domain name group:
        • Create as an address group or domain group: A new address group or domain name group will be generated.
        • Add to an existing address group or domain group: Add the item to an existing address group or domain name group.
      4. Add the address group or domain name group to the protection rule or blacklist/whitelist. For details, see Access Control Policy Overview.

  7. In the Protection Rules area, view the number of inactive rules and the total number of rules.

    For details about the policies that are not matched, click the number of Policies Inactive for Over a Month to go to the Policy Assistant page and view the policies at the bottom.

  8. View firewall instance information.

    Table 2 describes the parameters in the Firewall Details area on the right part of the page.

    Table 2 Firewall instance details

    Parameter

    Description

    Basic Information

    Version

    Firewall edition. Standard and professional editions are supported.

    Firewall Name

    Firewall instance name. You can click to change the name.

    Firewall ID

    Firewall instance ID.

    Status

    Firewall status. It takes about 5 minutes to update the firewall status after purchase or unsubscription.

    Enterprise Project

    Enterprise project that the firewall belongs to.

    Flavor

    Used/Available EIP Protection Quota

    Number of protected EIPs/Total number of EIPs under the current CFW instance.

    Used/Available VPC Protection Quota

    Number of protected VPCs/Total number of VPCs under a firewall instance.

    Internet Border Protection Bandwidth

    Maximum inbound or outbound traffic of all EIPs protected by CFW.

    VPC Border Protection Bandwidth

    Peak east-west traffic that can be protected.

    Maximum total traffic of all VPCs protected by CFW.

    Used/Available Protection Rules

    Number of created protection rules/Total number of protection rules that can be created under a firewall instance.

    Transaction Details

    Billing Mode

    Billing mode

    Upon Expiration

    Billing policy after the firewall instance expires.

    Created

    Time at which the firewall instance is created.

    Expires

    Estimated expiration time of the firewall instance.

    Last Transaction Order

    Latest transaction order of the firewall instance.

    Tags

    Configure tags to identify firewalls so that you can classify and trace firewall instances.

    For details about Tag Management Service (TMS), see Resource Tag Overview.

  9. On the Operations Dashboard page, view the overall protection data of cloud resources.

    Click the Internet Boundaries or Inter-VPC Borders tab to view the corresponding overall protection data.

    In the upper right corner, change the query range, from 5 minutes to 7 days.
    • View the blocking results of access control policies and the maximum inbound and outbound traffic.
    • Traffic Trend displays the inbound, outbound, and overall traffic trends. You can select Average or Maximum in the upper right corner..
      Table 3 Values

      Time Range

      Average

      Maximum

      Last 1 hour

      Average value within every minute

      Maximum value within every minute

      Last 24 hours

      Average value within 5 minutes

      Maximum value within 5 minutes

      Last 7 days

      Average value within one hour

      Maximum value within one hour

      Custom

      • 5 minutes to 6 hours: average value within 1 minute
      • 6 hours (included) to 3 days: average value within 5 minutes
      • 3 (included) to 7 days (included): average value within 30 minutes
      • 5 minutes to 6 hours: maximum value within 1 minute
      • 6 hours (included) to 3 days: maximum value within 5 minutes
      • 3 to 7 days (included): maximum value within 30 minutes

      Data is updated in real time based on traffic statistics.

    • Attacks: View the traffic blocked or allowed by intrusion prevention.
    • Access Control: View the traffic blocked or allowed by access control policies.