Viewing Protection Information Using the Policy Assistant
After a protection policy is configured, you can use the policy assistant to check policy hits and adjust policies.
Viewing Protection Information Using the Policy Assistant
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation pane on the left, click
and choose . The Dashboard page will be displayed.
- (Optional) Switch to another firewall instance. Select a firewall from the drop-down list in the upper left corner of the page.
- In the navigation pane, choose .
- View statistics about the protection rules of a firewall instance.
- Policy Dashboard: Number of accesses that hit policies (protection rules, blacklist, and whitelist), numbers of allowed and blocked accesses, and the allow and block policies that were frequently hit within a specified time range.
- Policy Hits: Hits of a rule within a specified time range.
- Visualizations: Top 5 items ranked by certain parameters regarding blocked attacks within a specified time range. For more information, see Table 1. Click a record to view the policy matching details. For details, see Table 2.
Table 1 Policy assistant statistics parameters Parameter
Description
Top Policies By Hits
Policies that match and block traffic.
Top Blocked Outbound IP Addresses
Blocked outbound IP addresses. You can click Source or Destination to view the source or destination IP addresses.
Top Blocked Inbound IP Addresses
Blocked inbound IP addresses. You can click Source or Destination to view the source or destination IP addresses.
Top Blocked Destination Ports
Blocked destination ports. You can click Outbound or Inbound to view ports in the corresponding direction.
Top Blocked IP Address Regions
Regions of blocked IP addresses. You can click Destination of outbound access or Source of inbound access to check IP addresses.
- Inactive Policies: Policies that have not been hit or enabled for more than a week, a month, three months, or six months. You are advised to modify or delete the policies in a timely manner.
References
- For details about how to add a blacklist or whitelist for traffic protection, see Adding Blacklist or Whitelist Items to Block or Allow Traffic. For details about how to add a protection rule for traffic protection, see:
- For details about how to protect the traffic from the Internet to cloud assets (EIPs), see Accessing from the Internet to Assets on the Cloud (Inbound).
- For details about how to protect the traffic from cloud assets (EIPs) to the Internet, see Accessing from the Cloud Assets to the Internet (Outbound).
- For details about how to protect the access traffic between VPCs, or between a VPC and an IDC, see Configuring Protection Rules to Block or Allow VPC Border Traffic.
- For details about how to protect the traffic of private network assets at the Internet border, see Configuring Protection Rules to Block or Allow NAT Gateway Border Traffic.
- For details about how to add protection policies in batches, see Importing and Exporting Protection Policies.
- If your traffic is incorrectly blocked by a protection policy, troubleshoot the problem by referring to What Can I Do If Services Cannot Be Accessed After a Policy Is Configured on CFW?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot