Help Center/ Cloud Firewall/ User Guide/ Traffic Analysis/ Viewing the Total Traffic
Updated on 2025-12-18 GMT+08:00

Viewing the Total Traffic

This section describes how to view the traffic topology of a CFW instance, helping you understand the Internet border and VPC border traffic of cloud assets.

Notes and Constraints

VPC border protection details can be viewed only after a VPC border firewall is configured.

Viewing the Total Traffic

  1. Log in to the CFW console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. (Optional) Switch to another firewall instance. Select a firewall from the drop-down list in the upper left corner of the page.
  4. Under the Operations Dashboard area, view the Internet border and VPC border traffic.

    • Click the Internet Borders or Inter-VPC Borders tab to view the overall protection data of the corresponding resources.
    • In the upper right corner, change the query range, from 5 minutes to 7 days.
    • Peak Inbound/Outbound Traffic, Inbound/Outbound 95th Percentile Bandwidth, and Blocked Accesses:
      View the traffic blocked by access control policies, the 95th percentile inbound and outbound bandwidth, and the maximum inbound and outbound traffic. For details, see Table 1.
      Table 1 Peak inbound/outbound traffic, inbound/outbound 95th percentile bandwidth, and blocked accesses

      Time Range

      Value

      Last 1 hour

      Maximum value within every minute

      Last 24 hours

      Maximum value within every 5 minutes

      Last 7 days

      Maximum value within every hour

      Custom

      • 5 minutes to 6 hours: maximum value within every minute
      • 6 hours (included) to 3 days: maximum value within every 5 minutes
      • 3 (included) to 7 days (included): maximum value within every 30 minutes
      • Peak traffic: The system collects bandwidth in every statistical period. The maximum value within a certain period of time is regarded as the peak traffic.

        For example, if the outbound peak traffic is 100 Mbit/s, the maximum bandwidth within a certain period of time (for example, 24 hours) is 100 Mbit/s.

      • 95th percentile bandwidth: The system collects bandwidth in every statistical period, and sorts the bandwidth values in descending order, and removes the top 5% bandwidth values. The remaining maximum bandwidth is the 95th percentile bandwidth.

        For example, if the 95th percentile bandwidth in the outbound direction is 100 Mbit/s, that means after the bandwidth values are sorted in descending order and the highest 5% value is removed within a certain period of time (for example, 24 hours), the remaining maximum bandwidth is 100 Mbit/s.

    • Traffic Trend:

      Inbound, outbound, and overall traffic changes. You can view EIPs, Average, or Maximum in the upper right corner. For details about how they are calculated, see Table 2.

      Table 2 Traffic trend statistics

      Time Range

      Average

      Maximum

      Last 1 hour

      Average value within every minute

      Maximum value within every minute

      Last 24 hours

      Average value within every 5 minutes

      Maximum value within every 5 minutes

      Last 7 days

      Average value within every hour

      Maximum value within every hour

      Custom

      • 5 minutes to 6 hours: average value within every minute
      • 6 hours (included) to 3 days: average value within every 5 minutes
      • 3 (included) to 7 days (included): average value within every 30 minutes
      • 5 minutes to 6 hours: maximum value within every minute
      • 6 hours (included) to 3 days: maximum value within every 5 minutes
      • 3 (included) to 7 days (included): maximum value within every 30 minutes

      Note: Data is updated in real time based on traffic statistics.

    • Attacks: View the accesses allowed or blocked by the intrusion prevention feature. For details about its configuration, see Configuring Basic IPS Protection.
    • Access Control: View the accesses blocked or allowed by the access control policy. For details about its configuration, see Access Control.

References