All Products
Search
Document Center

Cloud Firewall:Internet Exposure

Last Updated:Nov 29, 2024

You can view information about traffic from the Internet to your assets on the Internet Exposure page. The information includes the trace information about unusual inbound traffic, and the numbers of open public IP addresses, open ports, open applications, and public IP addresses of cloud services. This helps identify suspicious assets and ensure business security.

Prerequisites

The Internet firewall is enabled. For more information, see Internet firewall.

Visualized analysis

The Visualized Analysis tab displays the traffic of all public IP addresses, the traffic trend charts of all IP addresses, and the statistics of inbound traffic. This helps you monitor inbound traffic of your assets in real time.

  1. Log on to the Cloud Firewall console. In the left-side navigation pane, choose Traffic Analysis > Internet Exposure.

  2. In the upper-right corner of the Internet Exposure page, select a time range from the drop-down list and click the Visualized Analysis tab.

  3. On the Visualized Analysis tab, view the following information.

    image

    You can select a time range from the drop-down list. You can also specify a custom time range within the previous 30 days.

    Section

    Description

    Supported operation

    IP Traffic

    This section displays the total peak traffic from the Internet to your assets.

    • Specify an IP address in the search box and view the IP address type and peak of total traffic for the IP address.

    • Click the image.png icon next to an IP address. The chart on the right side shows the trend of inbound traffic for the IP address.

    • Click the image.png icon next to an IP address to go to the Log Audit page. On the page, you can view the traffic logs of the IP address. For more information, see Log audit.

    • Click the image icon next to an IP address to go to the Outbound Connection page. On the page, you can view the statistics on outbound connections of the IP address. For more information, see Outbound Connection.

    Inbound Traffic Trend

    This section displays the peak request and response traffic of all your assets in real time.

    Move the pointer over a position in the trend chart to view the peak request and response traffic at the point in time that corresponds to the position. In the Trends of Traffic section, you can click a point in time on the x-axis to refresh the rankings in the IP Traffic section.

    Rankings of Visits by Traffic

    This section displays the top 10 source locations, top 10 IP address ranges based on session percentages, top 10 source IP addresses, and statistics of at-risk ports.

    None.

View the statistics of Internet exposure

The statistics section in the upper-part of the Internet Exposure page displays the statistics of usual and unusual inbound traffic of your assets. You can troubleshoot unusual traffic on the Exposure Details tab based on the statistics to ensure the security of inbound traffic for your assets.

  1. Log on to the Cloud Firewall console. In the left-side navigation pane, choose Traffic Analysis > Internet Exposure.

  2. In the upper-right corner of the Internet Exposure page, specify a time range for the query. Then, you can view the information in the Data Statistics section and on the Exposure Details tab. The following table describes the information.

    image

    You can select a time period from the drop-down list. You can also specify a custom time range within the previous 7 days.

    Parameter

    Description

    Supported operation

    Open Public IP Addresses

    The total number of open public IP addresses and the number of at-risk open public IP addresses.

    View the traffic statistics of a public IP address that is accessed to identify unusual traffic: On the Open Public IP Addresses tab, find the IP address and click View Details in the Actions column. In the Open Public IP Addresses panel, view the access information about the IP address.

    • Configure an outbound access control policy to block outbound traffic of assets

      Click Configure Access Control Policy to go to the Access Control > Internet Border page. For more information, see Create access control policies for the Internet firewall.

    • Add an IP address to an address book for centralized management

      Find an IP address and click Add to Address Book. You are redirected to the Address Books page. For more information, see Manage address books.

    • View the details of traffic logs to determine whether the traffic is required for your workloads

      Find an IP address, click the 1 icon in the Actions column, and then click View Logs. You are redirected to the Traffic Logs tab of the Log Audit page. For more information, see Log audit.

    Open Ports

    The total number of open ports and the number of at-risk open ports.

    View the traffic statistics of an open port to identify unusual traffic: On the Open Ports tab, find the open port and click View Details in the Actions column. In the Open Ports panel, view the access information about the open port.

    Open Applications

    The total number of open applications and the number of at-risk open applications.

    View the traffic statistics of an open application to identify unusual traffic: On the Open Applications tab, find the open application and click View Details in the Actions column. In the Open Applications panel, view the access information about the application.

    Details

    The traffic statistics of all assets.

    View the traffic statistics of an asset to identify unusual traffic: On the Details tab, find the asset and click View Details in the Actions column. In the Details panel, view the access information about the asset.

    Cloud Services

    The number of public IP addresses to which inbound traffic flows to access cloud services.

    None.

Export the statistics of Internet exposure

You can click the 下载 icon in the upper-right corner of the Exposure Details tab to export the statistics of open public IP addresses, open ports, open applications, assets, and cloud services to your computer in the CSV format. This allows you to view and analyze the statistics.

References