Cloud Firewall provides log reports based on the analysis results of the log analysis feature. The reports show statistics such as basic traffic metrics and distribution of inbound and outbound traffic. You can perform operations such as specifying a time range, subscribing to log reports, refreshing data, configuring refresh settings, and viewing data in a dashboard. The reports in a dashboard are updated based on your operations.
Prerequisites

Procedure
Log report dashboard
Log reports provide a global view of Internet traffic, including basic traffic metrics, inbound and outbound traffic trends, and traffic distribution. The following table describes all widgets supported by Cloud Firewall.
Widget | Type | Default time range | Description | Example |
---|---|---|---|---|
Total number of Intercepting | Numeric value | 1 hour (relative) | The number of Internet access requests blocked by Cloud Firewall within a specified time range. | 10 times |
Inbound Traffic | Numeric value | 1 hour (relative) | The volume of inbound Internet traffic within a specified time range. | 10 MB |
Outbound Traffic | Numeric value | 1 hour (relative) | The volume of outbound Internet traffic within a specified time range. | 10 GB |
SSH Access | Numeric value | 1 hour (relative) | The number of SSH access requests within a specified time range. | 10 times |
RDP Access | Numeric value | 1 hour (relative) | The number of Remote Desktop Protocol (RDP) access requests within a specified time range. | 10 times |
FTP Access | Numeric value | 1 hour (relative) | The number of FTP access requests within a specified time range. | 10 times |
Intercept trend | Line chart | 1 hour (relative) | The trend for the number of times inbound traffic is blocked within a specified time range. | None |
Intercept Source Applications | Pie chart | 1 hour (relative) | The top 10 applications that are sorted based on the volume of blocked inbound traffic within a specified time range. The applications include HTTP, SNMP, SIP, and SSH. | None |
Sources – Global | World map | 1 hour (relative) | The geographic distribution of inbound traffic sources within a specified time range. | None |
Source Applications – Top 10 | Pie chart | 1 hour (relative) | The top 10 applications that are sorted based on the volume of inbound traffic within a specified time range. The applications include HTTP and SSH. | None |
Source Regions – Top 10 | Pie chart | 1 hour (relative) | The top 10 regions from which the most inbound traffic is sent within a specified time range. | None |
Source Ports – Top 20 | Treemap chart | 1 hour (relative) | The top 20 ports that are accessed by inbound traffic within a specified time range. | None |
Intercept trend | Line chart | 1 hour (relative) | The trend for the number of times outbound traffic is blocked within a specified time range. | None |
Intercept External Applications | Pie chart | 1 hour (relative) | The top 10 applications that are sorted based on the volume of blocked outbound traffic within a specified time range. The applications include HTTP and SSH. | None |
External Ports – Top 20 | Treemap chart | 1 hour (relative) | The top 20 ports that are accessed by outbound traffic within a specified time range. | None |
External IP Addresses – Top 10 | Pie chart | 1 hour (relative) | The top 10 IP addresses that are requested by outbound traffic within a specified time range. | None |
External Domains – Top 10 | Treemap chart | 1 hour (relative) | The top 10 domain names that are requested by outbound traffic within a specified time range. | None |
External Applications – Top 10 | Pie chart | 1 hour (relative) | The top 10 applications that are sorted based on outbound traffic within a specified time range. The applications include HTTP and SSH. | None |