통계를 사용해서 방화벽 규칙 구성을 분석하고 방화벽 규칙을 단순화할 수 있습니다. 통계는 기존 규칙과 겹치는 방화벽 규칙, 적중 항목이 없는 규칙, IP 주소 및 포트 범위와 같이 사용되지 않은 방화벽 규칙 속성을 식별하는 데 도움이 됩니다. 다음과 같은 통계를 얻을 수 있습니다.
섀도 처리된 방화벽 규칙 통계는 방화벽 규칙을 구성한 방법에 대한 데이터로부터 파생됩니다. 섀도 처리된 규칙은 우선순위가 더 높거나 같은 다른 규칙과 IP 주소 범위와 같은 속성을 공유합니다.
방화벽 통계를 사용하면 방화벽 규칙이 사용되는 방식을 분석할 수 있습니다. Cloud Monitoring과 Google Cloud 콘솔을 모두 사용하여 이러한 측정항목을 사용할 수 있습니다.
측정항목은 방화벽 규칙 로깅에서 파생됩니다. 방화벽 규칙 로깅이 사용 설정된 방화벽 규칙에만 사용할 수 있습니다. 또한 방화벽 측정항목은 방화벽 규칙 로깅의 사양에 맞는 트래픽에만 생성됩니다. 예를 들어 TCP 및 UDP 트래픽의 데이터만 로깅되고 측정항목이 생성됩니다. 전체 기준 목록은 방화벽 규칙 로깅 개요의 사양을 참조하세요.
Google Cloud 콘솔의 방화벽 통계 방문 페이지에는 모든 통계에 대한 카드가 제공됩니다. Recommender API 또는 Google Cloud CLI를 사용하여 통계를 볼 수도 있습니다. Cloud Monitoring 및Google Cloud 콘솔을 사용하여 방화벽 통계 측정항목을 볼 수 있습니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[],[],null,["# Firewall Insights overview\n\nFirewall Insights helps you understand and optimize your firewall rules.\nIt provides insights, recommendations, and metrics about how your\nfirewall rules are being used. Firewall Insights also uses machine\nlearning to predict future firewall rules usage.\n\nFirewall Insights lets you make better decisions during firewall\nrule optimization. For example, Firewall Insights identifies\nrules that it classifies as overly permissive. You can use this information to\nmake your firewall configuration stricter.\n\nFor [firewall policies](/vpc/docs/firewall-policies-overview), you can get\ninsights into firewall rules that are associated with a firewall policy.\n| **Note:** For firewall rules in hierarchical firewall policies and global network firewall policies, insights are generated based on firewall logging data gathered only after February 27, 2023.\n\nInsights\n--------\n\nYou can use insights to analyze your firewall rule configuration and help\nsimplify your firewall rules. Insights help you identify firewall rules that\noverlap existing rules, rules with no hits, and unused firewall rule\nattributes such as IP address and port ranges. You can get the following insights:\n\n- [Shadowed firewall rule](/network-intelligence-center/docs/firewall-insights/concepts/insights-categories-states#shadowed-firewall-rules) insights, which are derived from data about how you have configured your firewall rules. A shadowed rule shares attributes---such as IP address ranges---with other rules of higher or equal priority.\n- [Overly permissive rule](/network-intelligence-center/docs/firewall-insights/concepts/insights-categories-states#overly-permissive-rules) insights, including each of the following:\n - `Allow` rules with no hits\n - `Allow` rules that are obsolete based on adaptive analysis\n - `Allow` rules with unused attributes\n - `Allow` rules with overly permissive IP addresses or port ranges\n- `Deny` rule insights with no hits during the [observation period](/network-intelligence-center/docs/firewall-insights/how-to/configure-observation-period#observation-period).\n\nWith these insights, you can perform the following tasks:\n\n- Identify firewall misconfigurations for firewall rules containing IPv4 or IPv6 address ranges.\n- Optimize firewall rules and tighten security boundaries by identifying overly permissive `allow` rules and reviewing predictions about their future usage.\n\nFirewall Insights uses Recommender. For more information,\nsee [Insights](/recommender/docs/insights/using-insights).\n| **Note:** For firewall rules containing IPv6 address ranges, insights are generated based on firewall logging data gathered only after June 17, 2022.\n\nMetrics\n-------\n\nFirewall Insights lets you analyze how your firewall rules are\nused. These metrics are available by using both Cloud Monitoring and\nthe Google Cloud console.\n\nMetrics are derived from Firewall Rules Logging. They are available only\nfor firewall rules with Firewall Rules Logging enabled. Also,\nfirewall metrics are generated only for traffic that fits the specifications for\nFirewall Rules Logging. For example, data is\nlogged and metrics are generated only for TCP and UDP traffic. For a\ncomplete list of criteria, see [Specifications](/vpc/docs/firewall-rules-logging#specifications)\nin the Firewall Rules Logging overview.\n\nWith Firewall Insights metrics, you can perform the following\ntasks:\n\n- Verify that firewall rules are used in an intended way.\n- Over specified periods, verify that firewall rules allow or block their intended connections.\n- Perform live debugging of connections that are inadvertently dropped because of firewall rules.\n- Discover malicious attempts to access your network, in part by getting alerts about [significant changes in the hit counts of firewall rules](/network-intelligence-center/docs/firewall-insights/how-to/review-optimize#detect-increase-hit-count).\n\nMetrics are produced by Cloud Monitoring. For more information,\nsee [Metrics, time series, and resources](/monitoring/api/v3/metrics).\n\nWhere you can view metrics and insights\n---------------------------------------\n\nYou can view Firewall Insights metrics and insights in the\nfollowing Google Cloud console locations:\n\n- On the Firewall Insights page\n- On the details page for a [VPC firewall rule](/vpc/docs/using-firewalls#listing-firewall-rules-for-a-vpc-network)\n- On the details page for a [VPC network interface](/vpc/docs/using-firewalls#listing-rules-vm)\n- In the Recommendation Hub\n\nThe Firewall Insights landing page in the Google Cloud console provides\ncards for all the insights. You can also view the insights by using the\nRecommender API or the Google Cloud CLI. You can view\nFirewall Insights metrics by using Cloud Monitoring and the\nGoogle Cloud console.\n\nWhat's next\n-----------\n\n- To start using Firewall Insights, see [Roles and permissions](/network-intelligence-center/docs/firewall-insights/concepts/roles-permissions)."]]