[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-28。"],[],[],null,["# Firewall Insights overview\n\nFirewall Insights helps you understand and optimize your firewall rules.\nIt provides insights, recommendations, and metrics about how your\nfirewall rules are being used. Firewall Insights also uses machine\nlearning to predict future firewall rules usage.\n\nFirewall Insights lets you make better decisions during firewall\nrule optimization. For example, Firewall Insights identifies\nrules that it classifies as overly permissive. You can use this information to\nmake your firewall configuration stricter.\n\nFor [firewall policies](/vpc/docs/firewall-policies-overview), you can get\ninsights into firewall rules that are associated with a firewall policy.\n| **Note:** For firewall rules in hierarchical firewall policies and global network firewall policies, insights are generated based on firewall logging data gathered only after February 27, 2023.\n\nInsights\n--------\n\nYou can use insights to analyze your firewall rule configuration and help\nsimplify your firewall rules. Insights help you identify firewall rules that\noverlap existing rules, rules with no hits, and unused firewall rule\nattributes such as IP address and port ranges. You can get the following insights:\n\n- [Shadowed firewall rule](/network-intelligence-center/docs/firewall-insights/concepts/insights-categories-states#shadowed-firewall-rules) insights, which are derived from data about how you have configured your firewall rules. A shadowed rule shares attributes---such as IP address ranges---with other rules of higher or equal priority.\n- [Overly permissive rule](/network-intelligence-center/docs/firewall-insights/concepts/insights-categories-states#overly-permissive-rules) insights, including each of the following:\n - `Allow` rules with no hits\n - `Allow` rules that are obsolete based on adaptive analysis\n - `Allow` rules with unused attributes\n - `Allow` rules with overly permissive IP addresses or port ranges\n- `Deny` rule insights with no hits during the [observation period](/network-intelligence-center/docs/firewall-insights/how-to/configure-observation-period#observation-period).\n\nWith these insights, you can perform the following tasks:\n\n- Identify firewall misconfigurations for firewall rules containing IPv4 or IPv6 address ranges.\n- Optimize firewall rules and tighten security boundaries by identifying overly permissive `allow` rules and reviewing predictions about their future usage.\n\nFirewall Insights uses Recommender. For more information,\nsee [Insights](/recommender/docs/insights/using-insights).\n| **Note:** For firewall rules containing IPv6 address ranges, insights are generated based on firewall logging data gathered only after June 17, 2022.\n\nMetrics\n-------\n\nFirewall Insights lets you analyze how your firewall rules are\nused. These metrics are available by using both Cloud Monitoring and\nthe Google Cloud console.\n\nMetrics are derived from Firewall Rules Logging. They are available only\nfor firewall rules with Firewall Rules Logging enabled. Also,\nfirewall metrics are generated only for traffic that fits the specifications for\nFirewall Rules Logging. For example, data is\nlogged and metrics are generated only for TCP and UDP traffic. For a\ncomplete list of criteria, see [Specifications](/vpc/docs/firewall-rules-logging#specifications)\nin the Firewall Rules Logging overview.\n\nWith Firewall Insights metrics, you can perform the following\ntasks:\n\n- Verify that firewall rules are used in an intended way.\n- Over specified periods, verify that firewall rules allow or block their intended connections.\n- Perform live debugging of connections that are inadvertently dropped because of firewall rules.\n- Discover malicious attempts to access your network, in part by getting alerts about [significant changes in the hit counts of firewall rules](/network-intelligence-center/docs/firewall-insights/how-to/review-optimize#detect-increase-hit-count).\n\nMetrics are produced by Cloud Monitoring. For more information,\nsee [Metrics, time series, and resources](/monitoring/api/v3/metrics).\n\nWhere you can view metrics and insights\n---------------------------------------\n\nYou can view Firewall Insights metrics and insights in the\nfollowing Google Cloud console locations:\n\n- On the Firewall Insights page\n- On the details page for a [VPC firewall rule](/vpc/docs/using-firewalls#listing-firewall-rules-for-a-vpc-network)\n- On the details page for a [VPC network interface](/vpc/docs/using-firewalls#listing-rules-vm)\n- In the Recommendation Hub\n\nThe Firewall Insights landing page in the Google Cloud console provides\ncards for all the insights. You can also view the insights by using the\nRecommender API or the Google Cloud CLI. You can view\nFirewall Insights metrics by using Cloud Monitoring and the\nGoogle Cloud console.\n\nWhat's next\n-----------\n\n- To start using Firewall Insights, see [Roles and permissions](/network-intelligence-center/docs/firewall-insights/concepts/roles-permissions)."]]