Firewall monitoring

How can you monitor your firewall?

You can monitor your firewall using our TCP and UDP checks which are part of our ClouDNS Motoring service. In combination with the Open/Closed port option, you can configure a monitor, which periodically checks if the port on a specific IP is opened or closed. For example, if you want to check whether a port on your server is opened for data transfer, you can create a monitoring check to the IP and port you want to check and choose the option for the port to be open.

Why do you need to start using it?

With firewall monitoring, you will be notified if the specific setting you have made on your firewall is working, as it should. In this way, you will be able to know if your firewall restricts the access to your server on the stated port or if this port is reachable through TCP or UDP.

Example:

You can monitor if your firewall is closed for SSH communication. You can achieve this, by creating a TCP monitoring check that checks port 22, if it is closed. If the port is closed you should receive a notification that the check is UP, if the port is open, you will receive a DOWN notification. In this way, you will know if port 22 of your firewall, which is responsible for SSH communication, is open or closed.

How to set up Firewall monitoring on ClouDNS? Step by step guide

  1. Log into your ClouDNS account and navigate to the Monitoring section in the Dashboard.
  2. Click on "Add new" to create a monitoring check.
  3. Provide a name for the check and enter the IP address or hostname of the server/device to monitor.
  4. Choose TCP or UDP as the monitoring type.
  5. Select the desired Monitoring region and set the monitoring period (e.g., 10, 15, 20, 30 minutes, or one hour). For CloudDNS Monitoring plans M and L, you can select 1 or 5 minutes monitoring intervals.
  6. Specify the number of checks required to confirm a status change.
  7. Enter the port number and set its status to "Closed" for the desired check.
  8. Click "Create" to create the monitoring check.
  9. Review the check's information and results.

Debugging

Each Monitoring check provides a debugging option, which you can use to find out where the problem comes from, using Traceroute information - The traceroute command is used to determine the path between two connections. Often, a connection to another device will have to go through multiple routers. The option can be found in the Monitoring check settings page, on the right side of the "Uptime changes section".

FAQ's

Question: Can Firewall monitoring help identify and mitigate DDoS attacks?

Answer: Yes, Firewall monitoring can help identify and mitigate Distributed Denial of Service (DDoS) attacks. By monitoring network traffic and detecting abnormal patterns or sudden increases in traffic volume, administrators can take proactive measures to mitigate the attack, such as implementing traffic filtering rules or activating DDoS protection services.

Question: Can Firewall monitoring help with compliance requirements?

Answer: Yes, Firewall monitoring plays a crucial role in meeting compliance requirements. By monitoring and documenting firewall activity, organizations can demonstrate adherence to security standards and regulations, such as PCI DSS, HIPAA, or GDPR, which often require regular monitoring and reporting of firewall configurations and access controls.

Question: Is Firewall Monitoring easy to implement?

Answer: Yes, it is really easy to set up and use Firewall Monitoring. ClouDNS Monitoring solution is user-friendly, and configuring it requires minimal technical knowledge.

Question: In which plans can I take advantage of the Firewall Monitoring check?

Answer: You can benefit from Firewall Monitoring check in any of our Monitoring service plans. In addition, with Premium DNS, DDoS Protected DNS and GeoDNS plans, you can take advantage of 1 monitoring check.

Suggested Monitoring check types


Last modified: 2023-07-26
Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more