You are here: Webhelp 5.5R6 > System > Connecting to CloudView

Connecting to Hillstone CloudView

CloudView is a SaaS products of security area and a cloud security services platform in the mobile Internet era. CloudView deployed in the public cloud to provide users with online on-demand services. Users can get convenient, high quality and low cost value-added security services through the Internet and APP, and get a better security experience.

After the Hillstone device is properly configured to connect the CloudView , you can achieve the Hillstone device registration to the public cloud and the connection with the Cloud ·View, and then to achieve the Cloud ·View remote monitoring device.

CloudView Deployment Scenarios

The main deployment scenarios of CloudView are described as follows:

When Hillstone devices register to the public cloud, the device information, traffic data, threat event, and system logs are uploaded to the cloud, which provides a visual display. Users can through the Web or mobile phone APP monitor the device status information, reports, threat analysis, etc.

About CloudView, see CloudView FAQs page.

Connecting to Hillstone CloudView

When using the CloudView, the device needs to connect to the CloudView server.

  1. Select System > Hillstone CloudView.
  2. Select the Enable check box of Hillstone CloudView.
  3. Enter the URL of the CloudView server. The default configuration is cloud.hillstonenet.com.cn.
  4. Enter the username of CloudView. Register the device to this user.
  5. Enter the password of the user.

  6. Server Status displays the CloudView status.l
  7. Select Traffic Data to upload the monitor data.
  8. Select Threat Event to upload the threat events detected by the Hillstone device.
  9. Select System Log to upload the event logs.
  10. Select the Enable check box in the Cloud Inspectionsection, system can receive and execute inspection command, and upload the collected data to CloudView.
  11. Select whether to join the Hillstone cloud security program. This program will upload the threat prevention data to cloud intelligence server. The uploaded data will be used for internal research to reduce false positives and to achieve better protection of the equipment.
  12. Click OK.