Fortinet Document Library

Version:


Table of Contents

Cookbook

6.2.0
Download PDF
Copy Link

FortiView object names

The FortiView Sources and Destinations views leverage UUID to resolve firewall object (address) names for improved usability.

Requirements

  • The Firewall Objects-based view is only available when the data source is disk.
  • To have a historical Firewall Objects-based view, address objects' UUIDs need to be logged.
To enable address object UUID logging in the CLI:

config system global

set log-uuid-address enable

end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI:, and each firewall address object is associated with an unique UUID.

In the Sources and Destinations views, firewall objects can be displayed in real-time or in a historical chart. Objects can also be drilled down for more details.

To view Firewall Object-based charts in real-time:
  1. In the FortiView tree menu, select the view (Sources orDestinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select now as the time criterion.

To view Firewall Object-based charts over a historical period:
  1. In the FortiView menu, select the view (Sources or Destinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select a time criterion from the dropdown (in the examples, 5 minutes).

To drill down Firewall Objects:
  1. Right-click on any Source Object or Destination Object in the view results.
  2. Select Drill Down to Details. More information displays about the object; there are additional criteria to filter data.
    • This example shows a drill down of PC2 from the Sources view.

    • This example shows a drill down of 172.16.200.55-PC5 from the Destinations view.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end

FortiView object names

The FortiView Sources and Destinations views leverage UUID to resolve firewall object (address) names for improved usability.

Requirements

  • The Firewall Objects-based view is only available when the data source is disk.
  • To have a historical Firewall Objects-based view, address objects' UUIDs need to be logged.
To enable address object UUID logging in the CLI:

config system global

set log-uuid-address enable

end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI:, and each firewall address object is associated with an unique UUID.

In the Sources and Destinations views, firewall objects can be displayed in real-time or in a historical chart. Objects can also be drilled down for more details.

To view Firewall Object-based charts in real-time:
  1. In the FortiView tree menu, select the view (Sources orDestinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select now as the time criterion.

To view Firewall Object-based charts over a historical period:
  1. In the FortiView menu, select the view (Sources or Destinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select a time criterion from the dropdown (in the examples, 5 minutes).

To drill down Firewall Objects:
  1. Right-click on any Source Object or Destination Object in the view results.
  2. Select Drill Down to Details. More information displays about the object; there are additional criteria to filter data.
    • This example shows a drill down of PC2 from the Sources view.

    • This example shows a drill down of 172.16.200.55-PC5 from the Destinations view.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end