Fortinet black logo

New Features

FortiView Object Names

Copy Link
Copy Doc ID 761d83e3-4a7b-11e9-94bf-00505692583a:114536
Download PDF

In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address) names for improved usability.

Requirements

  • Firewall Objects-based view is only available when the data source is disk.
  • To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable log-uuid-address under system global:
    config system global
       set log-uuid-address enable
    end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI: and each firewall address object is associated with an unique UUID.

In the GUI, Top Sources can display Firewall Objects-based chart in real time.

Top Destinations can display Firewall Objects-based chart in real time.

The Top Sources > Historical tab can display Firewall Objects-based chart.

You can drill down a source object. This example shows a drill down of PC2.

The Top Destinations > Historical tab can display Firewall Objects-based chart.

You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end

In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address) names for improved usability.

Requirements

  • Firewall Objects-based view is only available when the data source is disk.
  • To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable log-uuid-address under system global:
    config system global
       set log-uuid-address enable
    end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI: and each firewall address object is associated with an unique UUID.

In the GUI, Top Sources can display Firewall Objects-based chart in real time.

Top Destinations can display Firewall Objects-based chart in real time.

The Top Sources > Historical tab can display Firewall Objects-based chart.

You can drill down a source object. This example shows a drill down of PC2.

The Top Destinations > Historical tab can display Firewall Objects-based chart.

You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end