Fortinet white logo
Fortinet white logo

New Features

FortiView Object Names

FortiView Object Names

In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address) names for improved usability.

Requirements

  • Firewall Objects-based view is only available when the data source is disk.
  • To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable log-uuid-address under system global:
    config system global
       set log-uuid-address enable
    end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI: and each firewall address object is associated with an unique UUID.

In the GUI, Top Sources can display Firewall Objects-based chart in real time.

Top Destinations can display Firewall Objects-based chart in real time.

The Top Sources > Historical tab can display Firewall Objects-based chart.

You can drill down a source object. This example shows a drill down of PC2.

The Top Destinations > Historical tab can display Firewall Objects-based chart.

You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end

FortiView Object Names

FortiView Object Names

In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address) names for improved usability.

Requirements

  • Firewall Objects-based view is only available when the data source is disk.
  • To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable log-uuid-address under system global:
    config system global
       set log-uuid-address enable
    end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI: and each firewall address object is associated with an unique UUID.

In the GUI, Top Sources can display Firewall Objects-based chart in real time.

Top Destinations can display Firewall Objects-based chart in real time.

The Top Sources > Historical tab can display Firewall Objects-based chart.

You can drill down a source object. This example shows a drill down of PC2.

The Top Destinations > Historical tab can display Firewall Objects-based chart.

You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end