FortiView Object Names
In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address) names for improved usability.
Requirements
- Firewall Objects-based view is only available when the data source is disk.
- To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable
log-uuid-address
under system global:config system global set log-uuid-address enable end
Sample configuration
In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI: and each firewall address object is associated with an unique UUID.
In the GUI, Top Sources can display Firewall Objects-based chart in real time.
Top Destinations can display Firewall Objects-based chart in real time.
The Top Sources > Historical tab can display Firewall Objects-based chart.
You can drill down a source object. This example shows a drill down of PC2.
The Top Destinations > Historical tab can display Firewall Objects-based chart.
You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.
To configure firewall addresses in the CLI:
config firewall address edit "PC2" set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8 set subnet 10.1.100.22 255.255.255.255 next edit "10.1.100.11-PC1" set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c set subnet 10.1.100.11 255.255.255.255 next edit "172.16.200.55-PC5" set uuid a2c368f2-5cb5-51e9-1c35-082a57898065 set subnet 172.16.200.55 255.255.255.255 next edit "PW2-172-16-200-254" set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098 set subnet 172.16.200.254 255.255.255.255 next end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy edit 1 set name "v4-out" set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a set srcintf "port10" set dstintf "port9" set srcaddr "PC2" "10.1.100.11-PC1" set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254" set action accept set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set logtraffic all set av-profile "default" set ssl-ssh-profile "custom-deep-inspection" set nat enable next edit 2 set name "to-Internet" set uuid 28379372-5c8a-51e9-c765-cc755a07a200 set srcintf "port10" set dstintf "port9" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set logtraffic all set av-profile "default" set nat enable next end