Fortinet white logo
Fortinet white logo

Cookbook

FortiView object names

FortiView object names

The FortiView Sources and Destinations views leverage UUID to resolve firewall object (address) names for improved usability.

Requirements

  • The Firewall Objects-based view is only available when the data source is disk.
  • To have a historical Firewall Objects-based view, address objects' UUIDs need to be logged.
To enable address object UUID logging in the CLI:

config system global

set log-uuid-address enable

end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI:, and each firewall address object is associated with an unique UUID.

In the Sources and Destinations views, firewall objects can be displayed in real-time or in a historical chart. Objects can also be drilled down for more details.

To view Firewall Object-based charts in real-time:
  1. In the FortiView tree menu, select the view (Sources orDestinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select now as the time criterion.

To view Firewall Object-based charts over a historical period:
  1. In the FortiView menu, select the view (Sources or Destinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select a time criterion from the dropdown (in the examples, 5 minutes).

To drill down Firewall Objects:
  1. Right-click on any Source Object or Destination Object in the view results.
  2. Select Drill Down to Details. More information displays about the object; there are additional criteria to filter data.
    • This example shows a drill down of PC2 from the Sources view.

    • This example shows a drill down of 172.16.200.55-PC5 from the Destinations view.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end

FortiView object names

FortiView object names

The FortiView Sources and Destinations views leverage UUID to resolve firewall object (address) names for improved usability.

Requirements

  • The Firewall Objects-based view is only available when the data source is disk.
  • To have a historical Firewall Objects-based view, address objects' UUIDs need to be logged.
To enable address object UUID logging in the CLI:

config system global

set log-uuid-address enable

end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI:, and each firewall address object is associated with an unique UUID.

In the Sources and Destinations views, firewall objects can be displayed in real-time or in a historical chart. Objects can also be drilled down for more details.

To view Firewall Object-based charts in real-time:
  1. In the FortiView tree menu, select the view (Sources orDestinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select now as the time criterion.

To view Firewall Object-based charts over a historical period:
  1. In the FortiView menu, select the view (Sources or Destinations).
  2. In the top right corner of the settings bar:
    1. Select Firewall Objects as the data criterion.
    2. Select a time criterion from the dropdown (in the examples, 5 minutes).

To drill down Firewall Objects:
  1. Right-click on any Source Object or Destination Object in the view results.
  2. Select Drill Down to Details. More information displays about the object; there are additional criteria to filter data.
    • This example shows a drill down of PC2 from the Sources view.

    • This example shows a drill down of 172.16.200.55-PC5 from the Destinations view.

To configure firewall addresses in the CLI:
config firewall address
   edit "PC2"
        set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
        set subnet 10.1.100.22 255.255.255.255
    next
    edit "10.1.100.11-PC1"
        set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
        set subnet 10.1.100.11 255.255.255.255
    next
    edit "172.16.200.55-PC5"
        set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
        set subnet 172.16.200.55 255.255.255.255
    next
    edit "PW2-172-16-200-254"
        set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098
        set subnet 172.16.200.254 255.255.255.255
    next
end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy
    edit 1
        set name "v4-out"
        set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "PC2" "10.1.100.11-PC1"
        set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set ssl-ssh-profile "custom-deep-inspection"
        set nat enable
    next
    edit 2
        set name "to-Internet"
        set uuid 28379372-5c8a-51e9-c765-cc755a07a200
        set srcintf "port10"
        set dstintf "port9"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set inspection-mode proxy
        set logtraffic all
        set av-profile "default"
        set nat enable
    next
end