FortiView object names
The FortiView Sources and Destinations views leverage UUID to resolve firewall object (address) names for improved usability.
Requirements
- The Firewall Objects-based view is only available when the data source is disk.
- To have a historical Firewall Objects-based view, address objects' UUIDs need to be logged.
To enable address object UUID logging in the CLI:
config system global
set log-uuid-address enable
end
Sample configuration
In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the CLI:, and each firewall address object is associated with an unique UUID.
In the Sources and Destinations views, firewall objects can be displayed in real-time or in a historical chart. Objects can also be drilled down for more details.
To view Firewall Object-based charts in real-time:
- In the FortiView tree menu, select the view (Sources orDestinations).
- In the top right corner of the settings bar:
- Select Firewall Objects as the data criterion.
- Select now as the time criterion.
To view Firewall Object-based charts over a historical period:
- In the FortiView menu, select the view (Sources or Destinations).
- In the top right corner of the settings bar:
- Select Firewall Objects as the data criterion.
- Select a time criterion from the dropdown (in the examples, 5 minutes).
To drill down Firewall Objects:
- Right-click on any Source Object or Destination Object in the view results.
- Select Drill Down to Details. More information displays about the object; there are additional criteria to filter data.
- This example shows a drill down of PC2 from the Sources view.
- This example shows a drill down of 172.16.200.55-PC5 from the Destinations view.
To configure firewall addresses in the CLI:
config firewall address edit "PC2" set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8 set subnet 10.1.100.22 255.255.255.255 next edit "10.1.100.11-PC1" set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c set subnet 10.1.100.11 255.255.255.255 next edit "172.16.200.55-PC5" set uuid a2c368f2-5cb5-51e9-1c35-082a57898065 set subnet 172.16.200.55 255.255.255.255 next edit "PW2-172-16-200-254" set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098 set subnet 172.16.200.254 255.255.255.255 next end
To configure the firewall policy with defined firewall addresses in the CLI:
config firewall policy edit 1 set name "v4-out" set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a set srcintf "port10" set dstintf "port9" set srcaddr "PC2" "10.1.100.11-PC1" set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254" set action accept set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set logtraffic all set av-profile "default" set ssl-ssh-profile "custom-deep-inspection" set nat enable next edit 2 set name "to-Internet" set uuid 28379372-5c8a-51e9-c765-cc755a07a200 set srcintf "port10" set dstintf "port9" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set logtraffic all set av-profile "default" set nat enable next end