Tables – FortiOS 6.2
Many of the GUI pages contain tables of information that you can filter to display specific information. Administrators with read and write access can define the filters.
Some tables contain information and lists that span multiple pages. Navigation controls appear at the bottom of the page.
Filters are used to locate a specific set of information or content within multiple pages. These are especially useful in locating specific log entries. The specific filtering options vary, depending on the type of information in the log.
To create a filter, select Add Filter at the top of the page. A list of the available fields for filtering will be shown.
Column settings are used to select the types of information displayed on a certain page. Some pages have large amounts of information available and not all content can be displayed on a single screen. Some pages may even contain content that is irrelevant to you. Using column settings, you can choose to display only relevant content.
To view configure column settings, right-click the header of a column and select the columns you wish to view and deselect any you wish to hide. After you have finished making your selections, click Apply (you may need to scroll down the list to do so).
Any changes that you make to the column settings are stored in the unit’s configuration. To return columns to the default state for any given page, right-click any header and select Reset Table.
In tables containing configuration objects, such as the policy table found at Policy & Objects > IPv4 Policy, you have the option to copy an object. This allows you to create a copy of that object, which you can then configure as needed.
You can also reverse copy a policy to change the direction of the traffic impacted by that policy.
To copy an object:
- Select that object, then right-click to make a menu appear and select the Copy
- Right-click the row in the table that is either above or below where you want the copied object to be placed, select the Paste option and indicate Above or Below.
Reverse cloning works much the same way. Instead of selecting Copy, select Clone Reverse.
Once the policy is copied, you must give it a name, configure as needed, and enable it.
Some tables allow you to edit parts of the configuration directly on the table itself. For example, security features can be added to an existing firewall policy from the policy list by clicking on the plus sign in the Security Profiles column and selecting the desired profiles.
If this option is not immediately available, check to see that the column is not hidden (see Column settings). Otherwise, you must select the object and open the policy by selecting the Edit option found at the top of the page.
Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!
Don't Forget To visit the YouTube Channel for the latest Fortinet Training Videos and Question / Answer sessions!
- FortinetGuru YouTube Channel
- FortiSwitch Training Videos
Cybersecurity Videos and Training Available Via: Office of The CISO Security Training Videos
Leave a Reply