Address Address Group Service Service Group | Recurring Schedule One-time Schedule Schedule Group Protocol Options | Antivirus Profile Web Filter Profile Spam Filter Profile VoIP Profile |
Search for | Select the global object that you want to search. | |
Search Criteria | Select the value upon which the search is based. | |
Object by Name | Object by Name: This option is available for all object types in the Search for field. If you select this option, enter the object name and select a matching method: Exact Match: Select to require that matching object must be the same as the object name entered. This is case sensitive. If an object name does not match the object name entered, it will not be included in the search results. Starts With: Select to require that matching object must start with a letter (case sensitive) or word at the beginning of the object name entered. For example, you can enter A to search for Addr1. Regular Expression: Select to search with wildcards or Perl regular expressions. See http://perldoc.perl.org/perlretut.html for detailed information about using Perl regular expressions. | |
Object by Value | Object by Value: This option is available only when you select Address or Service in the Search for field. If you select Address in the Search for field and then Object by Value in the Search Criteria field, select the value type (IP Address/Range or FQDN) and enter the IP or FQDN in the Address field. You can use the exact match or regular expression to enter the IP or FQDN. For information on IP search rules, see “IP address search rules”. If you select Service in the Search for field and then Object by Value in the Search Criteria field, select a protocol and enter the corresponding information for the protocol. | |
Unused Objects | Unused Objects: This option is available for all object types in the Search for field. This option is typically used by system administrators on a periodic basis to clean up the system. Over time, more and more objects are added to the system and then removed from policies or other uses. However, they still exist in the FortiGate configuration. There are no additional search parameters required for this option. | |
Object Usage | Object usage: This option is available for all object types in the Search for field. This option is typically used by system administrators to identify where an object is being used, that is, which policy or device is using it. There are no additional search parameters required for this option. | |
Scope | Specify the search scope for an object. To access additional scope information, including Search All ADOMs and Narrow Search Parameters options, select more >>. To hide these options select << Less. When you select Object by Name, Object by Value, or Unused Objects in the Search Criteria field, after entering the search criteria, you can search an object globally or narrow the search by selecting an ADOM. • All Databases: Select to search all databases in the FortiManager system. You can also select Search All ADOMS to search the databases of each ADOM. • Narrow Search Parameters (optimized): If you know which ADOM the object is in, select this option to save search time. You can select the ADOM, the Global Database/Security Console of the ADOM, or a particular Device or Group of the ADOM. For more information, see “To search an object by name:”, “To search an object by value:”, and “To search an unused object:”. When you select Object Usage in the Search Criteria field, you can find out where an object is being used, that is, which policy or which device is using it. For more information, see “To search an object by usage:”. |