Fortinet black logo

Cookbook

Multi VDOM configuration examples

Copy Link
Copy Doc ID af0e75e9-211f-11ea-9384-00505692583a:575766
Download PDF

Multi VDOM configuration examples

The following examples show how to configure per-VDOM settings, such as operation mode, routing, and security policies, in a network that includes the following VDOMs:

  • VDOM-A: allows the internal network to access the Internet.
  • VDOM-B: allows external connections to an FTP server.
  • root: the management VDOM.

You can use VDOMs in either NAT or transparent mode on the same FortiGate. By default, VDOMs operate in NAT mode.

For both examples, multi VDOM mode must be enabled, and VDOM-A and VDOM-B must be created.

Enable multi VDOM mode

Multi VDOM mode can be enabled in the GUI or CLI. Enabling it does not require a reboot, but does log you out of the device. The current configuration is assigned to the root VDOM.

Note

On FortiGate 60 series models and lower, VDOMs can only be enabled using the CLI.

To enable multi VDOM mode in the GUI:
  1. On the FortiGate, go to System > Settings.
  2. In the System Operation Settings section, enable Virtual Domains.
  3. Select Multi VDOM for the VDOM mode.
  4. Click OK.
To enable multi VDOM mode with the CLI:

config system global

set vdom-mode multi-vdom

end

Create the VDOMs

To create the VDOMs in the GUI:
  1. In the Global VDOM, go to System > VDOM, and click Create New. The New Virtual Domain page opens.

  2. In the Virtual Domain field, enter VDOM-A.
  3. If required, set the NGFW Mode. If the NGFW Mode is Policy-based, select an SSL/SSH Inspection from the list.
  4. Optionally, enter a comment.
  5. Click OK to create the VDOM.
  6. Repeat the above steps for VDOM-B.
To create the VDOMs with the CLI:

config vdom

edit <VDOM-A>

next

edit <VDOM-B>

next

end

end

Multi VDOM configuration examples

The following examples show how to configure per-VDOM settings, such as operation mode, routing, and security policies, in a network that includes the following VDOMs:

  • VDOM-A: allows the internal network to access the Internet.
  • VDOM-B: allows external connections to an FTP server.
  • root: the management VDOM.

You can use VDOMs in either NAT or transparent mode on the same FortiGate. By default, VDOMs operate in NAT mode.

For both examples, multi VDOM mode must be enabled, and VDOM-A and VDOM-B must be created.

Enable multi VDOM mode

Multi VDOM mode can be enabled in the GUI or CLI. Enabling it does not require a reboot, but does log you out of the device. The current configuration is assigned to the root VDOM.

Note

On FortiGate 60 series models and lower, VDOMs can only be enabled using the CLI.

To enable multi VDOM mode in the GUI:
  1. On the FortiGate, go to System > Settings.
  2. In the System Operation Settings section, enable Virtual Domains.
  3. Select Multi VDOM for the VDOM mode.
  4. Click OK.
To enable multi VDOM mode with the CLI:

config system global

set vdom-mode multi-vdom

end

Create the VDOMs

To create the VDOMs in the GUI:
  1. In the Global VDOM, go to System > VDOM, and click Create New. The New Virtual Domain page opens.

  2. In the Virtual Domain field, enter VDOM-A.
  3. If required, set the NGFW Mode. If the NGFW Mode is Policy-based, select an SSL/SSH Inspection from the list.
  4. Optionally, enter a comment.
  5. Click OK to create the VDOM.
  6. Repeat the above steps for VDOM-B.
To create the VDOMs with the CLI:

config vdom

edit <VDOM-A>

next

edit <VDOM-B>

next

end

end