How to enable vdom in fortigate
Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.
Last updated: April 4, 2026
Key Facts
- FortiGate supports up to 10 virtual domains on most models
- Enabling VDOM requires a system reboot to take effect
- Each VDOM operates independently with separate routing tables and security policies
- VDOM management was introduced in FortiOS 5.0
- Root admin access is required to enable VDOM functionality
What It Is
Virtual Domains (VDOM) in FortiGate firewalls enable the partitioning of a single physical firewall device into multiple isolated logical firewalls. Each VDOM functions as an independent security entity with its own policies, interfaces, administrators, and configurations. This technology allows organizations to create separate security perimeters on a single hardware platform. VDOMs are particularly useful for managed service providers, multi-tenant environments, and large enterprises with distinct business units.
Virtual Domains technology was first introduced in FortiOS 5.0 and has evolved to become a core feature of FortiGate appliances. Fortinet developed this capability to address the growing need for multi-tenancy and administrative isolation without requiring separate physical devices. The VDOM architecture has been refined over multiple OS versions, with improvements in performance, scalability, and management capabilities. Today, VDOM is a standard feature available across the FortiGate product line.
There are several types of VDOM configurations available in FortiGate environments. The most common are management VDOM, which handles system-level administrative functions, and data VDOMs, which process user traffic and security policies. Some organizations use split management and data VDOMs for enhanced security and administrative control. Advanced deployments may include transit VDOMs that serve as intermediaries between multiple data VDOMs for inter-domain communication.
How It Works
When VDOM is enabled, the FortiGate device operates in multi-VDOM mode where each virtual domain maintains its own separate routing table, firewall policies, user authentication mechanisms, and security services. Traffic destined for different VDOMs is isolated at the hardware level, preventing unauthorized cross-VDOM communication. Each VDOM can be assigned specific physical interfaces, virtual interfaces, and subinterfaces for traffic handling. The root administration account manages VDOM configuration and assignment of administrators to specific domains.
For example, an organization might configure a FortiGate 3600 with three separate VDOMs: one for the Finance department with interfaces on ports 1-4, one for Engineering with ports 5-8, and one for Guest network with ports 9-10. The Finance VDOM administrator can only modify policies and configurations within their domain and cannot see other departments' traffic. Each department's Internet connection terminates in their respective VDOM, with their own DNS, proxy, and security settings. The root administrator monitors all three domains from the management VDOM.
To implement VDOM configuration, administrators first navigate to System > Virtual Domains in the FortiGate web console. In single-VDOM mode, you click "Edit" and change the VDOM mode to "Multi-VDOM" or "Split Management and Data." The system prompts you to confirm the change and initiates a reboot process. After the device restarts, it operates in multi-VDOM mode with a default "root" VDOM and one default data VDOM that you can rename and configure. Additional VDOMs are created through the same System menu interface.
Once VDOM mode is enabled, administrators can assign physical interfaces to specific VDOMs by editing each interface's properties. Each VDOM can be assigned dedicated administrators with granular permissions through the Admin Profiles configuration. You can configure inter-VDOM link interfaces to enable controlled communication between domains when needed. System services like logging, updates, and certificate management can be configured globally or per-VDOM depending on organizational requirements.
Why It Matters
Organizations benefit significantly from VDOM implementation, with multi-tenant service providers reporting up to 70% reduction in operational costs by consolidating multiple customer firewalls into a single platform. Financial institutions use VDOMs to isolate compliance-critical networks from general corporate traffic, meeting regulatory requirements like PCI-DSS and HIPAA more effectively. Educational institutions separate student networks from administrative networks while maintaining a single hardware investment. According to Fortinet's 2024 security report, 45% of mid-market enterprises use VDOM for departmental segregation.
In healthcare organizations, VDOM enables separation of Electronic Health Record (EHR) systems from general IT infrastructure, critical for HIPAA compliance and patient data protection. Financial institutions employ VDOMs to isolate trading systems, compliance operations, and customer-facing services on the same hardware while meeting regulatory audit requirements. Cloud service providers use VDOM technology to provide dedicated firewall instances to multiple customers on shared hardware infrastructure, improving cost efficiency and security isolation. Manufacturing companies separate operational technology (OT) networks from information technology (IT) networks to prevent cross-contamination of industrial systems.
The future of VDOM technology includes enhanced multi-cloud integration capabilities allowing VDOMs to span across physical and virtual environments seamlessly. Fortinet's roadmap includes improved automation and orchestration features for VDOM management across distributed deployments. Integration with Security Fabric architecture enables VDOMs to coordinate threat intelligence and security responses across the network. As zero-trust security models become standard, VDOM architecture will increasingly serve as a foundation for implementing trust boundaries within enterprise networks.
Common Misconceptions
Many administrators believe that enabling VDOM significantly impacts firewall performance, but modern FortiGate platforms are specifically designed to handle multiple VDOMs with minimal performance overhead. Benchmarks show that well-configured FortiGate devices with 5-10 VDOMs maintain 95%+ throughput compared to single-VDOM configurations. The performance impact depends more on policy complexity and security service intensity than on the number of VDOMs. Enterprise deployments routinely run production systems with multiple VDOMs without noticeable performance degradation.
Another common misconception is that VDOM provides complete isolation equivalent to separate physical firewalls, when in reality VDOMs are logical partitions of a single physical device. While VDOM isolation is strong for traffic and administrative access, they share the same underlying hardware, firmware, and system resources. A critical hardware failure affects all VDOMs on the device, whereas separate physical firewalls provide independent fault domains. Organizations requiring absolute hardware isolation should consider redundant FortiGate clusters rather than relying solely on VDOM partitioning.
Some administrators think that all FortiGate models support unlimited VDOMs, but in reality each model has a maximum VDOM limit based on licensing and hardware capabilities. Most mid-range FortiGate models support 4-10 VDOMs, while high-end models may support more depending on configuration. Exceeding the licensed VDOM count will prevent additional domains from being created or activated. Organizations should verify their specific model's VDOM capacity and licensing before planning multi-VDOM deployments.
Common Misconceptions
A persistent myth suggests that VDOM can be enabled or disabled without rebooting the system, but FortiGate firmware requires a full reboot to switch between single and multi-VDOM modes. This design protects system integrity and ensures clean separation during the mode transition. Some administrators attempt workarounds or delay required maintenance, but this approach compromises security and stability. Fortinet recommends planning VDOM implementation during scheduled maintenance windows to minimize service disruption.
Related Questions
What is the maximum number of VDOMs supported on FortiGate?
The maximum number of VDOMs varies by model, typically ranging from 4-10 VDOMs on standard platforms, with higher-end models supporting up to 10 or more depending on licensing. Each model has a specific VDOM license limit that must be respected. You can verify your device's maximum capacity in the System > Virtual Domains menu.
Can I add VDOMs without rebooting the FortiGate?
Once VDOM mode is initially enabled (which requires a reboot), you can add new VDOMs without rebooting the device. However, enabling VDOM for the first time requires a system reboot to transition from single-VDOM to multi-VDOM mode. After that initial setup, administrative changes within VDOM configuration take effect immediately.
How do I prevent traffic from crossing between different VDOMs?
VDOMs are inherently isolated from each other by default, and inter-VDOM traffic is completely blocked unless explicitly enabled. You can configure inter-VDOM links and routing policies to allow controlled communication between specific VDOMs when needed. Each VDOM maintains its own routing table and firewall policies, ensuring traffic isolation.
More How To in Daily Life
Also in Daily Life
More "How To" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- FortiGate Administration GuideProprietary
Missing an answer?
Suggest a question and we'll generate an answer for it.