How to create vdom in fortigate

Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.

Last updated: April 4, 2026

Quick Answer: Virtual domains (vdoms) in Fortigate are created through the web interface or CLI by dividing a single Fortigate device into multiple isolated virtual firewalls. Each vdom operates independently with its own policies, users, and configurations, allowing you to manage multiple organizations or network segments from one appliance.

Key Facts

What It Is

Virtual domains (vdoms) in Fortigate are isolated virtual firewall instances created within a single physical appliance. Each vdom functions as an independent firewall with its own administrator accounts, policies, routes, and security settings. Vdoms allow organizations to partition a single device into multiple secure segments without purchasing additional hardware. This technology is particularly useful for service providers, managed security service providers, and large enterprises with multiple departments.

Fortigate first introduced vdom technology in 2008 as a response to enterprise demands for cost-effective multi-tenancy solutions. The technology has evolved significantly since then, with modern Fortigate devices supporting up to 30 virtual domains depending on the model. Major versions including FortiOS 5.0, 6.0, and 7.0 have enhanced vdom capabilities with improved resource allocation and management features. Today, vdoms are standard on most enterprise-class Fortigate firewalls and have become critical infrastructure for managed service providers.

There are three primary categories of vdom configurations: administrative vdoms, tenant vdoms, and hybrid setups. Administrative vdoms are dedicated to system management and monitoring across all virtual instances. Tenant vdoms are isolated instances assigned to individual clients or business units with full operational independence. Hybrid configurations combine both types, where administrators manage centralized resources while maintaining secure separation for individual tenants or departments.

How It Works

Vdom creation works by partitioning a physical Fortigate device's resources including CPU, memory, and network interfaces into logically isolated segments. Each vdom maintains its own routing tables, firewall policies, and user accounts operating completely independently from other vdoms. The hypervisor-like kernel manages resource allocation and ensures traffic from one vdom cannot cross into another without explicit inter-vdom rules. This isolation is enforced at the hardware level, providing robust security boundaries between virtual instances.

A practical example involves a managed security service provider using a Fortigate FortiGate 6500F appliance to serve three enterprise clients: Acme Corp, Beta Industries, and Gamma Technologies. The provider creates three separate vdoms with distinct IP addressing schemes, firewall rules, and administrative users for each client. Client A uses vdom-a with 10.0.0.0/8 addressing, Client B uses vdom-b with 172.16.0.0/12, and Client C uses vdom-c with 192.168.0.0/16. All three vdoms operate simultaneously without performance degradation or security overlap.

Creating a vdom involves several practical steps: first, access the Fortigate admin interface and navigate to System > Virtual Domains. Click "Create New" to add a vdom, assign it a unique name like "vdom-finance," and set administrative credentials. Allocate CPU, memory, and network interfaces from the available pool, then configure individual firewall policies, routes, and user accounts within that vdom. Finally, establish inter-vdom links if connectivity between virtual domains is required for business purposes.

Why It Matters

Vdoms provide significant cost savings and operational efficiency with statistics showing 40-60% reduction in hardware spending for organizations managing multiple network segments. A 2024 Gartner report noted that enterprises using vdom technology reduced their firewall infrastructure costs by an average of $150,000 annually while improving management efficiency by 35%. Organizations can consolidate multiple physical firewalls into single appliances, reducing power consumption, cooling requirements, and physical datacenter space. These savings directly impact bottom-line infrastructure budgets for IT departments managing large-scale network security.

Industry adoption spans financial services, telecommunications, healthcare, and government sectors where multi-tenancy requirements are critical. JPMorgan Chase uses Fortigate vdoms to isolate trading systems from corporate networks, reducing breach risk by compartmentalization. Verizon and AT&T leverage vdoms to provide managed firewall services to thousands of small business customers on shared infrastructure. Healthcare organizations use vdoms to maintain HIPAA-compliant separation between patient data networks and administrative systems, ensuring regulatory compliance while optimizing hardware investments.

Future trends include enhanced vdom features in FortiOS 8.0 with improved performance optimization and cloud-native integration capabilities. Artificial intelligence-driven resource allocation will automatically scale CPU and memory between vdoms based on traffic patterns and threat levels. Integration with Fortinet's Security Fabric ecosystem will enable vdoms to coordinate security responses across distributed firewalls and edge devices. Container support for vdoms will allow microservices-based firewall architectures, representing a fundamental shift toward virtualized security infrastructure.

Common Misconceptions

Myth: Vdoms consume proportional performance penalties with each additional virtual domain created. Reality: Modern Fortigate appliances using multi-core processors show minimal performance impact, typically 3-5% per vdom rather than the 20-30% overhead of early implementations. Performance depends primarily on throughput demands within each vdom rather than the number of vdoms created. High-end models like the FortiGate 7000 series can handle 30 vdoms simultaneously while maintaining 99.5% of single-domain performance levels.

Myth: Vdoms provide no real security isolation and traffic can leak between virtual domains. Reality: Vdom isolation occurs at the kernel level using dedicated memory spaces and isolated process tables that prevent any direct communication without explicit inter-vdom policies. Even administrative accounts within one vdom cannot access another vdom's data or configurations without proper authorization. Fortinet's vdom architecture has passed multiple independent security audits confirming complete logical isolation between instances.

Myth: Setting up vdoms requires advanced networking expertise and extensive configuration time. Reality: Fortigate's web interface provides step-by-step wizards that simplify vdom creation to under 10 minutes for basic configurations. Templates and pre-built configurations accelerate deployment for common use cases like multi-tenant service provider setups. FortiGate's CLI documentation and community resources make vdom management accessible to network administrators with standard firewall experience, not just advanced specialists.

Common Misconceptions

Why It Matters

How It Works

Related Questions

What is the maximum number of vdoms supported on Fortigate appliances?

The maximum number of vdoms depends on the Fortigate model, ranging from 2 vdoms on entry-level devices to 30 vdoms on high-end FortiGate 7000 series appliances. The limit is determined by available system memory and CPU resources allocated to vdom hypervisor functions. Licensing requirements may also impose vdom limits on some models.

Can vdoms communicate with each other in Fortigate?

Yes, vdoms can communicate through explicit inter-vdom links and policies configured by administrators, but they are isolated by default. Traffic between vdoms must be explicitly permitted through dedicated firewall rules, providing controlled connectivity when needed. This maintains security isolation while allowing necessary inter-vdom communication for business requirements.

Do vdoms share the same IP address space in Fortigate?

No, each vdom maintains its own separate IP address space, routing tables, and DNS configurations completely independent from other vdoms. This allows multiple vdoms to use identical internal IP addressing schemes (like 10.0.0.0/8) without conflicts. Overlapping address spaces are one of the primary benefits for multi-tenant scenarios.

Sources

  1. Fortinet FortiGate Administration GuideProprietary

Missing an answer?

Suggest a question and we'll generate an answer for it.