Created on
04-28-2025
03:53 AM
Edited on
08-14-2025
05:06 AM
By
Anthony_E
| Description | This article describes how DNS forwarding should be properly configured to function between VDOMs. |
| Scope | FortiGate. |
| Solution |
Example Scenario Setup: In a multi-VDOM FortiGate setup, DNS forwarding between VDOMs can become problematic when DNS services are bound to VLAN or physical interfaces. This article shows a common issue and the recommended design fix: placing DNS on the inter-VDOM link interface.
Devices in VDOM A need to resolve hostnames managed by DNS in VDOM B.
Possible Issues and Problematic Design Example: Originally, the DNS database in VDOM B was bound to a VLAN interface. Even though DNS queries from VDOM A were routed via the inter-VDOM link, the DNS server's interface wasn't receiving or responding to the traffic properly.
Issues included:
Solution: Move the DNS Server to the Inter-VDOM Link.
To resolve the issue: Reconfigure the DNS server in VDOM B to listen on the inter-VDOM interface, not a VLAN or physical port.
This change ensures that the DNS server responds through the same interface on which the request was received, eliminating the need for firewall policies between VDOMs and automatically maintaining symmetric routing.
Example: If the inter-VDOM link is vlink1 between VDOM A and VDOM B:
config system dns-database
FortiGate handles DNS queries based on the source and destination interface logic. When DNS is bound to a VLAN or external interface: It expects traffic from specific networks or routes. Inter-VDOM traffic doesn’t always match those expectations
By placing the DNS on the inter-VDOM link, the FortiGate can process and reply to the request without extra configuration like firewall policies or return routes. It treats the traffic like local internal system communication.
Best practice:
When facing DNS forwarding issues between VDOMs, the most efficient and reliable solution is to move the DNS service to the inter-VDOM link interface. This resolves routing complexities, eliminates the need for firewall policies, and aligns with Fortinet’s design best practices for multi-VDOM setups.
Because FortiGate is a stateful firewall, it monitors open connections and responds to traffic accordingly. When there are several VDOMs in a system, FortiGate can handle traffic between zones internally by putting services like DNS on the inter-VDOM link. This way eliminates the need for additional firewall or routing rules, which can make setup more difficult and result in problems like dropped replies or asymmetric routing. Behind the scenes, FortiGate handles everything, and traffic remains on a clear, direct path. For shared system services like syslog, DNS, or NTP, use the inter-VDOM link. It maintains simplicity.
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.