- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Assistance w/ VDOM implementation outline
Howdy Folks!
- Labels:
-
VDOM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
First, you need to understand how to connect multiple vdoms over vdom-link or npu-vlink (if chassis-based FGT). The same guide you referred to have some examples:
https://docs.fortinet.com/document/fortigate/7.6.1/administration-guide/335646/inter-vdom-routing-co...
Then you would understand the vdom-link/npu-vlink is a different interface from physical ones, so you can't put the same VLAN subinterface on both. Besides, to set up policies, the source interface and the destination interface are separated in general for secure operation, although it's possible to set policies between the same interface.
Also you can not share the same VLAN subinterface with multiple vdoms. One interface can belong to only one vdom. Consider a vdom as an independent router/FW box.
Either senario is possible to configure as long as you separate VLAN on both sides (split vlan-10 and vlan-20 per inside and outside, and between vdoms).
Toshi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Gwillikers,
Sorry if I haven't understood your question so well. From the general point of view, the VDOM is usually used to split the FortiGate into many mini-FortiGates, this way you can have a multi tenant scenario. In other words, if you have a FortiGate with X physical interfaces, you can split it and assign a portion of physical interfaces to customer1, and another portion to customer2.
Hope I could clarify a bit the understanding about VDOM.
Pedro
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Toshi....huge help!
