The interfaces in your WS000016.JPG screenshot are which interfaces that should belong to the particular VSYS (and have nothing to do with dns-proxy to my knowledge). Like if you want to have: VSYS0: int0/1, int0/2, int0/3 VSYS1: int0/4, int0/5, int0/6 VSYS2: int0/7, int0/8, int0/9 The dns-proxy setting is which dns-proxy setup you wish to attach to the particular VSYS. The other screenshot, WS000017.JPG, displays a particular dns-proxy (in this case named "google") and the interfaces here are which interfaces this dns-proxy should be attached to. The reason for why there is an interface configuration for the dns-proxy is simply because if you have lets say WAN, LAN and DMZ as interfaces in your PAN (or VSYS in your PAN) then I would assume you would want to use dns-proxy on the LAN-interface and not on the WAN-interface (that is incoming dns-packets on LAN should be modified according to the dns-proxy setting). So for example... If you for VSYS0 setup the following interfaces: VSYS0: int0/1, int0/2, int0/3 and choose to use the "google" dns-proxy, then when you configure this "google" dns-proxy you should only be able to choose between int0/1, int0/2 and int0/3. But from what I understand with your first sentence is that you want to use different dns-server(s) for different VSYS when you configure security rules etc regarding objects based on FQDN instead of ipaddress. Unfortunately I dont think this is currently possible. Simply because the VSYS stuff is only to segment the dataplane - you will still have only one mgmtplane for all the VSYS. You setup which dnsservers the mgmtplane should use in Device -> Setup -> Services and can also configure which interfaces should be used (for example if your dnsserver for FQDN lookups during configuration isnt avaiable on the mgmtinterface but rather on int0/3 or whatever) in Service Route Configuration. So I think you will have to file this as a feature request to your sales rep that you want to be able to segment the mgmtplane aswell (or at least be able to do this for the dnsconfiguration of Device -> Setup -> Services). Also note that (at least by my opinion ) you should avoid using FQDN for network objects in your configuration. That is not only because your firewall will then rely on the output from the dnsserver when you configure (imagine what would happen if someone modifies your dns to return "0.0.0.0" for a particular host?) but also because the mgmtplane will only query your dns for FQDN during commit and translate each FQDN into an ipaddress which is then loaded into the fpga/asic. This means that if you commit at lets say 12:00 oclock and then modify your dns at 12:01 oclock the firewall will still only allow (or deny depending on the rule) traffic for the old ip.
... View more