Description
This article describes a DNS-related issue that can occur where client devices are sending traffic out the physical network adapter when IPv6 is enabled, even when they have an active IPv4 SSL VPN tunnel active.
Scope
FortiClient, SSL VPN.
Solution
Prior to FortiClient v7.0.1 and FortiOS v7.0.0, SSL VPN did not support dual-stack IPv4/IPv6 and so only IPv4 was supported across the VPN tunnel. For information regarding the addition of dual-stack functionality, refer to the following:
In general, Windows (and other operating systems) may prefer to use IPv6 rather than IPv4 for outgoing connections if both are available on the device's physical network adapters. Additionally, IPv4 DNS servers can generally resolve FQDNs to both IPv4 (using A records) and IPv6 (using AAAA records, if available).
The above behavior results in an issue where the client device may resolve both the IPv4 and IPv6 address for a given FQDN and then attempt to reach that destination using IPv6 instead of IPv4. If the SSL VPN tunnel is not configured for dual-stack operation (i.e., it is IPv4 only) then traffic will egress using IPv6 over the physical network connection, rather than IPv4 over the VPN tunnel. This effectively bypasses security inspection by the FortiGate since the traffic is no longer sent over the VPN tunnel.
Within the FortiClient XML configuration, it is possible to enable block_ipv6 to prevent IPv6 traffic from being sent out from the endpoint network adapters when the VPN tunnel is connected/online. This ensures that only IPv4 is utilized, which prevents the unintended bypass behavior described above (since Windows has routes for IPv4 destinations over the VPN tunnel). This option can be found in the following section of the XML config:
<forticlient_configuration>
<vpn>
<sslvpn>
<options>
<block_ipv6>[1 | 0]</block_ipv6>
</options>
</sslvpn>
</vpn>
<forticlient_configuration>
Setting block_ipv6 to 1 enables the feature and results in FortiClient blocking IPv6 from being sent outside of the VPN tunnel, whereas setting 0 disables this options and allows IPv6 traffic to flow as normal. For guidance on configuring XML profiles on EMS, as well as performing config backup/restore from FortiClient itself, refer to the following section of the FortiClient XML Reference Guide: Backing up or restoring the configuration file.
As an alternative, users can also disable IPv6 on the physical network adapter to prevent this bypass issue from occurring. In Windows, this can be done by opening the Control Panel and navigating to Network and Internet -> Network and Sharing Center, opening the Properties section of the physical network adapter and unchecking Internet Protocol Version 6 (TCP/IPv6).
Additional notes:
Related documents:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.