Description | This article explains how to configure IPv6 trusted hosts |
Scope | FortiGate v6.4, v7.0, v7.2, v7.4 and v7.6. |
Solution |
Trusted hosts are useful to restrict admin access to FortiGate. When only an IPv4 trusted host is configured, then access to FortiGate using IPv6 is not possible. With the trust host config below, access to FortiGate from any of the IPv6 addresses assigned is not possible:
config system admin end
With the configuration above, only hosts from IPv4 172.26.226.0/24 can access the FortiGate. Access from IPv6 will be restricted. If access from an IPv6 host and network is needed, an IPv6 trust host can be added to the configuration above.
For example, if the IPv6 trusted host has the IPv6 address 2a00:9480:10:1::1:2, then follow the below config for the IPv6 trusted host:
config system admin
FortiOS supports up to 10 IPv6 and IPv4 trusted hosts for every configured admin user. Output from diagnose sniffer, when the 2a00:9480:10:1::1:2 is not added to trusted hosts, FortiOS ignores the SSH packets:
diagnose sniffer packet any "host 2a00:9480:10:1::1:2" 4 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.