Description | This article describes the specific requirements and designs required to set up IPv6 in a FortiGate in the Azure environment. |
Scope | FortiGate v6.4, v7.0, v7.2, and v7.4. |
Solution |
After setting up IPv6 in the Azure environment, (i.e. VM interfaces), the configuration in the FortiGate should look similar to this:
config system interface edit "port1" set vdom "root" set ip 10.1.47.4 255.255.255.192 set allowaccess ping https ssh set type physical set description "external" set snmp-index 1 config ipv6 set ip6-address ace:ceb:deca:deed::4/128 set ip6-allowaccess ping https ssh http set ip6-send-adv enable set ip6-other-flag enable end next end
Once this is done, test if the IPv6 is reachable:
IPv6testVM-FGT-A # exe ping6 xxxx:yyyy:702:3::59 PING 2603:1020:702:3::59(xxxx:yyyy:702:3::59) 56 data bytes 64 bytes from xxxx:yyyy:702:3::59: icmp_seq=1 ttl=59 time=1.10 ms 64 bytes from xxxx:yyyy:702:3::59: icmp_seq=2 ttl=59 time=0.673 ms 64 bytes from xxxx:yyyy:702:3::59: icmp_seq=3 ttl=59 time=0.755 ms 64 bytes from xxxx:yyyy:702:3::59: icmp_seq=4 ttl=59 time=0.650 ms 64 bytes from xxxx:yyyy:702:3::59: icmp_seq=5 ttl=59 time=0.566 ms
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.