Description | This article explains how to block WhatsApp traffic in scenarios where it is necessary to restrict all internet access for a user when connected remotely through a VPN. |
Scope | FortiGate. |
Solution |
When remote VPN connectivity is established without split tunneling, all internet-bound traffic is expected to be routed through the VPN tunnel. In secure environments such as banking and finance, there may be a requirement to completely block internet access for a remote user while they are accessing resources on a network protected by the FortiGate.
Typically, the VPN client pushes a default IPv4 route (0.0.0.0/0) to ensure that all IPv4 traffic is tunneled. Then only the necessary traffic can be allowed using a policy and the rest can be dropped by the firewall with the default deny policy.
However, if IPv6 is not enabled on the firewall, a matching default IPv6 route (::/0) is not created. As a result, IPv6 traffic is routed through the user's local network interface instead of the VPN tunnel. Applications that support IPv6, such as WhatsApp, may continue to function over the local internet connection, effectively bypassing the VPN and any associated security policies.
Technical Explanation:
Recommended Solution: To prevent IPv6 traffic from bypassing the VPN:
This forces all traffic to use IPv4, which is then routed through the VPN as expected. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.