Created on
06-23-2025
07:41 AM
Edited on
06-24-2025
11:13 PM
By
Jean-Philippe_P
Description |
This article describes how to configure and troubleshoot web filtering with IPv6. |
Scope | FortiOS. |
Solution |
In FortiGate, PMTUD for IPv6 is not supported when the policy is in flow-based inspection mode. To fix the problem, follow the steps below.
config firewall policy edit 2 set name "Internal_IPV6" set uuid 2c3f4f88-da0b-51ee-49c2-6a4bfc0f0e89 set srcintf "port5" set dstintf "HW-WAN" set action accept set srcaddr6 "all" set dstaddr6 "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy <----- set ssl-ssh-profile "ipv6-custom-deep-inspection" set logtraffic all
Make sure the SSL profile has deep-inspection enabled.
config firewall ssl-ssh-profile edit "ipv6 - custom-deep-inspection" config ssl set inspect-all deep-inspection <----- end end
config webfilter profile edit $webtest-------------profile name config ftgd-wf-test set options ftgd-disable end end
Related articles: Technical Tip: Troubleshooting static URL filter by 'debug ips' |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.