Is it possible to run dual stack IP schemes over an ipsec-protected tunnel interface on IOS? I am able to assign the IPv6 addresses like a normal interface on both ends however when i try to ping across the tunnel with IPv6 there is no response. Here is an example of my config:
interface Tunnel0 description Tunnel to R2 ip address 172.30.1.237 255.255.255.252 ip mtu 1400 ip nat inside ip virtual-reassembly load-interval 30 ipv6 address FE80::172:30:1:1 link-local ipv6 address 2001:1::172:30:1:1/126 keepalive 5 4 tunnel source GigabitEthernet0/1 tunnel mode ipsec ipv4 tunnel destination 18.104.22.168 tunnel protection ipsec profile protect-gre
interface Tunnel0 description Tunnel to R1 ip address 172.30.1.238 255.255.255.252 ip mtu 1400 ip nat inside ip virtual-reassembly load-interval 30 ipv6 address 2001:1::172:30:1:2/126 ipv6 address FE80::172:30:1:2 link-local keepalive 5 4 tunnel source FastEthernet0/1 tunnel destination 22.214.171.124 tunnel mode ipsec ipv4 tunnel protection ipsec profile protect-gre
The only solution i can clearly see is running a separate tunnel, which i would like to avoid. Any assistance is greatly appreciated!
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...