Solved

ipv6 6to4 tunnel setup

Posted on 2013-12-30
3
432 Views
Last Modified: 2014-01-03
I am a bit confused about the ipv6 6to4 tunnel setup. It says that it is an automatic tunnel and you do not need to create any tunnel. But if you don't have a route to the other end, how does the tunnel get created and how do you do this if you don’t know the IPv4 tunnel endpoint? Thanks
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Assisted Solution

by:robertmparten
robertmparten earned 150 total points
ID: 39747730
http://www.cisco.com/en/US/docs/ios-xml/ios/interface/configuration/xe-3s/ip6-6to4-tunls-xe.html

automatic 6-to-4 treats it as multipoint versus point-to-point and the IPv4 address is embedded. What you're accomplishing is taking an isolated IPv6 environment and allowing it to traverse existing IPv4 infrastructure, hence, 6-to-4.
0
 
LVL 1

Author Comment

by:leblanc
ID: 39750435
so where is the automatic come in?
0
 
LVL 11

Accepted Solution

by:
Miftaul earned 350 total points
ID: 39753606
6to4 Tunnel is called automatic because here we don't specify the IPv4 tunnel destination in interface configuration as is done on static tunnel, and tunnels are automatically built.

A nice description on 6to4 by Keith Baker is here
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
help Skype for Business keeps dropping 7 41
Performance monitors 6 49
Unable to access VM console from vSphere ? 2 42
sharing subnet on sonicwall 10 28
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question