?
Solved

ipv6 6to4 tunnel setup

Posted on 2013-12-30
3
Medium Priority
?
437 Views
Last Modified: 2014-01-03
I am a bit confused about the ipv6 6to4 tunnel setup. It says that it is an automatic tunnel and you do not need to create any tunnel. But if you don't have a route to the other end, how does the tunnel get created and how do you do this if you don’t know the IPv4 tunnel endpoint? Thanks
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Assisted Solution

by:robertmparten
robertmparten earned 600 total points
ID: 39747730
http://www.cisco.com/en/US/docs/ios-xml/ios/interface/configuration/xe-3s/ip6-6to4-tunls-xe.html

automatic 6-to-4 treats it as multipoint versus point-to-point and the IPv4 address is embedded. What you're accomplishing is taking an isolated IPv6 environment and allowing it to traverse existing IPv4 infrastructure, hence, 6-to-4.
0
 
LVL 1

Author Comment

by:leblanc
ID: 39750435
so where is the automatic come in?
0
 
LVL 11

Accepted Solution

by:
Miftaul earned 1400 total points
ID: 39753606
6to4 Tunnel is called automatic because here we don't specify the IPv4 tunnel destination in interface configuration as is done on static tunnel, and tunnels are automatically built.

A nice description on 6to4 by Keith Baker is here
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question