


Microsoft DA requires IPv6-only connectivity between the secured endpoints. Microsoft DA provides IPv6-only remote access capabilities between Microsoft Windows 7 and Windows Server 2008 R2 hosts. The third solution today leverages the capability of Microsoft DirectAccess (DA). After the IPv6-in-IPv4 tunnel is terminated, IPv6 is routed as a native IPv6 packet. The Cisco VPN head-end device terminates the IPsec connection, but the IPv6-in-IPv4 tunnel remains and is routed to the tunnel termination device further inside the enterprise network. A tunnel mechanism such as Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), 6to4, or manually configured tunnels encapsulates IPv6 traffic inside of IPv4 and then is injected into the IPsec VPN connection. The second solution leverages the Cisco VPN Client to establish an IPsec-over-IPv4 session to one of a few Cisco VPN head-end solutions, such as the Cisco Adaptive Security Appliance (ASA), Cisco IOS router, or Cisco VPN 3000 Concentrator. IPv6 is transported between the client and the ASA over the IPv4/SSL connection, and then, after it is terminated on the Cisco ASA, the IPv6 traffic is routed as a native IPv6 packet. The first solution leverages the Cisco An圜onnect SSL VPN Client (SVC) to establish an SSL-over-IPv4 connection to the Cisco Adaptive Security Appliance (ASA). ■ Provide native IPv6 support between a remote client and the enterprise site over a secured connection (for example, over IPsec or SSL). ■ Enable IPv6-based tunnels through an established IPv4 IPsec VPN session to an IPv6 tunnel termination point inside the enterprise. ■ Enable IPv6 to traverse an IPv4 Secure Socket Layer (SSL) VPN session, and also provide dual-stack support on the VPN termination device. Traditional encrypted client-based Virtual Private Network (VPN) solutions can be leveraged to provide IPv6 access while a user works remotely, provided that the VPN solution can offer at least one of these three capabilities: Many IT groups put a lot of effort into providing IPv6 access within the traditional boundaries of their enterprise and often delay supporting those users who work remotely. ■ IPv6 remote access over Cisco VPN Client: This section discusses providing IPv6 access to enterprise services over an IPsec session using the Cisco VPN Client and host-based IPv6 tunnels. ■ IPv6 remote access over Cisco An圜onnect: This section covers providing IPv6 access to enterprise services over a dual-stack SSL VPN session using the Cisco An圜onnect SSL VPN Client.

This topic covers the following subjects:
