Hello Ryan, ROM: 3700 Software (C3725-ADVENTERPRISEK9-M), Version 12.4(15)T5, RELEASE SOFTWARE (fc4)
It happened in the morning lab as well. As far as i think, there are two static tunneling methods, Gre and IPv6ip and using the Ipv6ip would give an advantage with respect to header processing as compared to gre. Gre should still be capable of transporting Ipv6 ? Regards Rakesh m Date: Fri, 28 Dec 2012 11:29:50 +0300 Subject: Re: [OSL | CCIE_RS] Lab 32, Rs Rip / Eigrp Ipv6 From: [email protected] To: [email protected] CC: [email protected] Rakesh, What version of IOS are you using? Ryan. On Fri, Dec 28, 2012 at 11:10 AM, Rock's M <[email protected]> wrote: Hello Ryan, Please find the below snippet. If i missed something very obvious, please point me out Topology is r1-------r2 r1#show run int tunn0 Building configuration... Current configuration : 145 bytes ! interface Tunnel0 no ip address ipv6 address 2001:1::1/64 ipv6 rip cisco12 enable tunnel source 12.0.0.1 tunnel destination 12.0.0.2 end r1#show run int lo0 Building configuration... Current configuration : 90 bytes ! interface Loopback0 no ip address ipv6 address 1::1/128 ipv6 rip cisco12 enable end r1#ping 2001:1::2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2001:1::2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 8/24/48 ms r1#show ipv6 route 2001:1::2 IPv6 Routing Table - 4 entries Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP U - Per-user Static route, M - MIPv6 I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2 ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 D - EIGRP, EX - EIGRP external C 2001:1::/64 [0/0] via ::, Tunnel0 I can also exchange to and fro from the other end. r1#show ipv6 route rip IPv6 Routing Table - 5 entries Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP U - Per-user Static route, M - MIPv6 I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2 ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 D - EIGRP, EX - EIGRP external R 2::2/128 [120/2] via FE80::C006:16FF:FEEC:0, Tunnel0 r1#ping 2::2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2::2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 8/28/48 ms Am I missing something ? Regards Rakesh M Date: Fri, 28 Dec 2012 10:37:44 +0300 Subject: Re: [OSL | CCIE_RS] Lab 32, Rs Rip / Eigrp Ipv6 From: [email protected] To: [email protected] CC: [email protected] You'll be able to ping the IPv4 address but not the IPv6 without the tunnel mode ipv6ip command. Give it a try. Configure the tunnel but don't put tunnel mode ipv6ip and see if you can ping the ipv6 address on the other side of the tunnel. It will fail. The IPv6 route will show as directly connected but since the tunnel doesn't know to encapsulate the IPv6 traffic over IPv4 to send across the tunnel (tunnel mode ipv6ip), your ping will fail. Once you put that in there, you should be able to ping. If you then add your rip commands and debug ipv6 rip, you'll see your rip updates coming across the tunnel. On Fri, Dec 28, 2012 at 10:24 AM, Rock's M <[email protected]> wrote: Hello Ryan, Thank you for the reply. Will not be able to ping the other end with normal GRE encapsulation by default , without hardcoding IPv6ip ? Regards Rakesh M Date: Fri, 28 Dec 2012 10:18:49 +0300 Subject: Re: [OSL | CCIE_RS] Lab 32, Rs Rip / Eigrp Ipv6 From: [email protected] To: [email protected] CC: [email protected] I believe you are talking about 32.9 in WB1. The tunnel mode ipv6ip specifies ipv6 as a passenger protocol to transport over the ipv4 network. I'm not sure how you were able to successfully ping, but since the task requires running rip across the tunnel, you should be able to debug ip rip and see updates coming from tunnel x. If you setup your tunnel and don't apply the rip configuration, you should be able to ping the ipv6 address across the tunnel. Here is a good link describing all the tunnels for ipv6. Marko has also written a few blogs on the subject. Just google ipv6 tunnel ipexpert to find them. http://www.cisco.com/en/US/docs/ios-xml/ios/interface/configuration/xe-3s/ip6-ipoverip6-tunls-xe.html#GUID-F963503B-27C8-49E9-A9AB-FE73298209FF On Fri, Dec 28, 2012 at 6:59 AM, Rock's M <[email protected]> wrote: Hello, If the below request is not in the proper channel / mailing list , please guide me, This is the first post into this mailing list. In Vol 1 lab32, the Tunnel mode was used to be ipv6ip , i did the lab initially without having a look at solution, but later found that we should use ipv6ip mode for tunnel interface between r2 and r5 ? Is there any specific requirement as i could ping across everything without using the mode ? Also, there was an acl to allow the tunnel ip's on R7,8,9 , which i did not require. Please advice about tunnel mode and acl ? _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com http://onlinestudylist.com/mailman/listinfo/ccie_rs -- V/r, Ryan Krcelic -- V/r, Ryan Krcelic -- V/r, Ryan Krcelic _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com http://onlinestudylist.com/mailman/listinfo/ccie_rs
