Currently, when a VPN client that is dual stacked connnects, the v6 is killed off by the VPN client.
We don't want that to happen. We do not have IPv6 on our Firepower, but nevertheless, we want to allow the traffic to continue but not let it in the tunnel.
How in the world is this possible? Tac said to "disabling ipv6 on the anyconnect profile file" should do it, but it does not.
Client bypass protocol works does anyone know?
Client bypass protocol should work. If the option is not available from the GUI, you can use flexconfig to push it.
For FMC the option is available under AnyConnect > Connection Settings > Enable Client Bypass Protocol in the Group Policy editor page.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: