RA-VPN connections over IPv6 to Cisco Secure Access are failing to establish, with the Cisco Secure Client UI displaying a generic connection failure message. The issue affects testing of IPv6-based remote access connectivity using an existing RA-VPN profile. Research indicates that the SSE RA-VPN profile is not properly setting the protocol field for IPv6 connectivity.
To resolve the IPv6 RA-VPN connection failure, the IP Protocol Supported setting must be properly configured in the RA-VPN profile. Follow these steps to enable IPv6 support:
Navigate to the Client Settings section in the Cisco Secure Access management interface.
Within Client Settings, locate and access the Administrator Settings section.
Configure the IP Protocol Supported dropdown to include IPv6 support. This setting controls which IP protocols the RA-VPN profile supports for client connections.
Save the updated RA-VPN profile configuration to ensure the IPv6 protocol setting is applied.
Retest the IPv6 RA-VPN connection using the Cisco Secure Client to verify that the connection now establishes successfully.
The root cause of the IPv6 RA-VPN connection failure is that the IP Protocol Supported setting in the RA-VPN profile was not configured to support IPv6 connections. The SSE RA-VPN profile requires explicit configuration of the protocol field to enable IPv6 connectivity. Without this setting properly configured, the Cisco Secure Client cannot establish IPv6-based VPN connections to the Cisco Secure Access platform.
| Revision | Publish Date | Comments |
|---|---|---|
1.0 |
17-Apr-2026
|
Initial Release |