Yes, theoretically AH can be used, but practically it’s not. For example, the Cisco ASA does not even have it implemented.
You should look at remote access and site to site separately as the needs are totally different. Basically they only have the need for protection in common.
Remote Access: Here we need the mentioned user authentication and IP configuration. Both is not available natively in IKEv1, but is available in IKEv2. With IKEv2 there is no need to use additional protocols for these functions.
Site to site: you do not need user authentication, but possibly transfer IP information. These can be routing-protocols which can not be exchanged with IKEv1. This is the reason that often GRE is used and protected by IPSec. With GRE you can transmit multicast which gives you the possibility to run a IGP over the VPN. This additional encapsulation is not needed if something like VTIs (virtual tunnel interfaces) are implemented. Here you also can run routing-protocols.
With IKEv2, you could theoretically go without a routing protocol as there is IKE authorization which can communicate network information through the tunnel. This is implemented in Cisco’s FlexVPN. Sadly, nearly nothing of these are implemented in our Meraki MX appliances yet.
If you found this post helpful, please give it Kudos. If my answer solves your problem, please click Accept as Solution so others can benefit from it.