IPSec over DMVPN
Assignment
Goal: Configure GRE over IPSec between the Moscow and St. Petersburg offices. Configure DMVPN over IPSec between Moscow and Chokurdakh/Labytnangi.
- Configure GRE over IPSec between the Moscow and St. Petersburg offices
- Configure DMVPN over IPSec between Moscow and Chokurdakh/Labytnangi
- All nodes in all offices must have IP connectivity
- Document the plan and changes

GRE over IPSec โ Moscow โ St. Petersburg
IKEv1 pre-shared key, 3DES/MD5, transport mode (GRE handles encapsulation, IPSec adds encryption only). The protect-gre profile is attached directly to Tunnel0.
R15 โ IPSec + GRE config
enable
configure terminal
interface Tunnel0
ip address 10.0.0.1 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
tunnel source 200.20.20.15
tunnel destination 100.10.8.18
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key cisco address 100.10.8.18
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode transport
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R18 โ IPSec + GRE config
enable
configure terminal
interface Tunnel0
ip address 10.0.0.2 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
tunnel source 100.10.8.18
tunnel destination 200.20.20.15
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key cisco address 200.20.20.15
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode transport
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R18 โ GRE + IPSec verification
R18#ping 10.0.0.1
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 6/6/6 ms
R18#ping 10.0.0.2
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/5 ms
R18#show crypto session
Crypto session current status
Interface: Tunnel0
Session status: UP-ACTIVE
Peer: 200.20.20.15 port 500
IKEv1 SA: local 100.10.8.18/500 remote 200.20.20.15/500 Active
IPSEC FLOW: permit 47 host 100.10.8.18 host 200.20.20.15
Active SAs: 4, origin: crypto map
DMVPN over IPSec โ Moscow hub, Chokurdakh and Labytnangi spokes
Same IKEv1 policy, but with a wildcard pre-shared key (address 0.0.0.0) since spoke IP addresses are dynamic. Transform mode is tunnel (not transport) for mGRE.
R14 โ DMVPN hub + IPSec
enable
configure terminal
interface Tunnel0
description DMVPN Tunnel
ip address 10.1.0.1 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp network-id 1
load-interval 30
keepalive 5 10
tunnel source 200.20.20.14
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R28 โ DMVPN spoke (Chokurdakh) + IPSec
enable
configure terminal
interface Tunnel0
ip address 10.1.0.2 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp map 10.1.0.1 200.20.20.14
ip nhrp map multicast 200.20.20.14
ip nhrp network-id 1
ip nhrp nhs 10.1.0.1
ip nhrp registration no-unique
load-interval 30
keepalive 5 10
tunnel source Ethernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R27 โ DMVPN spoke (Labytnangi) + IPSec
enable
configure terminal
interface Tunnel0
ip address 10.1.0.3 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp map 10.1.0.1 200.20.20.14
ip nhrp map multicast 200.20.20.14
ip nhrp network-id 1
ip nhrp nhs 10.1.0.1
ip nhrp registration no-unique
load-interval 30
keepalive 5 10
tunnel source Ethernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R27 โ DMVPN + IPSec verification
R27#show dmvpn
Interface: Tunnel0, IPv4 NHRP Details
Type:Spoke, NHRP Peers:2,
Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
2 200.20.20.14 10.1.0.1 UP 01:01:14 S
10.1.0.3 UP 00:00:08 D
1 111.110.35.14 10.1.0.2 UP 00:00:10 D
R27#show crypto isakmp sa
dst src state conn-id status
200.20.20.14 210.110.35.2 QM_IDLE 1001 ACTIVE
210.110.35.2 111.110.35.14 QM_IDLE 1002 ACTIVE
111.110.35.14 210.110.35.2 QM_IDLE 1003 ACTIVE
R27#ping 10.1.0.1
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 6/6/7 ms
R27#ping 10.1.0.2
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 8/9/10 ms
R27#ping 10.1.0.3
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 7/7/8 ms
Full router configs
R15 (AS 1001) โ lab 16 changes
enable
configure terminal
interface Tunnel0
ip address 10.0.0.1 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
tunnel source 200.20.20.15
tunnel destination 100.10.8.18
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key cisco address 100.10.8.18
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode transport
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R18 โ St. Petersburg (AS 2042) โ lab 16 changes
enable
configure terminal
interface Tunnel0
ip address 10.0.0.2 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
tunnel source 100.10.8.18
tunnel destination 200.20.20.15
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key cisco address 200.20.20.15
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode transport
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R14 (AS 1001) โ lab 16 changes
enable
configure terminal
interface Tunnel0
description DMVPN Tunnel
ip address 10.1.0.1 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp network-id 1
load-interval 30
keepalive 5 10
tunnel source 200.20.20.14
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R28 โ Chokurdakh โ lab 16 changes
enable
configure terminal
interface Tunnel0
ip address 10.1.0.2 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp map 10.1.0.1 200.20.20.14
ip nhrp map multicast 200.20.20.14
ip nhrp network-id 1
ip nhrp nhs 10.1.0.1
ip nhrp registration no-unique
load-interval 30
keepalive 5 10
tunnel source Ethernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
R27 โ Labytnangi โ lab 16 changes
enable
configure terminal
interface Tunnel0
ip address 10.1.0.3 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication nhrp1234
ip nhrp map multicast dynamic
ip nhrp map 10.1.0.1 200.20.20.14
ip nhrp map multicast 200.20.20.14
ip nhrp network-id 1
ip nhrp nhs 10.1.0.1
ip nhrp registration no-unique
load-interval 30
keepalive 5 10
tunnel source Ethernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key isakmp1234 address 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
mode tunnel
crypto ipsec profile protect-gre
set security-association lifetime seconds 86400
set transform-set TS
end
copy running-config startup-config
Network Engineer Course | Lab 16