19.1.4 Lab – Implement a DMVPN Phase 3 Spoke-to-Spoke Topology (Answers)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Device | Interface | IPv4 Address |
---|---|---|
R1 | G0/0/1 | 192.0.2.1/30 |
Tunnel 1 | 100.100.100.1/29 | |
R2 | G0/0/1 | 198.51.100.2/30 |
Loopback 0 | 192.168.2.1/24 | |
Loopback 1 | 172.16.2.1/24 | |
Tunnel 1 | 100.100.100.2/29 | |
R3 | G0/0/1 | 203.0.113.2/30 |
Loopback 0 | 192.168.3.1/24 | |
Loopback 1 | 172.16.3.1/24 | |
Tunnel 1 | 100.100.100.3/29 |
Objectives
In this lab, you will create a Dynamic Multipoint Virtual Private Network (DMVPN) that consists of a hub router with two spokes. You will implement a DMVPN Phase 3 spoke-to-spoke topology.
- Part 1: Build the Network and Configure Basic Device Settings
- Part 2: Configure DMVPN Phase 3
- Part 3: Verify DMVPN Phase 3
Background / Scenario
In this lab, you will modify a DMVPN Phase 1 network to create Phase 3 spoke-to-spoke network. The configuration from the previous Phase 1 lab are required as the starting point for this lab.
Phase 3 improved upon Phase 2 by using a different mechanism for routing between destinations in spoke-to-spoke tunnels. Because of this, Phase 3 can be seen as superseding Phase 2. For that reason, there is no Phase 2 lab.
In DMVPN Phase 3, the spoke routers create routing table entries in which NHRP manipulates the routing information for tunnel destinations by overriding the next hop that was determined by the routing protocol. NHRP provides the actual destination network as the next hop. This enables the distribution of route summaries from the hub router to the spokes. Finally, Phase 3 enables a hierarchical tree-based VPN architecture in which central hub routers connect other, regional hubs and their spokes. This allows for the establishment of tunnels between routers that are not connected to the same regional hub.
In Phase 1 DMVPN, all spoke router traffic must pass through the hub router, as shown in the topology diagram.
In a Phase 3 spoke-spoke DMVPN, traffic initially travels to the hub. The traffic then travels directly between the spoke routers over the spoke-to-spoke tunnel.
Note: This lab does not include the configuration of IPSec to secure the tunnels. This essential procedure will be covered in a later lab.
Note: This lab is an exercise in configuring and verifying various implementations of DMVPN topologies and does not reflect networking best practices.
Note: The routers used with CCNP hands-on labs are the Cisco 4221 with Cisco IOS XE Release 16.9.4 (universalk9 image). The Layer 3 switch is a Cisco Catalyst 3650 with Cisco IOS XE Release 16.9.4 (universalk9 image). Other routers, Layer 3 switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and the output produced might vary from what is shown in the labs.
Note: Make sure that the devices have been erased and have no startup configurations. If you are unsure, please contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
• 3 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
• 1 Layer 3 switch (Cisco 3650 with Cisco IOS Release 16.9.4 universal image or comparable)
• 1 PC (Choice of operating system with a terminal emulation program installed)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet cables as shown in the topology
Initial Configurations
Students will use the devices that were configured for the “Lab – Implement a DMVPN Phase 1 Hub-to-Spoke Topology”. If they do not have the preconfigured devices, they could benefit by practicing configuration of DMVPN Phase 1 from that lab. Otherwise, they could paste the initial configurations into the devices. Initial configurations are provided here.
R1 hub router
hostname R1 no ip domain lookup banner motd # R1, Implement DMVPN Hub # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 192.0.2.1 255.255.255.252 no shutdown exit interface tunnel 1 tunnel mode gre multipoint tunnel source g0/0/1 tunnel key 999 ip address 100.100.100.1 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp map multicast dynamic bandwidth 4000 ip mtu 1400 ip tcp adjust-mss 1360 exit router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 1.1.1.1 network 100.100.100.0 255.255.255.248 af-interface tunnel 1 no split-horizon router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 10.1.1.1 network 192.0.2.0 255.255.255.252 end
R2 spoke router 1
hostname R2 no ip domain lookup banner motd # R2, Implement DMVPN Spoke 1 # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 198.51.100.2 255.255.255.252 no shutdown exit interface loopback 0 ip address 192.168.2.1 255.255.255.0 no shutdown exit interface loopback 1 ip address 172.16.2.1 255.255.255.0 no shutdown exit interface tunnel 1 tunnel mode gre ip tunnel source loopback 0 tunnel destination 192.0.2.1 tunnel key 999 ip address 100.100.100.2 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp nhs 100.100.100.1 ip nhrp map multicast 192.0.2.1 ip nhrp map 100.100.100.1 192.0.2.1 ip mtu 1400 ip tcp adjust-mss 1360 router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 2.2.2.2 network 100.100.100.0 255.255.255.248 network 172.16.2.0 255.255.255.0 eigrp stub connected router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 20.2.2.2 network 198.51.100.0 255.255.255.252 network 192.168.2.0 255.255.255.0 end
Router R3 spoke 2
hostname R3 no ip domain lookup banner motd # R3, Implement DMVPN Spoke 2 # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 203.0.113.2 255.255.255.252 no shutdown exit interface loopback 0 ip address 192.168.3.1 255.255.255.0 no shutdown exit interface loopback 1 ip address 172.16.3.1 255.255.255.0 no shutdown exit interface tunnel 1 tunnel mode gre ip tunnel source loopback 0 tunnel destination 192.0.2.1 tunnel key 999 ip address 100.100.100.3 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp nhs 100.100.100.1 ip nhrp map multicast 192.0.2.1 ip nhrp map 100.100.100.1 192.0.2.1 ip mtu 1400 ip tcp adjust-mss 1360 router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 3.3.3.3 network 100.100.100.0 255.255.255.248 network 172.16.3.0 255.255.255.0 eigrp stub connected router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 30.3.3.3 network 203.0.113.0 255.255.255.252 network 192.168.3.0 255.255.255.0 eigrp stub connected end
Layer 3 Switch DMVPN
hostname DMVPN no ip domain lookup ip routing banner motd # DMVPN, DMVPN cloud switch # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login interface g1/0/11 no switchport ip address 192.0.2.2 255.255.255.252 no shutdown exit interface g1/0/12 no switchport ip address 198.51.100.1 255.255.255.252 no shutdown exit interface g1/0/13 no switchport ip address 203.0.113.1 255.255.255.252 no shutdown exit router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 40.4.4.4 network 192.0.2.0 255.255.255.252 network 198.51.100.0 255.255.255.252 network 203.0.113.0 255.255.255.252 end
Instructions
Part 1: Build the Network and Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings if the network is not already configured. This lab uses the same topology and final configurations from the Lab – Implement a DMVPN Phase 1 Hub-to-Spoke Topology.
Step 1: Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2: Configure initial settings for each router and the Layer 3 switch.
Console into each device, enter global configuration mode, and apply the initial settings for the lab if the devices are not already configured.
Step 3: Verify connectivity in the network.
a. From R1, ping the loopback interfaces of R2 and R3. All pings should be successful. This verifies that full connectivity exists in the underlay, or transport, network.
R1# ping 192.168.2.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms R1# ping 192.168.3.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
b. From R2 traceroute to the Loopback 1 interface of R3. You should see the following output. Note that traffic from the R2 spoke router travels through the R1 hub router to reach R3. This is the DMVPN Phase 1 traffic flow. Repeat the traceroute to verify this result.
R2# traceroute 172.16.3.1 Type escape sequence to abort. Tracing the route to 172.16.3.1 VRF info: (vrf in name/id, vrf out name/id) 1 100.100.100.1 1 msec 1 msec 1 msec 2 100.100.100.3 1 msec * 2 msec
c. On the spoke routers, issue the show ip route
command. Note that EIGRP shows the next hop for the Loopback 1 networks to be the R1 tunnel interface address. That is, both spoke routers will use R1 to send traffic on the overlay network to the LANs.
R2# show ip route eigrp | begin Gateway Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks D 172.16.3.0/24 [90/102400640] via 100.100.100.1, 00:21:14, Tunnel1 192.0.2.0/30 is subnetted, 1 subnets D 192.0.2.0 [90/15360] via 198.51.100.1, 00:21:21, GigabitEthernet0/0/1 D 192.168.3.0/24 [90/16000] via 198.51.100.1, 00:21:21, GigabitEthernet0/0/1 203.0.113.0/30 is subnetted, 1 subnets D 203.0.113.0 [90/15360] via 198.51.100.1, 00:21:21, GigabitEthernet0/0/1 Close configuration window open configuration window R3# show ip route eigrp | begin Gateway Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks D 172.16.2.0/24 [90/102400640] via 100.100.100.1, 00:22:49, Tunnel1 192.0.2.0/30 is subnetted, 1 subnets D 192.0.2.0 [90/15360] via 203.0.113.1, 00:22:59, GigabitEthernet0/0/1 D 192.168.2.0/24 [90/16000] via 203.0.113.1, 00:22:59, GigabitEthernet0/0/1 198.51.100.0/30 is subnetted, 1 subnets D 198.51.100.0 [90/15360] via 203.0.113.1, 00:22:59, GigabitEthernet0/0/1
Part 2: Configure DMVPN Phase 3
In this part of the lab, you will configure DMVPN Phase 3 to create DMVPN tunnels between the spoke routers. Initially, the services of the hub are required to begin data transfer over the VPN. However, the hub multipoint tunnel interface detects that traffic is “hairpinning,” or exiting the interface on which it was received. The hub router sends redirect messages to the two spoke routers that are communicating. The spoke routers use the redirect messages to dynamically create a tunnel to connect to each other. In this way, the hub router does not need to forward spoke-to-spoke traffic after the setup of the spoke-to-spoke tunnel.
Step 1: Modify the tunnel interfaces on the spoke routers.
This lab builds on the Phase 1 lab that was previously completed. On the spoke routers R2 and R3, modify the configurations of the Tunnel 1 interfaces. The network will essentially be configured for DMVPN Phase 2 at the conclusion of this step.
a. On R2, set the tunnel mode to mGRE. You will see an error message that states that point-to-multipoint tunnels can not have static tunnel destinations configured.
R2(config)# interface tunnel 1 R2(config-if)# tunnel mode gre multipoint Tunnel set mode failed. p2mp tunnels cannot have a tunnel destination.
b. Remove the tunnel destination configuration. You will see the interface go down and the EIGRP adjacency with the hub router be lost. Reconfigure the tunnel mode as GRE multipoint. You will see the interface come back up and the EIGRP adjacency will be restored.
R2(config-if)# no tunnel destination *Mar 27 12:46:31.496: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to down *Mar 27 12:46:31.499: %DUAL-5-NBRCHANGE: EIGRP-IPv4 68: Neighbor 100.100.100.1 (Tunnel1) is down: interface down R2(config-if)# tunnel mode gre multipoint *Mar 27 12:46:46.629: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to up *Mar 27 12:46:48.008: %DUAL-5-NBRCHANGE: EIGRP-IPv4 68: Neighbor 100.100.100.1 (Tunnel1) is up: new adjacency
c. Repeat this process for the R3 tunnel interface. At this point, you have essentially configured DMVPN Phase 2. You may want to verify the R1 can ping R2 and R3 loopbacks again.
d. Verify the tunnel interface configuration is now using mGRE with the show interface tunnel 1 command.
R3# show interface tunnel 1 | include Tunnel protocol Tunnel protocol/transport multi-GRE/IP
Step 2: Modify the configuration on the spoke routers to enable NHRP routing shortcuts.
Configure the spoke router interfaces on R2 and R3 to enable NHRP to add spoke networks as next hops in the EIGRP routing table. The hub router will send NHRP redirect messages to the spokes. NHRP uses information in the redirect messages to manipulate the EIGRP routing table and create the next hop shortcuts.
R2(config)# interface tunnel 1 R2(config-if)# ip nhrp shortcut R3(config)# interface tunnel 1 R3(config-if)# ip nhrp shortcut
Step 3: Modify the configuration of hub router to send NHRP redirect messages.
The Tunnel 1 interface of the hub router needs to be configured to send NHRP redirect messages to the spokes when it detects spoke-to-spoke traffic. Issue the ip nhrp redirect
command on R1.
R1(config)# interface tunnel 1 R1(config-if)# ip nhrp redirect
Part 3: Verify DMVPN Phase 3
Now that DMVPN Phase 3 is complete, you can test dynamic spoke-to-spoke tunnel creation.
Step 1: Observe dynamic tunnel creation.
a. Return to R2. Initiate a traceroute to the simulated LAN interface on R3. The path will pass through R1 as it does in DMVPN Phase 1.
R2# traceroute 172.16.3.1 Type escape sequence to abort. Tracing the route to 172.16.3.1 VRF info: (vrf in name/id, vrf out name/id) 1 100.100.100.1 1 msec 1 msec 1 msec 2 100.100.100.3 1 msec * 2 msec
b. Issue the traceroute command again. You will now see that R1 has enabled direct spoke-to-spoke communication between R2 and R3. This tunnel will expire after ten minutes by default. The tunnel dynamically reopens after data is sent to the spoke router again.
R2# traceroute 172.16.3.1 Type escape sequence to abort. Tracing the route to 172.16.3.1 VRF info: (vrf in name/id, vrf out name/id) 1 100.100.100.3 1 msec * 1 msec
c. Repeat the traceroute commands on R3 to 172.16.2.1.
Step 2: View the routing table.
a. On R2, issue the command to view the EIGRP routes that are in the routing table. Compare this routing table with the DMVPN Phase 1 routing from earlier in this lab. You should see that EIGRP shows the next hop interface to the 172.16.3.0 network to be the unchanged. However, the route is flagged with % indicating that NHRP is has overridden the next hop entry with its own value. Also notice that an NHRP route now appears in the routing table. This route indicates that the tunnel interface for R3 is considered to be directly connected by NHRP.
R2# show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP a - application route + - replicated route, % - next hop override, p - overrides from PfR Gateway of last resort is not set 100.0.0.0/8 is variably subnetted, 3 subnets, 2 masks C 100.100.100.0/29 is directly connected, Tunnel1 L 100.100.100.2/32 is directly connected, Tunnel1 H 100.100.100.3/32 is directly connected, 00:03:53, Tunnel1 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks C 172.16.2.0/24 is directly connected, Loopback1 L 172.16.2.1/32 is directly connected, Loopback1 D % 172.16.3.0/24 [90/102400640] via 100.100.100.1, 02:53:00, Tunnel1 192.0.2.0/30 is subnetted, 1 subnets D 192.0.2.0 [90/15360] via 198.51.100.1, 03:38:15, GigabitEthernet0/0/1 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.2.0/24 is directly connected, Loopback0 L 192.168.2.1/32 is directly connected, Loopback0 D 192.168.3.0/24 [90/16000] via 198.51.100.1, 03:38:15, GigabitEthernet0/0/1 198.51.100.0/24 is variably subnetted, 2 subnets, 2 masks C 198.51.100.0/30 is directly connected, GigabitEthernet0/0/1 L 198.51.100.2/32 is directly connected, GigabitEthernet0/0/1 203.0.113.0/30 is subnetted, 1 subnets D 203.0.113.0 [90/15360] via 198.51.100.1, 03:38:15, GigabitEthernet0/0/1
b. View the value that is actually used for the next hop address. It is marked with NHO for next hop override. This indicates that the next hop to 172.16.3.0 is R3 through the spoke-to-spoke tunnel.
R2# show ip route next-hop-override | begin Gateway Gateway of last resort is not set 100.0.0.0/8 is variably subnetted, 3 subnets, 2 masks C 100.100.100.0/29 is directly connected, Tunnel1 L 100.100.100.2/32 is directly connected, Tunnel1 H 100.100.100.3/32 is directly connected, 00:17:39, Tunnel1 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks C 172.16.2.0/24 is directly connected, Loopback1 L 172.16.2.1/32 is directly connected, Loopback1 D % 172.16.3.0/24 [90/102400640] via 100.100.100.1, 00:17:41, Tunnel1 [NHO][90/255] via 100.100.100.3, 00:17:39, Tunnel1 192.0.2.0/30 is subnetted, 1 subnets D 192.0.2.0 [90/15360] via 198.51.100.1, 01:02:56, GigabitEthernet0/0/1 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.2.0/24 is directly connected, Loopback0 L 192.168.2.1/32 is directly connected, Loopback0 D 192.168.3.0/24 [90/16000] via 198.51.100.1, 01:02:56, GigabitEthernet0/0/1 198.51.100.0/24 is variably subnetted, 2 subnets, 2 masks C 198.51.100.0/30 is directly connected, GigabitEthernet0/0/1 L 198.51.100.2/32 is directly connected, GigabitEthernet0/0/1 203.0.113.0/30 is subnetted, 1 subnets D 203.0.113.0 [90/15360] via 198.51.100.1, 01:02:56, GigabitEthernet0/0/1
Step 3: Verify the DMVPN
a. View the DMVPN information with the spoke-to-spoke tunnel open. The first entry in the table is the static tunnel between R2 and the hub router. The DLX flag indicates that the entry is the local network. The DT1 entry is the route through the overlay network, and the DT2 entry the next hop override to the target network. If the spoke-to-spoke tunnel has closed, generate traffic to reopen it with traceroute.
R2# show dmvpn detail Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket T1 - Route Installed, T2 - Nexthop-override C - CTS Capable, I2 - Temporary # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ========================================================================== Interface Tunnel1 is up/up, Addr. is 100.100.100.2, VRF "" Tunnel Src./Dest. addr: 192.168.2.1/Multipoint, Tunnel VRF "" Protocol/Transport: "multi-GRE/IP", Protect "" Interface State Control: Disabled nhrp event-publisher : Disabled IPv4 NHS: 100.100.100.1 RE priority = 0 cluster = 0 Type:Spoke, Total NBMA Peers (v4/v6): 3 # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb Target Network ----- --------------- --------------- ----- -------- ----- ----------------- 1 192.0.2.1 100.100.100.1 UP 03:22:47 S 100.100.100.1/32 1 192.168.2.1 100.100.100.2 UP 00:01:36 DLX 100.100.100.2/32 2 192.168.3.1 100.100.100.3 UP 00:01:36 DT1 100.100.100.3/32 192.168.3.1 100.100.100.3 UP 00:01:36 DT2 172.16.3.0/24 Crypto Session Details: -------------------------------------------------------------------------------- Pending DMVPN Sessions:
b. Repeat this command on R3.
Step 4: View NHRP Mappings
Note: If it has been more than 10 minutes since you completed your traceroutes, repeat them now to re-establish the spoke-to-spoke tunnels.
a. On R2 and R3, issue the show ip nhrp detail
command to view the NHRP information for the routers. Note the correspondence between the entries in the output of this command with the output from the show dmvpn detail
command. The first entry is the static entry to the hub router. The second entry is the local route, corresponding to the DTX entry in output above. The third entry corresponds to the DT1 entry and is flagged with router nhop rib. This indicates that the router has an explicit method to reach the tunnel IP address using an NBMA address and has an associated route installed in the routing table.
The flag rib nho indicates that the router has found an identical route in the routing table that belongs to a different protocol (EIGRP in this case.). NHRP has overridden the other protocol’s next-hop entry for the network by installing a next-hop shortcut in the routing table. This corresponds to the DT2 entry in the show dmvpn detail
output.
R2# show ip nhrp detail 100.100.100.1/32 via 100.100.100.1 Tunnel1 created 04:03:01, never expire Type: static, Flags: NBMA address: 192.0.2.1 Preference: 255 100.100.100.2/32 via 100.100.100.2 Tunnel1 created 00:00:21, expire 00:09:38 Type: dynamic, Flags: router unique local NBMA address: 192.168.2.1 Preference: 255 (no-socket) Requester: 100.100.100.3 Request ID: 9 100.100.100.3/32 via 100.100.100.3 Tunnel1 created 00:00:21, expire 00:09:38 Type: dynamic, Flags: router nhop rib NBMA address: 192.168.3.1 Preference: 255 172.16.3.0/24 via 100.100.100.3 Tunnel1 created 00:00:21, expire 00:09:38 Type: dynamic, Flags: router rib nho NBMA address: 192.168.3.1 Preference: 255
b. You have successfully configured a DMVPN Phase 3 network.
Router Interface Summary Table
Router Model | Ethernet Interface #1 | Ethernet Interface #2 | Serial Interface #1 | Serial Interface #2 |
---|---|---|---|---|
1800 | Fast Ethernet 0/0 (F0/0) | Fast Ethernet 0/1 (F0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
1900 | Gigabit Ethernet 0/0 (G0/0) | Gigabit Ethernet 0/1 (G0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
2801 | Fast Ethernet 0/0 (F0/0) | Fast Ethernet 0/1 (F0/1) | Serial 0/1/0 (S0/1/0) | Serial 0/1/1 (S0/1/1) |
2811 | Fast Ethernet 0/0 (F0/0) | Fast Ethernet 0/1 (F0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
2900 | Gigabit Ethernet 0/0 (G0/0) | Gigabit Ethernet 0/1 (G0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
4221 | Gigabit Ethernet 0/0/0 (G0/0/0) | Gigabit Ethernet 0/0/1 (G0/0/1) | Serial 0/1/0 (S0/1/0) | Serial 0/1/1 (S0/1/1) |
4300 | Gigabit Ethernet 0/0/0 (G0/0/0) | Gigabit Ethernet 0/0/1 (G0/0/1) | Serial 0/1/0 (S0/1/0) | Serial 0/1/1 (S0/1/1) |
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.
Device Configs – Final
Router R1
enable configure terminal hostname R1 no ip domain lookup banner motd # R1, Implement DMVPN Hub # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 192.0.2.1 255.255.255.252 no shutdown exit interface tunnel 1 tunnel mode gre multipoint tunnel source g0/0/1 tunnel key 999 ip address 100.100.100.1 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp map multicast dynamic ip nhrp redirect bandwidth 4000 ip mtu 1400 ip tcp adjust-mss 1360 exit router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 1.1.1.1 network 100.100.100.0 255.255.255.248 af-interface tunnel 1 no split-horizon router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 10.1.1.1 network 192.0.2.0 255.255.255.252 end
Router R2
enable configure terminal hostname R2 no ip domain lookup banner motd # R2, Implement DMVPN Spoke 1 # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 198.51.100.2 255.255.255.252 no shutdown exit interface loopback 0 ip address 192.168.2.1 255.255.255.0 no shutdown exit interface loopback 1 ip address 172.16.2.1 255.255.255.0 no shutdown exit interface tunnel 1 tunnel mode gre multipoint tunnel source loopback 0 no tunnel destination tunnel key 999 ip address 100.100.100.2 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp nhs 100.100.100.1 ip nhrp map multicast 192.0.2.1 ip nhrp map 100.100.100.1 192.0.2.1 ip nhrp shortcut ip mtu 1400 ip tcp adjust-mss 1360 router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 2.2.2.2 network 100.100.100.0 255.255.255.248 network 172.16.2.0 255.255.255.0 eigrp stub connected router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 20.2.2.2 network 198.51.100.0 255.255.255.252 network 192.168.2.0 255.255.255.0 end
Router R3
enable configure terminal hostname R3 no ip domain lookup banner motd # R3, Implement DMVPN Spoke 2 # line con 0 exec-timeout 0 0 logging synchronous exit line vty 0 4 privilege level 15 password cisco123 exec-timeout 0 0 logging synchronous login exit interface g0/0/1 ip address 203.0.113.2 255.255.255.252 no shutdown exit interface loopback 0 ip address 192.168.3.1 255.255.255.0 no shutdown exit interface loopback 1 ip address 172.16.3.1 255.255.255.0 no shutdown exit interface tunnel 1 tunnel mode gre multipoint tunnel source loopback 0 no tunnel destination tunnel key 999 ip address 100.100.100.3 255.255.255.248 ip nhrp network-id 1 ip nhrp authentication NHRPauth ip nhrp nhs 100.100.100.1 ip nhrp map multicast 192.0.2.1 ip nhrp map 100.100.100.1 192.0.2.1 ip nhrp shortcut ip mtu 1400 ip tcp adjust-mss 1360 router eigrp DMVPN_TUNNEL_NET address-family ipv4 unicast autonomous-system 68 eigrp router-id 3.3.3.3 network 100.100.100.0 255.255.255.248 network 172.16.3.0 255.255.255.0 eigrp stub connected router eigrp DMVPN_TRANS_NET address-family ipv4 unicast autonomous-system 168 eigrp router-id 30.3.3.3 network 203.0.113.0 255.255.255.252 network 192.168.3.0 255.255.255.0 eigrp stub connected end