Select Page

IPsec VPN With DMVPN Overview

by | 9-May-2021 | Cisco, Security, VPN

IPsec VPN with DMVPN overview

  • IPsec integrated with DMVPN, but not a must
    • Configured as crypto ipsec profile on Tunnel interface (mGRE)
    • Dynamic spoke-to-spoke tunnels is supported
  • The order of operation
    • Underlay routing
    • Packets encapsulated in GRE, then encrypted with IPsec
    • NHRP controls the the tunnels
    • Overlay routing
  • Bringing up a tunnel
    • NHRP signals IPsec to setup encryption
    • IKE/ISAKMP phase 1 & phase 2 negotiation
    • IPsec responds to NHRP and the tunnel is activated
    • All NHRP and data traffic is encrypted
  • Bringing down a tunnel
    • NHRP signals IPsec to tear down tunnel
    • If encryption is cleared or lost, IPsec can signal NHRP to clear the tunnel
  • Spoke to hub tunnels are always nailed up (All DMVPN phases)
    • Hub always has IPsec SA for all spokes
  • Spoke to spoke tunnels are on demand (DMVPN phase 2 and 3)

 

Redundancy consideration

  • IPsec stateful failover isn’t supported
  • Invalid SPI recovery is not useful with DMVPN
    • #no crypto isakmp invalid-spi-recovery
  • Sharing the IPsec SADB between tunnels
    • When using same IPsec profile and tunnel source (must use the interface name)
    • If IPsec SA sessions aren’t shared within same SADB, the SA may get associated with wrong SADB with wrong interface. (Duplicates SAs and tunnel flapping)
    • #tunnel protection ipsec profile VPNPROF1 shared
  • Crypto peers monitoring
    • ISAKMP keepalives on spokes (DPD) for underlay ISAKMP monitoring
    • BFD over DMVPN for fast overlay tunnel monitoring (IOS XE 16.3.1 or later)

 

Crypto best practice

  • BFD over DMVPN for quick spoke-hub and spoke-spoke tunnel recovery
  • IKE/ISAKMP keepalives on spokes only
    • #crypto isakmp keepalive 30 5 [on-demand | periodic]
    • #crypto isakmp nat keepalive 30
  • CPU/Memory on hubs only
    • #crypto call admission limit ike <sa | in-negotiation> <max-SAs>
    • #crypto ikev2 limit max-in-negotiation-sa <max-SAs> <inbound | outbound>
    • #show crypto call admission statistics

 

Scaling IPsec over DMVPN

  • As DMVPN cloud grows, IPsec state grows
    • Linier IPsec SA state from hub to spokes, spoke-to-spoke scale is on-demand
  • Scaling ISAKMP authentication
    • PSK is supported but hard to manage
    • Wildcard PSKs are a bad idea
    • PKI is the preferred solution
  • Scaling IPsec SAs
    • DMVPN over GETVPN

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *