Chapter15 DMVPN
Edit Dynamic Multipoint VPN (DMVPN)
15-12
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12

Firewall

If a firewall has been applied to the interface that was designated as the tunnel
source, Cisco SDM can add access rule entries to the configuration so that GRE,
IPSec, and ISAKMP traffic is allowed through the firewall.
View Details
Click this button to view the access control entries that Cisco SDM will add to the
access rule if you select Allow GRE, IPSec, and ISAKMP traffic through the
firewall.
These entries allow both kinds of ISAKMP traffic, GRE traffic, Encapsulating
Security Protocol (ESP), and Authentication Header P rotocol (AHP).
Edit Dynamic Multipoint VPN (DMVPN)
This window displays the existing DMVPN tunnel configurations. DMVPN
enables you to create a network with a central hub that connects other remote
routers, referred to as spokes. Cisco SDM supports hub-and-spoke network
topology, in which GRE over IPSec traffic is routed through the hub. Cisco SDM
allows you to configure your router as a primary or a secondary DMVPN hub, or
as a spoke router in a DMVPN network.
The following link contains more information about DMVPN (requires CCO
login ID). Multipoint IPSec VPNs
Cisco SDM supports the configuration of a hub-and-spoke DMVPN that u ses
IPSec profiles to define encryption. You can configure a fully-meshed DMVPN,
and use crypto-maps to define encryption in the DMVPN using the CLI. Fully
meshed DMVPNs and DMVPNs using crypto maps are managed a nd modified
using the CLI.
Cisco SDM supports the configuration of a single DMVPN on a router.
The hub should be configured first, to establish the hub IP addresses a nd the
routing parameters that the spokes must be configured with. For other
recommendations on how to configure the routers in a DMVPN, see DMVPN
Configuration Recommendations.