Chapter11 DMVPN
Edit Dynamic Multipoint VPN (DMVPN)
11-12
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08

Firewall

If a firewall has been applied to the interface that was designated as the tunnel
source, SDM can add access rule entries to the configuration so that GRE, IPSec,
and ISAKMP traffic is allowed through the firewall.
View Details
Click this button to view the access control entries that SDM will add to the access
rule if you select Allow GRE, IPSec, and ISAKMP traffic through the firewall.
These entries allow both kinds of ISAKMP traffic, GRE traffic, Encapsulating
Security Protocol (ESP), and Authentication Header P rotocol (AHP).
Edit Dynamic Multipoint VPN (DMVPN)
This window displays the existing DMVPN tunnel configurations. DMVPN
enables you to create a network with a central hub that connects other remote
routers, referred to as spokes. SDM supports hub-and-spoke network topology, in
which GRE over IPSec traffic is routed through the hub. SDM allows you to
configure your router as a primary or a secondary DMVPN hub, or as a spoke
router in a DMVPN network.
The following link contains more information about DMVPN (requires CCO
login ID). Multipoint IPSec VPNs
SDM supports the configuration of a hub-and-spoke DMVPN that uses IPSec
profiles to define encryption. You can configure a fully-meshed DMVPN, and use
crypto-maps to define encryption in the DMVPN using the CLI. Fully meshed
DMVPNs and DMVPNs using crypto maps are managed and modified using the
CLI.
SDM supports the configuration of a single DMVPN on a router.
The hub should be configured first, to establish the hub IP addresses a nd the
routing parameters that the spokes must be configured with. For other
recommendations on how to configure the routers in a DMVPN, see DMVPN
Configuration Recommendations.
Interface
The physical interface from which this tunnel originates.