DMVPN Basics- In this article you will learn about the DMVPN design along with various IGP protocols such as EIGRP,OSPF and BGP. I am explaining this topic in deep detail in my Instructor Led CCDE and Self Paced CCDE course. DMVPN uses two major technologies for its operation :
Figure-1 Cisco DMVPN ArchitectureThree different address types are used in DMVPN.
1. Public – NBMA – Underlay address : All these terms can be used interchangeably and refers to a static known address on the hub and a dynamic or static address on the spokes. This address is used to bring up the tunnels. The underlay addresses of HUB and spoke must be reachable. If a spoke to spoke tunnel is created, spoke to spoke underlay (BGP between Service Providers) addresses must be reachable as well. If you are using DMVPN over Internet, the remote location reaches to its local service provider and service providers use BGP for public-NMBA-underlay DMVPN address reachability. Dynamic NAT (Network Address Translation) is allowed on the spokes.
2. Private – Tunnel – Overlay address : You may see one of these addresses in different resources, but all refer to the same thing. They are used interchangeably. In a single DMVPN cloud, one big tunnel subnet is used. Spokes register their private to public address mapping to Hub which is the Next Hop Server with the NHRP register message. For those who are familiar with LISP (Locator and Identity Separation Protocol), this operation is very similar to a Mapping database. LISP is out of the scope of this post. All the routing protocols ( RIP, EIGRP, OSPF, PIM, BGP) can be used over the overlay tunnels, except for IS-IS ! IS-IS doesn’t run over IP but uses layer2 (IS-IS has an ether type), so IS-IS can not be used over DMVPN.
3. Remote or Local address : This address is used in the local area and advertised through the routing protocol over the overlay DMVPN tunnel. In the topology above, spokes or remote sites register to the hub via NHRP protocol. The NHRP register message is used for spokes to register their underlay to overlay address mapping. DMVPN hub knows all the public IP to tunnel IP mapping before the routing protocol starts to advertise local addresses. DMVPN supports IPv4 and IPv6 unicast and multicast transport through the overlay tunnels. DMVPN also supports IPv4 and IPv6 transport through the underlay, which might be Internet or MPLS VPN. DMVPN can be used without IPsec encryption. IPsec is not mandatory for the DMVPN operation,but most if not all of the networks use IPsec with DMVPN. For large-scale DMVPN deployments, GETVPN can be used to encrypt the tunnels.
Since HUB would create crypto key for each spoke separately,with IPSEC, with its group key capabilities, GET VPN provides excellent scaling if the encryption is the needed. DMVPN has three Phases. Phases 1, 2 and 3. Phasse 1 and 2 are made obsolete, by Phase 3, but I will explain how DMVPN works in Phase 1 and 2 as well.
In the topology above, for the 192.168.2.0/24 network behind Spoke 2, next hop is the tunnel IP of the HUB in the routing table of Spoke 1, not the tunnel IP of the Spoke 2. Thus, the data plane traffic always passes through Spoke 1 – Hub – Spoke 2 with this topology in DMVPN Phase 1. Why would you want to design DMVPN with Phase 1?
You may want to bring all the traffic to your centralised place where all your security devices are located. You can filter unwanted traffic between the spokes first. Imagine you are using DMVPN over the Internet. After you create a DMVPN network, spoke to spoke communication, or a centralised shared services devices will be reachable through the Hub and traffic can be filtered before reaching the destinations. Spokes can use their local router for Internet traffic. Internet traffic doesn’t have to go the HUB.
Although Phase 1 is obsolete and, as we will see, Phase 3 gives better scalability and feature sets, it still might be used. It provides excellent scalability for the routing compared to Phase 2. If you are using DMVPN over IPSEC, since the HUB router needs to encrypt and decrypt packets twice, Phase 1 with IPSEC reduces the overall scalability. DMVPN operation is very similar to the Ethernet ARP process. The difference is Ethernet is Broadcast Multiaccess, DMVPN is a Non Broadcast Multiaccess (NBMA).
The biggest disadvantage of Phase 2 is, each spoke has to have all the Remote – LAN subnets of each other since the Hub, preserves the next hop of spokes. In the topology above, for the 192.168.2.0/24 network behind the Spoke 2, Spoke 1 has the tunnel interface (Private-Overlay) address of Spoke 2 as a next hop. In Phase 1, hub is the next hop. Thus, spokes have to have a reachability to the tunnel addresses of each other.
This disallows the summarization or default routing from Hub down to the spokes. This is a serious design limitation for the large scale DMVPN networks. For the distance vector protocols, Split horizon needs to be disabled and “no next-hop self” should be enabled on the HUB. These are serious design limitations for the link state protocols that I will explain later in this post.
Since the next hop in the routing table of the spokes is HUB’s tunnel address, spokes don’t have to have the specific next hop information of each other. This allows summarization and default routing in Phase 3. Hub can send a summary or just a default route down to the spokes. Hence, Phase 3 can scale extremely.
Orhan Ergun, CCIE/CCDE Trainer, Author of Many Networking Books, Network Design Advisor, and Cisco Champion 2019/2020/2021
He created OrhanErgun.Net 10 years ago and has been serving the IT industry with his renowned and awarded training.
Wrote many books, mostly on Network Design, joined many IETF RFCs, gave Public talks at many Forums, and mentored thousands of his students.
Today, with his carefully selected instructors, OrhanErgun.Net is providing IT courses to tens of thousands of IT engineers.