IP Security - Virtual Private Network
Left running head: 
Chapter name (automatic)
886
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
Alcatel-Lucent
DYNAMIC MULTIPOINT VIRTUAL PRIVATE NETWORK (DMVPN) 
O
VERVIEW
VPN is a mechanism to provide secure and private communication channel over 
public infrastructure. Normally a secure tunnel is formed between two 
communication end-points. Today’s geographically distributed business 
establishments needs multiple end points to be connected via VPN. Effectively the 
VPN connectivity forms an overlay network on the public Internet. In order to 
provision and manage the VPN network, few standard topologies like ring, star, 
mesh are deployed. 
A Dynamic Multipoint Virtual Private Network is an enhancement of VPN 
configuration process. DMVPN provides a scalable and efficient site-to-site VPN 
setup across multiple branch offices. The VPN tunnels are formed on demand and 
brought down when not in use, hence scalable. The tunnels are between branch 
office end points, with the help of central control, normally central office. The end 
point traffic does not flow via central office, thus efficient. Scaling to higher number 
of branch office is not limited by the central office bandwidth or processing power. 
DMVPN forms site-to-site VPN in hub and spoke configuration. In typical 
deployments, branch offices are spokes and central office is a hub. Financial 
institutions, transport service providers and medical institutions are few of the 
common deployment sites where hub and spoke model is used.
The main idea of DMVPN is to develop a scalable large network (hub and spoke 
model), where a spoke can be removed/added into the network without any 
change in configuration in any other nodes. At any point of time, a spoke should 
be able to establish a IPsec tunnel with another spoke. This can be achieved in 
two steps. Firstly, to identify the spoke with who the tunnel will be set up and 
secondly to establish a standard IPsec VPN tunnel with that spoke. The Next Hop 
Resolution Protocol (NHRP) is used to identify the peer end spoke for IPsec 
tunnel establishment. 
NHRP works in client-server model. In the hub and spoke network, the hub acts 
as the "Next Hop Server" (NHS) and each spoke acts as a "Next Hop Client".
When a spoke is added to the network, it registers with the NHS by sending a 
NHRP REGISTER request. This way, the NHS learns the IP address and the 
corresponding NBMA address of each of the spokes. So the hub (NHS) will have 
a cache database of all the spokes (NHRP clients). A spoke needs to re-register 
after registration timeout. Whenever required, a spoke queries the NHS with a 
NHRP RESOLUTION request to get information about other spoke. After having 
the information about the peer, the spoke initiates a IPSec tunnel establishment in 
the normal way.