396 
Interface         : Tunnel1 
Number of sessions: 3 
Private address  Public address              Port  Type  State      Holding time 
192.168.0.2      1.0.0.2                     --    H-H   Success    0H 46M  8S 
192.168.0.3      1.0.0.3                     --    H-S   Success    0H 27M 27S 
192.168.0.4      1.0.0.4                     --    H-S   Success    0H 18M 18S 
The output shows that Hub 1 has established a permanent tunnel to Hub 2, Spoke 1, and Spoke 2. 
# Display IPv4 ADVPN tunnel information on Spokes. This example uses Spoke 1. 
[Spoke1] display advpn session 
Interface         : Tunnel1  
Number of sessions: 2 
Private address  Public address              Port  Type  State      Holding time 
192.168.0.1      1.0.0.1                     --    S-H   Success    0H 46M  8S 
192.168.0.2      1.0.0.2                     --    S-H   Success    0H 46M  8S 
The output shows that Spoke 1 has established a permanent hub-spoke tunnel to Hub 1 and Hub 2. 
# Verify that Spoke 1 can ping the private address 192.168.0.4 of Spoke 2. 
[Spoke1] ping 192.168.0.4 
Ping 192.168.0.4 (192.168.0.4): 56 data bytes, press CTRL_C to break 
56 bytes from 192.168.0.4: icmp_seq=0 ttl=255 time=4.000 ms 
56 bytes from 192.168.0.4: icmp_seq=1 ttl=255 time=0.000 ms 
56 bytes from 192.168.0.4: icmp_seq=2 ttl=255 time=0.000 ms 
56 bytes from 192.168.0.4: icmp_seq=3 ttl=255 time=0.000 ms 
56 bytes from 192.168.0.4: icmp_seq=4 ttl=255 time=1.000 ms 
 
--- Ping statistics for 192.168.0.4 --- 
5 packets transmitted, 5 packets received, 0.0% packet loss 
round-trip min/avg/max/std-dev = 0.000/1.000/4.000/1.549 ms 
IPv6 hub-spoke ADVPN configuration example 
Network requirements 
As shown in Figure 151, the primary and secondary VAM servers manage and maintain VAM client 
information for all hubs and spokes. The AAA server performs authentication and accounting for 
VAM clients. The two hubs back up each other, and perform data forwarding and route exchange. 
Establish a permanent ADVPN tunnel between each spoke and each hub.