mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	Added general theoretical IPsec documentation. Changed site-to-site IPsec VPN documentation. Added steps for configuration. Added documentation for troubleshooting site-to-site IPsec VPN.
		
			
				
	
	
		
			423 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			423 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| .. _vpn-dmvpn:
 | ||
| 
 | ||
| #####
 | ||
| DMVPN
 | ||
| #####
 | ||
| 
 | ||
| :abbr:`DMVPN (Dynamic Multipoint Virtual Private Network)` is a dynamic
 | ||
| :abbr:`VPN (Virtual Private Network)` technology originally developed by Cisco.
 | ||
| While their implementation was somewhat proprietary, the underlying
 | ||
| technologies are actually standards based. The three technologies are:
 | ||
| 
 | ||
| * :abbr:`NHRP (Next Hop Resolution Protocol)` :rfc:`2332`
 | ||
| * :abbr:`mGRE (Multipoint Generic Routing Encapsulation)` :rfc:`1702`
 | ||
| * :abbr:`IPSec (IP Security)` - too many RFCs to list, but start with
 | ||
|   :rfc:`4301`
 | ||
| 
 | ||
| NHRP provides the dynamic tunnel endpoint discovery mechanism (endpoint
 | ||
| registration, and endpoint discovery/lookup), mGRE provides the tunnel
 | ||
| encapsulation itself, and the IPSec protocols handle the key exchange, and
 | ||
| crypto mechanism.
 | ||
| 
 | ||
| In short, DMVPN provides the capability for creating a dynamic-mesh VPN
 | ||
| network without having to pre-configure (static) all possible tunnel end-point
 | ||
| peers.
 | ||
| 
 | ||
| .. note:: DMVPN only automates the tunnel endpoint discovery and setup. A
 | ||
|    complete solution also incorporates the use of a routing protocol. BGP is
 | ||
|    particularly well suited for use with DMVPN.
 | ||
| 
 | ||
| .. figure:: /_static/images/vpn_dmvpn_topology01.png
 | ||
|    :scale: 40 %
 | ||
|    :alt: Baseline DMVPN topology
 | ||
| 
 | ||
|    Baseline DMVPN topology
 | ||
| 
 | ||
| *************
 | ||
| Configuration
 | ||
| *************
 | ||
| 
 | ||
| Tunnel interface configuration
 | ||
| ==============================
 | ||
| 
 | ||
| NHRP never handles routing of prefixes itself. You need to run some real routing
 | ||
| protocol (e.g. BGP) to advertise routes over the tunnels. What nhrpd does it
 | ||
| establishes ‘shortcut routes’ that optimizes the routing protocol to avoid going
 | ||
| through extra nodes in NBMA GRE mesh.
 | ||
| 
 | ||
| NHRP does route NHRP domain addresses individually using per-host prefixes.
 | ||
| This is similar to Cisco FlexVPN, but in contrast to opennhrp which uses
 | ||
| a generic subnet route.
 | ||
| 
 | ||
| To create NBMA GRE tunnel you might use the following:
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   set interfaces tunnel tun100 address '10.0.0.1/32'
 | ||
|   set interfaces tunnel tun100 enable-multicast
 | ||
|   set interfaces tunnel tun100 encapsulation 'gre'
 | ||
|   set interfaces tunnel tun100 ip adjust-mss '1360'
 | ||
|   set interfaces tunnel tun100 mtu '1400'
 | ||
|   set interfaces tunnel tun100 parameters ip key '42'
 | ||
|   set interfaces tunnel tun100 source-interface 'eth0'
 | ||
| 
 | ||
| * Please refer to the :ref:`tunnel-interface` documentation for the individual
 | ||
|   tunnel related options.
 | ||
| 
 | ||
|   .. note:: The IP-address is assigned as host prefix to tunnel interface.
 | ||
|     NHRP will automatically create additional host routes pointing to tunnel interface
 | ||
|     when a connection with these hosts is established.
 | ||
| 
 | ||
| The tunnel interface subnet prefix should be announced by routing protocol
 | ||
| from the hub nodes (e.g. BGP ‘network’ announce). This allows the routing
 | ||
| protocol to decide which is the closest hub and determine the relay hub on
 | ||
| prefix basis when direct tunnel is not established.
 | ||
| 
 | ||
| NHRP protocol configuration
 | ||
| ==============================
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> authentication <secret>
 | ||
| 
 | ||
|   Enables Cisco style authentication on NHRP packets. This embeds the
 | ||
|   plaintext password to the outgoing NHRP packets. Maximum length of
 | ||
|   the password is 8 characters.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> holdtime <timeout>
 | ||
| 
 | ||
|   Holdtime is the number of seconds that have to pass before stopping to
 | ||
|   advertise an NHRP NBMA address as valid. It also controls how often NHRP
 | ||
|   registration requests are sent. By default registrations are sent every
 | ||
|   one third of the holdtime
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> map tunnel-ip <tunnel-ip>
 | ||
|   nbma <nbma-ip>
 | ||
| 
 | ||
|   * **tunnel-ip** - Tunnel ip address in format **x.x.x.x**.
 | ||
|   * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **local**
 | ||
| 
 | ||
|   Map an IP address of a station to the station’s NBMA address.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> mtu <mtu>
 | ||
| 
 | ||
|   Configure NHRP advertised MTU.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> multicast <nbma-ip>
 | ||
| 
 | ||
|   * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **dynamic**
 | ||
| 
 | ||
|   Sends multicast packets to the specified NBMA address. If dynamic is specified
 | ||
|   then destination NBMA address (or addresses) are learnt dynamically.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> network-id <network-id>
 | ||
| 
 | ||
|   * **network-id** - NHRP network id <1-4294967295>
 | ||
| 
 | ||
|   Enable NHRP on this interface and set the interface’s network ID. The network ID
 | ||
|   is used to allow creating multiple nhrp domains on a router when multiple interfaces
 | ||
|   are configured on the router. Interfaces configured with the same ID are part of the
 | ||
|   same logical NBMA network. The ID is a local only parameter and is not sent to other
 | ||
|   NHRP nodes and so IDs on different nodes do not need to match. When NHRP packets are
 | ||
|   received on an interface they are assigned to the local NHRP domain for that interface.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> nhs tunnel-ip <tunnel-ip> nbma <nbma-ip>
 | ||
| 
 | ||
|   * **tunnel-ip** - Tunnel ip address in format **x.x.x.x** or **dynamic**
 | ||
|   * **nbma-ip** - NBMA ip address in format **x.x.x.x**
 | ||
| 
 | ||
|   Configure the Next Hop Server address and its NBMA address. If dynamic is specified
 | ||
|   then Next Hop Server can have dynamic address which maps to its NBMA address.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> redirect
 | ||
| 
 | ||
|   This enable redirect replies on the NHS similar to ICMP redirects except this is
 | ||
|   managed by the nhrp protocol. This setting allows spokes to communicate with each
 | ||
|   others directly.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> registration-no-unique
 | ||
| 
 | ||
|   Allow the client to not set the unique flag in the NHRP packets. This is useful when
 | ||
|   a station has a dynamic IP address that could change over time.
 | ||
| 
 | ||
| .. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut
 | ||
| 
 | ||
|   Enable shortcut (spoke-to-spoke) tunnels to allow NHC to talk to each others directly
 | ||
|   after establishing a connection without going through the hub.
 | ||
| 
 | ||
| IPSEC configuration
 | ||
| ==============================
 | ||
| 
 | ||
| * Please refer to the :ref:`ipsec_general` documentation for the individual IPSec
 | ||
|   related options.
 | ||
| 
 | ||
| .. note:: NHRP daemon based on FRR nhrpd. It controls IPSEC. That's why 'close-action'
 | ||
|   parameter in IKE configuration always is set to 'close' and 'dead-peer-detection action'
 | ||
|   always is set to 'clear'.
 | ||
| 
 | ||
| .. cfgcmd:: set vpn ipsec profile <profile-name> authentication mode pre-shared-secret
 | ||
| 
 | ||
|   Set preshared secret mode authentication
 | ||
| 
 | ||
| .. cfgcmd:: set vpn ipsec profile <profile-name> authentication pre-shared-secret <secret>
 | ||
| 
 | ||
|   Set preshared secret
 | ||
| 
 | ||
| .. cfgcmd:: set vpn ipsec profile <profile-name> bind tunnel <tunnel name>
 | ||
| 
 | ||
|   Bind IPSEC profile to the specific tunnel interface.
 | ||
| 
 | ||
| .. cfgcmd:: set vpn ipsec profile <profile-name> esp-group 'ESP-HUB'
 | ||
| 
 | ||
|   Map ESP group to IPSEC profile
 | ||
| 
 | ||
| .. cfgcmd:: set vpn ipsec profile <profile-name> ike-group 'IKE-HUB'
 | ||
| 
 | ||
|   Map IKE group to IPSEC profile
 | ||
| 
 | ||
| **********
 | ||
| Monitoring
 | ||
| **********
 | ||
| .. opcmd:: show ip nhrp cache
 | ||
| 
 | ||
|   Forwarding cache information.
 | ||
| 
 | ||
| .. opcmd:: show ip nhrp nhs
 | ||
| 
 | ||
|   Next hop server information.
 | ||
| 
 | ||
| .. opcmd:: show ip nhrp shortcut
 | ||
| 
 | ||
|   Shortcut information.
 | ||
| 
 | ||
| *******
 | ||
| Example
 | ||
| *******
 | ||
| 
 | ||
| This blueprint uses VyOS as the DMVPN Hub and Cisco IOSv 15.5(3)M and VyOS as
 | ||
| multiple spoke sites.
 | ||
| 
 | ||
| .. figure:: /_static/images/blueprint-dmvpn.png
 | ||
|    :width: 70%
 | ||
|    :align: center
 | ||
|    :alt: DMVPN Network Topology Diagram
 | ||
| 
 | ||
| 
 | ||
|    DMVPN Network Topology Diagram
 | ||
| 
 | ||
| Each node (Hub and Spoke) uses an IP address from the network 10.0.0.0/24.
 | ||
| 
 | ||
| The below referenced IP address `192.168.0.2` is used as example address
 | ||
| representing a global unicast address under which the HUB can be contacted by
 | ||
| each and every individual spoke.
 | ||
| 
 | ||
| .. _dmvpn:example_configuration:
 | ||
| 
 | ||
| Configuration
 | ||
| =============
 | ||
| 
 | ||
| Hub
 | ||
| ---
 | ||
| VyOS-HUB-1
 | ||
| ^^^^^^^^^^
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   set interfaces ethernet eth0 address '192.168.0.2/30'
 | ||
| 
 | ||
|   set interfaces tunnel tun100 address '10.0.0.100/32'
 | ||
|   set interfaces tunnel tun100 enable-multicast
 | ||
|   set interfaces tunnel tun100 encapsulation 'gre'
 | ||
|   set interfaces tunnel tun100 parameters ip key '42'
 | ||
|   set interfaces tunnel tun100 source-interface 'eth0'
 | ||
| 
 | ||
|   set protocols nhrp tunnel tun100 authentication 'test123'
 | ||
|   set protocols nhrp tunnel tun100 holdtime '300'
 | ||
|   set protocols nhrp tunnel tun100 multicast 'dynamic'
 | ||
|   set protocols nhrp tunnel tun100 network-id '1'
 | ||
|   set protocols nhrp tunnel tun100 redirect
 | ||
|   set protocols nhrp tunnel tun100 registration-no-unique
 | ||
| 
 | ||
|   set protocols static route 0.0.0.0/0 next-hop 192.168.0.1
 | ||
| 
 | ||
|   set vpn ipsec esp-group ESP-HUB lifetime '1800'
 | ||
|   set vpn ipsec esp-group ESP-HUB mode 'transport'
 | ||
|   set vpn ipsec esp-group ESP-HUB pfs 'dh-group2'
 | ||
|   set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256'
 | ||
|   set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1'
 | ||
|   set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1'
 | ||
|   set vpn ipsec ike-group IKE-HUB lifetime '3600'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1'
 | ||
|   set vpn ipsec interface 'eth0'
 | ||
|   set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
 | ||
|   set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
 | ||
|   set vpn ipsec profile NHRPVPN bind tunnel 'tun100'
 | ||
|   set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB'
 | ||
|   set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB'
 | ||
| 
 | ||
| 
 | ||
| .. note:: Setting this up on AWS will require a "Custom Protocol Rule" for
 | ||
|   protocol number "47" (GRE) Allow Rule in TWO places. Firstly on the VPC
 | ||
|   Network ACL, and secondly on the security group network ACL attached to the
 | ||
|   EC2 instance. This has been tested as working for the official AMI image on
 | ||
|   the AWS Marketplace. (Locate the correct VPC and security group by navigating
 | ||
|   through the details pane below your EC2 instance in the AWS console).
 | ||
| 
 | ||
| Spokes
 | ||
| ------
 | ||
| 
 | ||
|  The individual spoke configurations only differ in interface IP addresses.
 | ||
| 
 | ||
| VyOS-Spoke-1 and VyOS-Spoke-2
 | ||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   set interfaces ethernet eth0 address '192.168.1.2/30'
 | ||
| 
 | ||
|   set interfaces tunnel tun100 address '10.0.0.1/32'
 | ||
|   set interfaces tunnel tun100 enable-multicast
 | ||
|   set interfaces tunnel tun100 encapsulation 'gre'
 | ||
|   set interfaces tunnel tun100 parameters ip key '42'
 | ||
|   set interfaces tunnel tun100 source-interface 'eth0'
 | ||
| 
 | ||
|   set protocols nhrp tunnel tun100 authentication 'test123'
 | ||
|   set protocols nhrp tunnel tun100 holdtime '300'
 | ||
|   set protocols nhrp tunnel tun100 multicast 'dynamic'
 | ||
|   set protocols nhrp tunnel tun100 network-id '1'
 | ||
|   set protocols nhrp tunnel tun100 nhs tunnel-ip dynamic nbma '192.168.0.2'
 | ||
|   set protocols nhrp tunnel tun100 registration-no-unique
 | ||
|   set protocols nhrp tunnel tun100 shortcut
 | ||
| 
 | ||
|   set protocols static route 0.0.0.0/0 next-hop 192.168.1.1
 | ||
|   set protocols static route 10.0.0.0/24 next-hop 10.0.0.100
 | ||
| 
 | ||
|   set vpn ipsec esp-group ESP-HUB lifetime '1800'
 | ||
|   set vpn ipsec esp-group ESP-HUB mode 'transport'
 | ||
|   set vpn ipsec esp-group ESP-HUB pfs 'dh-group2'
 | ||
|   set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256'
 | ||
|   set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1'
 | ||
|   set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1'
 | ||
|   set vpn ipsec ike-group IKE-HUB lifetime '3600'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256'
 | ||
|   set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1'
 | ||
|   set vpn ipsec interface 'eth0'
 | ||
|   set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
 | ||
|   set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
 | ||
|   set vpn ipsec profile NHRPVPN bind tunnel 'tun100'
 | ||
|   set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB'
 | ||
|   set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB'
 | ||
| 
 | ||
| Cisco-Spoke-3
 | ||
| ^^^^^^^^^^^^^
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   crypto isakmp policy 10
 | ||
|    encr aes 256
 | ||
|    authentication pre-share
 | ||
|    group 2
 | ||
|    lifetime 3600
 | ||
|   crypto isakmp key secret address 0.0.0.0
 | ||
|   !
 | ||
|   !
 | ||
|   crypto ipsec transform-set DMVPNESP esp-aes 256 esp-sha-hmac
 | ||
|    mode transport
 | ||
|   !
 | ||
|   crypto ipsec profile DMVPNPROFILE
 | ||
|    set security-association lifetime seconds 1800
 | ||
|    set transform-set DMVPNESP
 | ||
|    set pfs group2
 | ||
|   !
 | ||
|   !
 | ||
|   !
 | ||
|   !
 | ||
|   !
 | ||
|   !
 | ||
|   !
 | ||
|   interface Tunnel100
 | ||
|    ip address 10.0.0.3 255.255.255.0
 | ||
|    no ip redirects
 | ||
|    ip nhrp authentication test123
 | ||
|    ip nhrp map multicast dynamic
 | ||
|    ip nhrp network-id 1
 | ||
|    ip nhrp holdtime 300
 | ||
|    ip nhrp nhs 10.0.0.100 nbma 192.168.0.2
 | ||
|    ip nhrp registration no-unique
 | ||
|    ip nhrp redirect
 | ||
|   tunnel source GigabitEthernet0/0
 | ||
|    tunnel mode gre multipoint
 | ||
|    tunnel key 42
 | ||
|    tunnel protection ipsec profile DMVPNPROFILE
 | ||
|   !
 | ||
|   interface GigabitEthernet0/0
 | ||
|    ip address 192.168.3.2 255.255.255.252
 | ||
|    duplex auto
 | ||
|    speed auto
 | ||
|    media-type rj45
 | ||
|   !
 | ||
|   ip route 0.0.0.0 0.0.0.0 192.168.3.1
 | ||
| 
 | ||
| 
 | ||
| Monitoring DMVPN Network
 | ||
| ^^^^^^^^^^^^^^^^^^^^^^^^
 | ||
| 
 | ||
| Let send ICMP packets from VyOS-SPOKE-1 to Cisco-SPOKE-3
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   vyos@vyos:~$ ping 10.0.0.3
 | ||
|   PING 10.0.0.3 (10.0.0.3) 56(84) bytes of data.
 | ||
|   64 bytes from 10.0.0.3: icmp_seq=1 ttl=255 time=3.44 ms
 | ||
|   64 bytes from 10.0.0.3: icmp_seq=2 ttl=255 time=3.07 ms
 | ||
|   ^C
 | ||
|   --- 10.0.0.3 ping statistics ---
 | ||
|   2 packets transmitted, 2 received, 0% packet loss, time 1002ms
 | ||
|   rtt min/avg/max/mdev = 3.072/3.257/3.442/0.185 ms
 | ||
| 
 | ||
| Monitoring on HUB
 | ||
| ^^^^^^^^^^^^^^^^^
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   vyos@vyos:~$ show ip nhrp cache
 | ||
|   Iface    Type     Protocol                 NBMA                     Claimed NBMA             Flags  Identity
 | ||
|   tun100   dynamic  10.0.0.1                 192.168.1.2              192.168.1.2               T     192.168.1.2
 | ||
|   tun100   dynamic  10.0.0.3                 192.168.3.2              192.168.3.2               T     192.168.3.2
 | ||
|   tun100   dynamic  10.0.0.2                 192.168.2.2              192.168.2.2               T     192.168.2.2
 | ||
|   tun100   local    10.0.0.100               192.168.0.2              192.168.0.2                     -
 | ||
| 
 | ||
|   vyos@vyos:~$ show vpn ipsec sa
 | ||
|   Connection                  State    Uptime    Bytes In/Out    Packets In/Out    Remote address    Remote ID    Proposal
 | ||
|   --------------------------  -------  --------  --------------  ----------------  ----------------  -----------  ----------------------------------
 | ||
|   dmvpn-NHRPVPN-tun100-child  up       3m46s     230B/270B       2/2               192.168.1.2       192.168.1.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | ||
|   dmvpn-NHRPVPN-tun100-child  up       5m48s     460B/540B       4/4               192.168.2.2       192.168.2.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | ||
|   dmvpn-NHRPVPN-tun100-child  up       16m26s    1K/1K           13/12             192.168.3.2       192.168.3.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | ||
| 
 | ||
| Monitoring on Spokes
 | ||
| ^^^^^^^^^^^^^^^^^^^^
 | ||
| 
 | ||
| .. code-block:: none
 | ||
| 
 | ||
|   vyos@vyos:~$ show ip nhrp cache
 | ||
|   Iface    Type     Protocol                 NBMA                     Claimed NBMA             Flags  Identity
 | ||
|   tun100   local    10.0.0.1                 192.168.1.2              192.168.1.2                     -
 | ||
|   tun100   dynamic  10.0.0.3                 192.168.3.2              192.168.3.2               T     192.168.3.2
 | ||
|   tun100   nhs      10.0.0.100               192.168.0.2              192.168.0.2               T     192.168.0.2
 | ||
| 
 | ||
|   vyos@vyos:~$ show ip nhrp nhs
 | ||
|   Iface    FQDN                     NBMA             Protocol
 | ||
|   tun100   192.168.0.2              192.168.0.2      10.0.0.100
 | ||
| 
 | ||
|   vyos@vyos:~$ show ip nhrp shortcut
 | ||
|   Type     Prefix                   Via                      Identity
 | ||
|   dynamic  10.0.0.3/32              10.0.0.3                 192.168.3.2
 | ||
| 
 | ||
|   vyos@vyos:~$ show vpn ipsec sa
 | ||
|   Connection                  State    Uptime    Bytes In/Out    Packets In/Out    Remote address    Remote ID    Proposal
 | ||
|   --------------------------  -------  --------  --------------  ----------------  ----------------  -----------  ----------------------------------
 | ||
|   dmvpn-NHRPVPN-tun100-child  up       6m43s     898B/695B       7/6               192.168.0.2       192.168.0.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | ||
|   dmvpn-NHRPVPN-tun100-child  up       49s       215B/187B       2/2               192.168.3.2       192.168.3.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | ||
| 
 |