mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-11-04 00:02:05 +01:00 
			
		
		
		
	Added general theoretical IPsec documentation. Changed site-to-site IPsec VPN documentation. Added steps for configuration. Added documentation for troubleshooting site-to-site IPsec VPN.
		
			
				
	
	
		
			423 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			423 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
.. _vpn-dmvpn:
 | 
						||
 | 
						||
#####
 | 
						||
DMVPN
 | 
						||
#####
 | 
						||
 | 
						||
:abbr:`DMVPN (Dynamic Multipoint Virtual Private Network)` is a dynamic
 | 
						||
:abbr:`VPN (Virtual Private Network)` technology originally developed by Cisco.
 | 
						||
While their implementation was somewhat proprietary, the underlying
 | 
						||
technologies are actually standards based. The three technologies are:
 | 
						||
 | 
						||
* :abbr:`NHRP (Next Hop Resolution Protocol)` :rfc:`2332`
 | 
						||
* :abbr:`mGRE (Multipoint Generic Routing Encapsulation)` :rfc:`1702`
 | 
						||
* :abbr:`IPSec (IP Security)` - too many RFCs to list, but start with
 | 
						||
  :rfc:`4301`
 | 
						||
 | 
						||
NHRP provides the dynamic tunnel endpoint discovery mechanism (endpoint
 | 
						||
registration, and endpoint discovery/lookup), mGRE provides the tunnel
 | 
						||
encapsulation itself, and the IPSec protocols handle the key exchange, and
 | 
						||
crypto mechanism.
 | 
						||
 | 
						||
In short, DMVPN provides the capability for creating a dynamic-mesh VPN
 | 
						||
network without having to pre-configure (static) all possible tunnel end-point
 | 
						||
peers.
 | 
						||
 | 
						||
.. note:: DMVPN only automates the tunnel endpoint discovery and setup. A
 | 
						||
   complete solution also incorporates the use of a routing protocol. BGP is
 | 
						||
   particularly well suited for use with DMVPN.
 | 
						||
 | 
						||
.. figure:: /_static/images/vpn_dmvpn_topology01.png
 | 
						||
   :scale: 40 %
 | 
						||
   :alt: Baseline DMVPN topology
 | 
						||
 | 
						||
   Baseline DMVPN topology
 | 
						||
 | 
						||
*************
 | 
						||
Configuration
 | 
						||
*************
 | 
						||
 | 
						||
Tunnel interface configuration
 | 
						||
==============================
 | 
						||
 | 
						||
NHRP never handles routing of prefixes itself. You need to run some real routing
 | 
						||
protocol (e.g. BGP) to advertise routes over the tunnels. What nhrpd does it
 | 
						||
establishes ‘shortcut routes’ that optimizes the routing protocol to avoid going
 | 
						||
through extra nodes in NBMA GRE mesh.
 | 
						||
 | 
						||
NHRP does route NHRP domain addresses individually using per-host prefixes.
 | 
						||
This is similar to Cisco FlexVPN, but in contrast to opennhrp which uses
 | 
						||
a generic subnet route.
 | 
						||
 | 
						||
To create NBMA GRE tunnel you might use the following:
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  set interfaces tunnel tun100 address '10.0.0.1/32'
 | 
						||
  set interfaces tunnel tun100 enable-multicast
 | 
						||
  set interfaces tunnel tun100 encapsulation 'gre'
 | 
						||
  set interfaces tunnel tun100 ip adjust-mss '1360'
 | 
						||
  set interfaces tunnel tun100 mtu '1400'
 | 
						||
  set interfaces tunnel tun100 parameters ip key '42'
 | 
						||
  set interfaces tunnel tun100 source-interface 'eth0'
 | 
						||
 | 
						||
* Please refer to the :ref:`tunnel-interface` documentation for the individual
 | 
						||
  tunnel related options.
 | 
						||
 | 
						||
  .. note:: The IP-address is assigned as host prefix to tunnel interface.
 | 
						||
    NHRP will automatically create additional host routes pointing to tunnel interface
 | 
						||
    when a connection with these hosts is established.
 | 
						||
 | 
						||
The tunnel interface subnet prefix should be announced by routing protocol
 | 
						||
from the hub nodes (e.g. BGP ‘network’ announce). This allows the routing
 | 
						||
protocol to decide which is the closest hub and determine the relay hub on
 | 
						||
prefix basis when direct tunnel is not established.
 | 
						||
 | 
						||
NHRP protocol configuration
 | 
						||
==============================
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> authentication <secret>
 | 
						||
 | 
						||
  Enables Cisco style authentication on NHRP packets. This embeds the
 | 
						||
  plaintext password to the outgoing NHRP packets. Maximum length of
 | 
						||
  the password is 8 characters.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> holdtime <timeout>
 | 
						||
 | 
						||
  Holdtime is the number of seconds that have to pass before stopping to
 | 
						||
  advertise an NHRP NBMA address as valid. It also controls how often NHRP
 | 
						||
  registration requests are sent. By default registrations are sent every
 | 
						||
  one third of the holdtime
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> map tunnel-ip <tunnel-ip>
 | 
						||
  nbma <nbma-ip>
 | 
						||
 | 
						||
  * **tunnel-ip** - Tunnel ip address in format **x.x.x.x**.
 | 
						||
  * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **local**
 | 
						||
 | 
						||
  Map an IP address of a station to the station’s NBMA address.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> mtu <mtu>
 | 
						||
 | 
						||
  Configure NHRP advertised MTU.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> multicast <nbma-ip>
 | 
						||
 | 
						||
  * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **dynamic**
 | 
						||
 | 
						||
  Sends multicast packets to the specified NBMA address. If dynamic is specified
 | 
						||
  then destination NBMA address (or addresses) are learnt dynamically.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> network-id <network-id>
 | 
						||
 | 
						||
  * **network-id** - NHRP network id <1-4294967295>
 | 
						||
 | 
						||
  Enable NHRP on this interface and set the interface’s network ID. The network ID
 | 
						||
  is used to allow creating multiple nhrp domains on a router when multiple interfaces
 | 
						||
  are configured on the router. Interfaces configured with the same ID are part of the
 | 
						||
  same logical NBMA network. The ID is a local only parameter and is not sent to other
 | 
						||
  NHRP nodes and so IDs on different nodes do not need to match. When NHRP packets are
 | 
						||
  received on an interface they are assigned to the local NHRP domain for that interface.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> nhs tunnel-ip <tunnel-ip> nbma <nbma-ip>
 | 
						||
 | 
						||
  * **tunnel-ip** - Tunnel ip address in format **x.x.x.x** or **dynamic**
 | 
						||
  * **nbma-ip** - NBMA ip address in format **x.x.x.x**
 | 
						||
 | 
						||
  Configure the Next Hop Server address and its NBMA address. If dynamic is specified
 | 
						||
  then Next Hop Server can have dynamic address which maps to its NBMA address.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> redirect
 | 
						||
 | 
						||
  This enable redirect replies on the NHS similar to ICMP redirects except this is
 | 
						||
  managed by the nhrp protocol. This setting allows spokes to communicate with each
 | 
						||
  others directly.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> registration-no-unique
 | 
						||
 | 
						||
  Allow the client to not set the unique flag in the NHRP packets. This is useful when
 | 
						||
  a station has a dynamic IP address that could change over time.
 | 
						||
 | 
						||
.. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut
 | 
						||
 | 
						||
  Enable shortcut (spoke-to-spoke) tunnels to allow NHC to talk to each others directly
 | 
						||
  after establishing a connection without going through the hub.
 | 
						||
 | 
						||
IPSEC configuration
 | 
						||
==============================
 | 
						||
 | 
						||
* Please refer to the :ref:`ipsec_general` documentation for the individual IPSec
 | 
						||
  related options.
 | 
						||
 | 
						||
.. note:: NHRP daemon based on FRR nhrpd. It controls IPSEC. That's why 'close-action'
 | 
						||
  parameter in IKE configuration always is set to 'close' and 'dead-peer-detection action'
 | 
						||
  always is set to 'clear'.
 | 
						||
 | 
						||
.. cfgcmd:: set vpn ipsec profile <profile-name> authentication mode pre-shared-secret
 | 
						||
 | 
						||
  Set preshared secret mode authentication
 | 
						||
 | 
						||
.. cfgcmd:: set vpn ipsec profile <profile-name> authentication pre-shared-secret <secret>
 | 
						||
 | 
						||
  Set preshared secret
 | 
						||
 | 
						||
.. cfgcmd:: set vpn ipsec profile <profile-name> bind tunnel <tunnel name>
 | 
						||
 | 
						||
  Bind IPSEC profile to the specific tunnel interface.
 | 
						||
 | 
						||
.. cfgcmd:: set vpn ipsec profile <profile-name> esp-group 'ESP-HUB'
 | 
						||
 | 
						||
  Map ESP group to IPSEC profile
 | 
						||
 | 
						||
.. cfgcmd:: set vpn ipsec profile <profile-name> ike-group 'IKE-HUB'
 | 
						||
 | 
						||
  Map IKE group to IPSEC profile
 | 
						||
 | 
						||
**********
 | 
						||
Monitoring
 | 
						||
**********
 | 
						||
.. opcmd:: show ip nhrp cache
 | 
						||
 | 
						||
  Forwarding cache information.
 | 
						||
 | 
						||
.. opcmd:: show ip nhrp nhs
 | 
						||
 | 
						||
  Next hop server information.
 | 
						||
 | 
						||
.. opcmd:: show ip nhrp shortcut
 | 
						||
 | 
						||
  Shortcut information.
 | 
						||
 | 
						||
*******
 | 
						||
Example
 | 
						||
*******
 | 
						||
 | 
						||
This blueprint uses VyOS as the DMVPN Hub and Cisco IOSv 15.5(3)M and VyOS as
 | 
						||
multiple spoke sites.
 | 
						||
 | 
						||
.. figure:: /_static/images/blueprint-dmvpn.png
 | 
						||
   :width: 70%
 | 
						||
   :align: center
 | 
						||
   :alt: DMVPN Network Topology Diagram
 | 
						||
 | 
						||
 | 
						||
   DMVPN Network Topology Diagram
 | 
						||
 | 
						||
Each node (Hub and Spoke) uses an IP address from the network 10.0.0.0/24.
 | 
						||
 | 
						||
The below referenced IP address `192.168.0.2` is used as example address
 | 
						||
representing a global unicast address under which the HUB can be contacted by
 | 
						||
each and every individual spoke.
 | 
						||
 | 
						||
.. _dmvpn:example_configuration:
 | 
						||
 | 
						||
Configuration
 | 
						||
=============
 | 
						||
 | 
						||
Hub
 | 
						||
---
 | 
						||
VyOS-HUB-1
 | 
						||
^^^^^^^^^^
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  set interfaces ethernet eth0 address '192.168.0.2/30'
 | 
						||
 | 
						||
  set interfaces tunnel tun100 address '10.0.0.100/32'
 | 
						||
  set interfaces tunnel tun100 enable-multicast
 | 
						||
  set interfaces tunnel tun100 encapsulation 'gre'
 | 
						||
  set interfaces tunnel tun100 parameters ip key '42'
 | 
						||
  set interfaces tunnel tun100 source-interface 'eth0'
 | 
						||
 | 
						||
  set protocols nhrp tunnel tun100 authentication 'test123'
 | 
						||
  set protocols nhrp tunnel tun100 holdtime '300'
 | 
						||
  set protocols nhrp tunnel tun100 multicast 'dynamic'
 | 
						||
  set protocols nhrp tunnel tun100 network-id '1'
 | 
						||
  set protocols nhrp tunnel tun100 redirect
 | 
						||
  set protocols nhrp tunnel tun100 registration-no-unique
 | 
						||
 | 
						||
  set protocols static route 0.0.0.0/0 next-hop 192.168.0.1
 | 
						||
 | 
						||
  set vpn ipsec esp-group ESP-HUB lifetime '1800'
 | 
						||
  set vpn ipsec esp-group ESP-HUB mode 'transport'
 | 
						||
  set vpn ipsec esp-group ESP-HUB pfs 'dh-group2'
 | 
						||
  set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256'
 | 
						||
  set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1'
 | 
						||
  set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1'
 | 
						||
  set vpn ipsec ike-group IKE-HUB lifetime '3600'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1'
 | 
						||
  set vpn ipsec interface 'eth0'
 | 
						||
  set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
 | 
						||
  set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
 | 
						||
  set vpn ipsec profile NHRPVPN bind tunnel 'tun100'
 | 
						||
  set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB'
 | 
						||
  set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB'
 | 
						||
 | 
						||
 | 
						||
.. note:: Setting this up on AWS will require a "Custom Protocol Rule" for
 | 
						||
  protocol number "47" (GRE) Allow Rule in TWO places. Firstly on the VPC
 | 
						||
  Network ACL, and secondly on the security group network ACL attached to the
 | 
						||
  EC2 instance. This has been tested as working for the official AMI image on
 | 
						||
  the AWS Marketplace. (Locate the correct VPC and security group by navigating
 | 
						||
  through the details pane below your EC2 instance in the AWS console).
 | 
						||
 | 
						||
Spokes
 | 
						||
------
 | 
						||
 | 
						||
 The individual spoke configurations only differ in interface IP addresses.
 | 
						||
 | 
						||
VyOS-Spoke-1 and VyOS-Spoke-2
 | 
						||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  set interfaces ethernet eth0 address '192.168.1.2/30'
 | 
						||
 | 
						||
  set interfaces tunnel tun100 address '10.0.0.1/32'
 | 
						||
  set interfaces tunnel tun100 enable-multicast
 | 
						||
  set interfaces tunnel tun100 encapsulation 'gre'
 | 
						||
  set interfaces tunnel tun100 parameters ip key '42'
 | 
						||
  set interfaces tunnel tun100 source-interface 'eth0'
 | 
						||
 | 
						||
  set protocols nhrp tunnel tun100 authentication 'test123'
 | 
						||
  set protocols nhrp tunnel tun100 holdtime '300'
 | 
						||
  set protocols nhrp tunnel tun100 multicast 'dynamic'
 | 
						||
  set protocols nhrp tunnel tun100 network-id '1'
 | 
						||
  set protocols nhrp tunnel tun100 nhs tunnel-ip dynamic nbma '192.168.0.2'
 | 
						||
  set protocols nhrp tunnel tun100 registration-no-unique
 | 
						||
  set protocols nhrp tunnel tun100 shortcut
 | 
						||
 | 
						||
  set protocols static route 0.0.0.0/0 next-hop 192.168.1.1
 | 
						||
  set protocols static route 10.0.0.0/24 next-hop 10.0.0.100
 | 
						||
 | 
						||
  set vpn ipsec esp-group ESP-HUB lifetime '1800'
 | 
						||
  set vpn ipsec esp-group ESP-HUB mode 'transport'
 | 
						||
  set vpn ipsec esp-group ESP-HUB pfs 'dh-group2'
 | 
						||
  set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256'
 | 
						||
  set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1'
 | 
						||
  set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1'
 | 
						||
  set vpn ipsec ike-group IKE-HUB lifetime '3600'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256'
 | 
						||
  set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1'
 | 
						||
  set vpn ipsec interface 'eth0'
 | 
						||
  set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
 | 
						||
  set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
 | 
						||
  set vpn ipsec profile NHRPVPN bind tunnel 'tun100'
 | 
						||
  set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB'
 | 
						||
  set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB'
 | 
						||
 | 
						||
Cisco-Spoke-3
 | 
						||
^^^^^^^^^^^^^
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  crypto isakmp policy 10
 | 
						||
   encr aes 256
 | 
						||
   authentication pre-share
 | 
						||
   group 2
 | 
						||
   lifetime 3600
 | 
						||
  crypto isakmp key secret address 0.0.0.0
 | 
						||
  !
 | 
						||
  !
 | 
						||
  crypto ipsec transform-set DMVPNESP esp-aes 256 esp-sha-hmac
 | 
						||
   mode transport
 | 
						||
  !
 | 
						||
  crypto ipsec profile DMVPNPROFILE
 | 
						||
   set security-association lifetime seconds 1800
 | 
						||
   set transform-set DMVPNESP
 | 
						||
   set pfs group2
 | 
						||
  !
 | 
						||
  !
 | 
						||
  !
 | 
						||
  !
 | 
						||
  !
 | 
						||
  !
 | 
						||
  !
 | 
						||
  interface Tunnel100
 | 
						||
   ip address 10.0.0.3 255.255.255.0
 | 
						||
   no ip redirects
 | 
						||
   ip nhrp authentication test123
 | 
						||
   ip nhrp map multicast dynamic
 | 
						||
   ip nhrp network-id 1
 | 
						||
   ip nhrp holdtime 300
 | 
						||
   ip nhrp nhs 10.0.0.100 nbma 192.168.0.2
 | 
						||
   ip nhrp registration no-unique
 | 
						||
   ip nhrp redirect
 | 
						||
  tunnel source GigabitEthernet0/0
 | 
						||
   tunnel mode gre multipoint
 | 
						||
   tunnel key 42
 | 
						||
   tunnel protection ipsec profile DMVPNPROFILE
 | 
						||
  !
 | 
						||
  interface GigabitEthernet0/0
 | 
						||
   ip address 192.168.3.2 255.255.255.252
 | 
						||
   duplex auto
 | 
						||
   speed auto
 | 
						||
   media-type rj45
 | 
						||
  !
 | 
						||
  ip route 0.0.0.0 0.0.0.0 192.168.3.1
 | 
						||
 | 
						||
 | 
						||
Monitoring DMVPN Network
 | 
						||
^^^^^^^^^^^^^^^^^^^^^^^^
 | 
						||
 | 
						||
Let send ICMP packets from VyOS-SPOKE-1 to Cisco-SPOKE-3
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  vyos@vyos:~$ ping 10.0.0.3
 | 
						||
  PING 10.0.0.3 (10.0.0.3) 56(84) bytes of data.
 | 
						||
  64 bytes from 10.0.0.3: icmp_seq=1 ttl=255 time=3.44 ms
 | 
						||
  64 bytes from 10.0.0.3: icmp_seq=2 ttl=255 time=3.07 ms
 | 
						||
  ^C
 | 
						||
  --- 10.0.0.3 ping statistics ---
 | 
						||
  2 packets transmitted, 2 received, 0% packet loss, time 1002ms
 | 
						||
  rtt min/avg/max/mdev = 3.072/3.257/3.442/0.185 ms
 | 
						||
 | 
						||
Monitoring on HUB
 | 
						||
^^^^^^^^^^^^^^^^^
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  vyos@vyos:~$ show ip nhrp cache
 | 
						||
  Iface    Type     Protocol                 NBMA                     Claimed NBMA             Flags  Identity
 | 
						||
  tun100   dynamic  10.0.0.1                 192.168.1.2              192.168.1.2               T     192.168.1.2
 | 
						||
  tun100   dynamic  10.0.0.3                 192.168.3.2              192.168.3.2               T     192.168.3.2
 | 
						||
  tun100   dynamic  10.0.0.2                 192.168.2.2              192.168.2.2               T     192.168.2.2
 | 
						||
  tun100   local    10.0.0.100               192.168.0.2              192.168.0.2                     -
 | 
						||
 | 
						||
  vyos@vyos:~$ show vpn ipsec sa
 | 
						||
  Connection                  State    Uptime    Bytes In/Out    Packets In/Out    Remote address    Remote ID    Proposal
 | 
						||
  --------------------------  -------  --------  --------------  ----------------  ----------------  -----------  ----------------------------------
 | 
						||
  dmvpn-NHRPVPN-tun100-child  up       3m46s     230B/270B       2/2               192.168.1.2       192.168.1.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | 
						||
  dmvpn-NHRPVPN-tun100-child  up       5m48s     460B/540B       4/4               192.168.2.2       192.168.2.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | 
						||
  dmvpn-NHRPVPN-tun100-child  up       16m26s    1K/1K           13/12             192.168.3.2       192.168.3.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | 
						||
 | 
						||
Monitoring on Spokes
 | 
						||
^^^^^^^^^^^^^^^^^^^^
 | 
						||
 | 
						||
.. code-block:: none
 | 
						||
 | 
						||
  vyos@vyos:~$ show ip nhrp cache
 | 
						||
  Iface    Type     Protocol                 NBMA                     Claimed NBMA             Flags  Identity
 | 
						||
  tun100   local    10.0.0.1                 192.168.1.2              192.168.1.2                     -
 | 
						||
  tun100   dynamic  10.0.0.3                 192.168.3.2              192.168.3.2               T     192.168.3.2
 | 
						||
  tun100   nhs      10.0.0.100               192.168.0.2              192.168.0.2               T     192.168.0.2
 | 
						||
 | 
						||
  vyos@vyos:~$ show ip nhrp nhs
 | 
						||
  Iface    FQDN                     NBMA             Protocol
 | 
						||
  tun100   192.168.0.2              192.168.0.2      10.0.0.100
 | 
						||
 | 
						||
  vyos@vyos:~$ show ip nhrp shortcut
 | 
						||
  Type     Prefix                   Via                      Identity
 | 
						||
  dynamic  10.0.0.3/32              10.0.0.3                 192.168.3.2
 | 
						||
 | 
						||
  vyos@vyos:~$ show vpn ipsec sa
 | 
						||
  Connection                  State    Uptime    Bytes In/Out    Packets In/Out    Remote address    Remote ID    Proposal
 | 
						||
  --------------------------  -------  --------  --------------  ----------------  ----------------  -----------  ----------------------------------
 | 
						||
  dmvpn-NHRPVPN-tun100-child  up       6m43s     898B/695B       7/6               192.168.0.2       192.168.0.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | 
						||
  dmvpn-NHRPVPN-tun100-child  up       49s       215B/187B       2/2               192.168.3.2       192.168.3.2  AES_CBC_256/HMAC_SHA1_96/MODP_1024
 | 
						||
 |