This lab simulates a real-world deployment of DMVPN Phase 3 (Dynamic Multipoint VPN) using a fictional scenario involving the Moroccan transportation company ONCF. The goal is to provide hands-on experience with configuring a scalable and secure WAN solution over the Internet, utilizing technologies such as GRE, NHRP, IPSec, and OSPF.
Disclaimer: The ONCF company is used strictly as an example in this educational context. This lab has no affiliation with ONCF and does not reflect any real infrastructure or implementation by the organization.
This lab is intended for networking students or anyone interested in learning how DMVPN Phase 3 works in a multi-branch topology using a central hub and spoke routers. The configuration is tested in EVE-NG and includes full tunnel, IPSec encryption, and OSPF dynamic routing.
Author: _abderrafik (th3poet)
Date: April 2025
You have been hired by ONCF, the Moroccan metro company operating in several major cities. The organization aims to implement a secure, scalable WAN over the Internet using DMVPN Phase 3, allowing secure communication between branches while maintaining centralized control from the headquarters
Your Mission: You are tasked with configuring and setting up DMVPN Phase 3 using the following requirements:
Hub (Headquarters): Casablanca (CASA)
Spokes (Branches): Tangier, Fes, Marrakech, Rabat
Transport: Internet (via ISP)
Site WAN IP Tunnel IP LAN Network
--------------------------------------------------
CASA 11.0.0.2/30 172.16.0.1 192.168.1.0/24
TANGER 12.0.0.2/30 172.16.0.2 192.168.2.0/24
FES 13.0.0.2/30 172.16.0.3 192.168.3.0/24
MARRAKECH 14.0.0.2/30 172.16.0.4 192.168.4.0/24
RABAT 15.0.0.2/30 172.16.0.5 192.168.5.0/24
- Download Lab Files
Clone the repository:
~$ git clone https://github.com/0xth3poet/DMVPN-IPsec-Setup.git
Or download manually:
https://github.com/0xth3poet/DMVPN-IPsec-Setup/blob/main/_Exports_unetlab_export-20250430-212957.zip
We are using a default route with the ISP router (already configured in the lab)
CASA_HUB(config)#ip route 0.0.0.0 0.0.0.0 fa0/0
SPOKE_TANGER(config)#ip route 0.0.0.0 0.0.0.0 fa0/1
SPOKE_FES(config)#ip route 0.0.0.0 0.0.0.0 fa0/0
SPOKE_MARRAKECH(config)#ip route 0.0.0.0 0.0.0.0 fa0/0
SPOKE_RABAT(config)#ip route 0.0.0.0 0.0.0.0 fa0/0
HUB Configuration (R-CASA)
interface Tunnel0
ip address 172.16.0.1 255.255.255.0
tunnel source fa0/0
tunnel mode gre multipoint
ip nhrp network-id 123
ip nhrp authentication pass123
ip nhrp map multicast dynamic
ip ospf network point-to-multipoint
ip nhrp redirect
Spoke Configuration (R-TANGER)
interface tunnel0
ip address 172.16.0.2 255.255.255.0
tunnel source fa0/1
tunnel mode gre multipoint
ip nhrp network-id 123
ip nhrp map 172.16.0.1 11.0.0.2
ip nhrp nhs 172.16.0.1
ip nhrp authentication pass123
ip nhrp map multicast 11.0.0.2
ip ospf network point-to-multipoint
ip nhrp shortcut
Spoke Configuration (R-FES)
interface tunnel0
ip address 172.16.0.3 255.255.255.0
tunnel source fa0/0
tunnel mode gre multipoint
ip nhrp network-id 123
ip nhrp map 172.16.0.1 11.0.0.2
ip nhrp nhs 172.16.0.1
ip nhrp authentication pass123
ip nhrp map multicast 11.0.0.2
ip ospf network point-to-multipoint
ip nhrp shortcut
Spoke Configuration (R-MARRAKECH)
interface tunnel0
ip address 172.16.0.4 255.255.255.0
tunnel source fa0/0
tunnel mode gre multipoint
ip nhrp network-id 123
ip nhrp map 172.16.0.1 11.0.0.2
ip nhrp nhs 172.16.0.1
ip nhrp authentication pass123
ip nhrp map multicast 11.0.0.2
ip ospf network point-to-multipoint
ip nhrp shortcut
Spoke Configuration (R-RABAT)
interface tunnel0
ip address 172.16.0.5 255.255.255.0
tunnel source fa0/0
tunnel mode gre multipoint
ip nhrp network-id 123
ip nhrp map 172.16.0.1 11.0.0.2
ip nhrp nhs 172.16.0.1
ip nhrp authentication pass123
ip nhrp map multicast 11.0.0.2
ip ospf network point-to-multipoint
ip nhrp shortcut
show dmvpn
NOTE: implement this configuration of IPSEC on all routers except ISP router
crypto isakmp policy 10
authentication pre-share
encryption aes 256
hash sha
group 5
exit
crypto isakmp key cisco123 address 0.0.0.0
crypto ipsec transform-set dmvpn esp-3des esp-sha-hmac
mod tunnel
exit
crypto ipsec profile prof-dmvpn
set transform-set dmvpn
interface tunnel0
tunnel protection ipsec profile prof-dmvpn
show crypto ipsec sa
show crypto ipsec profile
HUB Configuration (R-CASA)
router ospf 1
network 172.16.0.0 0.0.0.255 area 0
network 192.168.1.0 0.0.0.255 area 0
SPOKE Configuration (R-TANGER)
router ospf 1
network 172.16.0.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
SPOKE Configuration (R-FES)
router ospf 1
network 172.16.0.0 0.0.0.255 area 0
network 192.168.3.0 0.0.0.255 area 0
SPOKE Configuration (R-MARRAKECH)
router ospf 1
network 172.16.0.0 0.0.0.255 area 0
network 192.168.4.0 0.0.0.255 area 0
SPOKE Configuration (R-RABAT)
router ospf 1
network 172.16.0.0 0.0.0.255 area 0
network 192.168.5.0 0.0.0.255 area 0
From FES, ping RABAT LAN:
SPOKE_FES(config)#do ping 192.168.5.1
From RABAT, ping TANGER LAN:
SPOKE_RABAT(config)#do ping 192.168.2.1
Use Wireshark to analyze tunnel traffic, IPSec encryption, and dynamic spoke-to-spoke communication.