<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Updating DMVPN encryption protocols in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353087#M293723</link>
    <description>Although on both ends of a DMVPN tunnel, you should be able to "rank" which IPSec profile will be used first, I recall(?) an existing session will continue to use what it's using until it has to start a new session.  I.e. shutting the tunnel or clearing the crypto session would be required.</description>
    <pubDate>Thu, 22 Mar 2018 13:01:14 GMT</pubDate>
    <dc:creator>Joseph W. Doherty</dc:creator>
    <dc:date>2018-03-22T13:01:14Z</dc:date>
    <item>
      <title>Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352068#M293648</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hello, I am looking for advice on updating our DMVPN hub and spoke routers with new encryption and hashing protocols. I'd like to update them to:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;#crypto ipsec transform-set TSET2-new esp-aes 256 esp-sha-hmac&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;My main question is, is there a way to automatically have the spokes renegotiate their tunnels using the new transform set and and ipsec profile that has been added? The steps below are what I have so far:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN&gt;Adding the below configuration to hub and spoke routers, creating a new transform set&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;PRE&gt;#crypto ipsec transform-set TSET2-new esp-aes 256 esp-sha-hmac
#  mode tunnel&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN&gt;Adding the below configuration to hub and spoke routers, creating a new ipsec profile&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;PRE&gt;#crypto ipsec profile dmvpn-aes-new
#  set transform-set TSET2-new&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;SPAN&gt;Here’s where I’m hoping I can automatically have spoke routers switch over to the new transform set, if I issue the commands below on the hub, will the spokes automatically switch over to the new transform set? If not is there a way to issue a command on the hub that will force the spokes to reconnect using the new transform set and ipsec profile on the DMVPN hub?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN&gt;Removing the old transform set and ipsec profile from the hub&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;PRE&gt;#crypto ipsec transform-set TSET1-old esp-3des esp-sha-hmac
#no crypto ipsec profile dmvpn-old&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN&gt;Issue command on hub to force spokes to renegotiate tunnels&lt;/SPAN&gt;&lt;/FONT&gt;
&lt;PRE&gt;#clear dmvpn-old session interface tunnel1
#clear dmvpn-old session interface tunnel2
#clear crypto sa
#clear crypto isakmp&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;If it's not possible to have the spokes automatically switch over, what would be the best way to update 20+ DMVPN devices?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Is there anything else I should consider when making this change? Thanks for any help!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Hub configuration:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;FONT color="#000000"&gt;!
crypto ipsec transform-set TSET1-old esp-3des esp-sha-hmac 
mode tunnel
!
crypto ipsec profile dmvpn-old
set transform-set TSET1-old
!
interface Tunnel1
...
tunnel protection ipsec profile dmvpn-old shared
!&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Spoke configuration:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;FONT color="#000000"&gt;!
crypto ipsec transform-set TSET1-old esp-3des esp-sha-hmac 
mode tunnel
!
crypto ipsec profile dmvpn-old
set transform-set TSET1-old 
!
interface Tunnel1
...
tunnel protection ipsec profile dmvpn-old shared
!&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 08:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352068#M293648</guid>
      <dc:creator>johnplizarazo</dc:creator>
      <dc:date>2019-03-07T08:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352807#M293702</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can't remove the old profile and get the tunnel taking the new profile without configuring it.&lt;/P&gt;
&lt;P&gt;You need by anyways to apply the new profile under the tunnel interface configuration.&lt;/P&gt;
&lt;P&gt;Here you don't have a lot of solutions.&lt;/P&gt;
&lt;P&gt;Do you have ssh access to all routes over the wan interface? If so, you can schedule a maintenance window and push all configs using a script.&lt;/P&gt;
&lt;P&gt;If you have dynamic routing on all sites, you can create a new dmvpn cloud (new tunnel interfaces) using the new profile. When this new cloud is up and running, you can shutdown old tunnels. The impact will be less if&amp;nbsp;all routing learned new ip&amp;nbsp;addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 01:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352807#M293702</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-22T01:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352819#M293704</link>
      <description>&lt;P&gt;Thank you for the suggestion, setting up a new DMVPN cloud alongside the existing one seems to be the safest way to configure this! We do have dynamic routing enabled between all sites using EIGRP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seems like a really interesting idea. I guess there would be no problem setting up multiple DMVPN tunnels on single source interface? We currently have a primary and secondary tunnel for most sites so this method would add two more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know if there would be any issue with conflicting configurations on the hub or spoke after adding a second DMVPN cloud?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 02:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352819#M293704</guid>
      <dc:creator>johnplizarazo</dc:creator>
      <dc:date>2018-03-22T02:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352829#M293705</link>
      <description>&lt;P&gt;Adding a new cloud which means network of is different from the other one you won't have any issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You already have 2 tunnels. The second one you called backup, how is it configured?&lt;/P&gt;
&lt;P&gt;When I'll have your config for those secondary tunnel i will validate or not if you can do the following. Depending on their config you can maybe leverage The second one as active with the new profile and when they'll be up you will change the first tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share your tunnel config for hub and 1 spoke to see those 2 tunnels?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 03:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3352829#M293705</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-22T03:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353087#M293723</link>
      <description>Although on both ends of a DMVPN tunnel, you should be able to "rank" which IPSec profile will be used first, I recall(?) an existing session will continue to use what it's using until it has to start a new session.  I.e. shutting the tunnel or clearing the crypto session would be required.</description>
      <pubDate>Thu, 22 Mar 2018 13:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353087#M293723</guid>
      <dc:creator>Joseph W. Doherty</dc:creator>
      <dc:date>2018-03-22T13:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353455#M293746</link>
      <description>&lt;P&gt;Ahhh that's an excellent idea too. Configs for our hub and spoke are below. We have the primary tunnel going to our main datacenter, and secondary going to out backup site.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We actually have two primary tunnels headed to our main datacenter (most locations only use one tunnel, locations with two ISP's use both I believe.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Spoke:&lt;/P&gt;
&lt;PRE&gt;!
crypto ipsec transform-set TSET1-OLD esp-3des esp-sha-hmac 
 mode tunnel
!
crypto ipsec profile dmvpn-OLD
 set transform-set TSET1-OLD
!
interface Tunnel10
 description Primary Site DMVPN
 bandwidth 500
 ip address 172.16.1.10 255.255.255.0	        #Spoke private IP
 no ip redirects
 ip mtu 1400
 ip nhrp authentication password
 ip nhrp map multicast dynamic
 ip nhrp map 172.16.1.1 1.1.1.1			#Hub private and public IP
 ip nhrp map multicast 1.1.1.1
 ip nhrp network-id 100
 ip nhrp holdtime 600
 ip nhrp nhs 172.16.1.1				#Hub private IP
 ip tcp adjust-mss 1360
 tunnel source GigabitEthernet0/0
 tunnel mode gre multipoint
 tunnel key 100
 tunnel protection ipsec profile dmvpn-OLD shared
!&lt;BR /&gt;interface Tunnel30&lt;BR /&gt; description Secondary Site DMVPN Tunnel30&lt;BR /&gt; bandwidth 120&lt;BR /&gt; ip address 172.16.3.10 255.255.255.0          #Spoke private IP&lt;BR /&gt; no ip redirects&lt;BR /&gt; ip mtu 1400&lt;BR /&gt; ip nhrp authentication password&lt;BR /&gt; ip nhrp map multicast dynamic&lt;BR /&gt; ip nhrp map 172.16.3.1 3.3.3.3                #Hub private and public IP&lt;BR /&gt; ip nhrp map multicast 3.3.3.3&lt;BR /&gt; ip nhrp network-id 300&lt;BR /&gt; ip nhrp holdtime 600&lt;BR /&gt; ip nhrp nhs 172.16.3.1                        #Hub private IP&lt;BR /&gt; ip tcp adjust-mss 1360&lt;BR /&gt; tunnel source GigabitEthernet0/0&lt;BR /&gt; tunnel mode gre multipoint&lt;BR /&gt; tunnel key 300&lt;BR /&gt; tunnel protection ipsec profile dmvpn-OLD shared&lt;BR /&gt;!&lt;/PRE&gt;
&lt;P&gt;Primary Site Hub:&lt;/P&gt;
&lt;PRE&gt;!
crypto ipsec transform-set TSET1-OLD esp-3des esp-sha-hmac 
 mode tunnel
!
crypto ipsec profile dmvpn-OLD
 set transform-set TSET1-OLD
!
interface Tunnel10
 description Primary Site DMVPN Tunnel10
 bandwidth 20480
 ip address 172.16.1.1 255.255.255.0           #Hub private IP
 no ip redirects
 ip mtu 1400
 no ip next-hop-self eigrp 1
 no ip split-horizon eigrp 1
 ip nhrp authentication password
 ip nhrp map multicast dynamic
 ip nhrp network-id 100
 ip nhrp holdtime 600
 ip tcp adjust-mss 1360
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel key 100
 tunnel protection ipsec profile dmvpn-OLD shared
!
interface Tunnel20 
 description Primary Site DMVPN Tunnel20
 ip address 172.16.2.1 255.255.255.0           #Hub private IP
 no ip redirects
 ip mtu 1400
 ip nhrp authentication password
 ip nhrp map multicast dynamic
 ip nhrp network-id 200
 ip tcp adjust-mss 1360
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel key 200
 tunnel protection ipsec profile dmvpn shared
!&lt;/PRE&gt;
&lt;P&gt;Secondary Site Hub:&lt;/P&gt;
&lt;PRE&gt;!
crypto ipsec transform-set TSET1-OLD esp-3des esp-sha-hmac 
 mode tunnel
!
crypto ipsec profile dmvpn-OLD
 set transform-set TSET1-OLD
!
interface Tunnel10
 description Secondary Site DMVPN Tunnel30
 bandwidth 20480
 ip address 172.16.3.1 255.255.255.0
 no ip redirects
 ip mtu 1400
 no ip next-hop-self eigrp 1
 no ip split-horizon eigrp 1
 ip nhrp authentication password
 ip nhrp map multicast dynamic
 ip nhrp network-id 300
 ip nhrp holdtime 600
 ip tcp adjust-mss 1360
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel key 300
 tunnel protection ipsec profile dmvpn-OLD shared
!&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 18:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353455#M293746</guid>
      <dc:creator>johnplizarazo</dc:creator>
      <dc:date>2018-03-22T18:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353636#M293756</link>
      <description>These are different clouds then modify one, make sure it's up and running and routing is ok then modify the primarily. Down time will be very very short doing that way</description>
      <pubDate>Fri, 23 Mar 2018 01:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353636#M293756</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-23T01:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353933#M293773</link>
      <description>&lt;P&gt;Thanks for the suggestion! Will be trying it out. On another note, would both DMVPN clouds share the same routes? I'm wondering how I could verify that the two clouds are the same in terms of routing.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 13:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3353933#M293773</guid>
      <dc:creator>johnplizarazo</dc:creator>
      <dc:date>2018-03-23T13:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Updating DMVPN encryption protocols</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3354288#M293787</link>
      <description>Based on your config, there're all part of EIGRP AS 1. If you issue show ip eigrp neighbor from HUB you can see the peering with spokes (if you kept eigrp config as its basic config). Or if you issue show ip route eigrp, you should see Tunnel 10 subnets into RIB.</description>
      <pubDate>Sat, 24 Mar 2018 00:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/updating-dmvpn-encryption-protocols/m-p/3354288#M293787</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-24T00:44:28Z</dc:date>
    </item>
  </channel>
</rss>

