Table Of Contents
Scalability Test Bed Configuration Files
Cisco 7200VXR/NPE-G1/SA-VAM2 Headend Configuration
Cisco ASR1004 Headend Configuration
Cisco 7600/Sup720/VPN SPA Headend Configuration
Cisco 7200VXR/Cisco 7600 Dual Tier Architecture Headend Configuration
Tier #1 (mGRE)
Tier #2 (IPsec)
Cisco ISR Branch Office Configuration
Scalability Test Bed Configuration Files
The configurations for the central and branch sites are listed below in the following sections. These configurations have been extracted from real configurations used in Cisco scalability testing, and are provided as a reference only.
Cisco 7200VXR/NPE-G1/SA-VAM2 Headend Configuration
There are two headend devices in the test bed, each configured with one mGRE tunnel. A dual hub-dual DMVPN cloud design is assumed. The configuration shown below is an excerpt of the first headend and does not show the entire configuration. Pre-shared keys with a wildcard address are used at the headend for simplicity of the ISAKMP authentication, although this is not recommended for customer use.
Headend #1:
crypto isakmp key bigsecret address 0.0.0.0 0.0.0.0
crypto ipsec transform-set vpn-test esp-3des esp-sha-hmac
no crypto ipsec nat-transparency udp-encaps
crypto ipsec profile vpn-dmvpn
set transform-set vpn-test
ip address 10.57.1.255 255.255.255.255
ip address 10.56.0.1 255.255.252.0
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105600
no ip split-horizon eigrp 1
ip summary-address eigrp 1 10.0.0.0 255.0.0.0 5
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel protection ipsec profile vpn-dmvpn
interface GigabitEthernet0/1
description GigabitEthernet0/1
ip address 192.168.251.1 255.255.255.248
interface GigabitEthernet0/2
description GigabitEthernet0/2
ip address 10.57.1.1 255.255.255.248
ip route 192.168.0.0 255.255.0.0 192.168.251.2
Cisco ASR1004 Headend Configuration
This configuration is for the Cisco ASR1004, where the ASR is aggregating 1000 DMVPN hub-and-spoke tunnels.
Headend #1:
boot system flash bootflash:asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin
clock summer-time EDT recurring
ip ftp source-interface GigabitEthernet0
ip tftp source-interface GigabitEthernet0
multilink bundle-name authenticated
no policy config-sync bulk prc reload
crypto isakmp key bigsecret address 0.0.0.0 0.0.0.0
crypto isakmp keepalive 10
crypto ipsec transform-set vpn-test esp-aes esp-sha-hmac
crypto ipsec profile vpn-dmvpn
set transform-set vpn-test
ip address 10.56.0.1 255.255.248.0
no ip next-hop-self eigrp 1
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105600
ip nhrp registration timeout 120
no ip split-horizon eigrp 1
tunnel mode gre multipoint
tunnel protection ipsec profile vpn-dmvpn
ip address 192.168.30.1 255.255.255.255
interface GigabitEthernet0/2/0
description GigabitEthernet0/2/0
ip address 192.168.32.252 255.255.255.0
plim qos input map ip dscp-based
plim qos input map ip dscp 34 40 queue strict-priority
interface GigabitEthernet0/3/0
description GigabitEthernet0/3/0
ip address 10.204.0.1 255.252.0.0
plim qos input map ip dscp-based
plim qos input map ip dscp 34 40 queue strict-priority
service-policy input INGRESS
service-policy output campus
interface GigabitEthernet0
ip address 172.26.182.168 255.255.252.0
passive-interface GigabitEthernet0/2/2
ip route vrf Mgmt-intf 0.0.0.0 0.0.0.0 172.26.180.1
snmp-server community public RO
snmp-server community private RW
ntp clock-period 17175902
Cisco 7600/Sup720/VPN SPA Headend Configuration
This configuration is for the Cisco 7600 with Sup720 and VPN SPA where the 7600 router is aggregating 1000 DMVPN hub-and-spoke tunnels.
Headend #1:
clock summer-time EDT recurring
ipv6 mfib hardware-switching replication-mode ingress
mls ip multicast flow-stat-timer 9
no mls acl tcam share-global
mls cef error action freeze
crypto isakmp key bigsecret address 0.0.0.0 0.0.0.0
crypto isakmp keepalive 10
crypto ipsec transform-set vpn-test esp-3des esp-sha-hmac
no crypto ipsec nat-transparency udp-encaps
crypto dynamic-map dmap-vlan100 10
set transform-set vpn-test
crypto dynamic-map dmap-vlan101 10
set transform-set vpn-test
crypto map dynamic-map-vlan100 local-address Vlan100
crypto map dynamic-map-vlan100 10 ipsec-isakmp dynamic dmap-vlan100
crypto map dynamic-map-vlan101 local-address Vlan101
crypto map dynamic-map-vlan101 10 ipsec-isakmp dynamic dmap-vlan101
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
power redundancy-mode combined
no diagnostic cns publish
no diagnostic cns subscribe
vlan internal allocation policy ascending
vlan access-log ratelimit 2000
ip address 10.57.255.251 255.255.255.255
ip address 10.56.0.1 255.255.252.0
no ip next-hop-self eigrp 1
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105600
ip nhrp registration timeout 120
no ip split-horizon eigrp 1
tunnel source 192.168.241.1
tunnel mode gre multipoint
ip address 10.56.8.1 255.255.252.0
no ip next-hop-self eigrp 1
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105680
ip nhrp registration timeout 120
no ip split-horizon eigrp 1
tunnel source 192.168.242.1
tunnel mode gre multipoint
interface GigabitEthernet3/1
description GigabitEthernet3/1 Outside Interface
interface GigabitEthernet3/2
description GigabitEthernet3/2 Outside Interface
interface GigabitEthernet3/3
description GigabitEthernet3/3
interface GigabitEthernet4/0/1
description GigabitEthernet4/0/1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,100,101,1002-1005
spanning-tree portfast trunk
interface GigabitEthernet4/0/2
description GigabitEthernet4/0/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,1002-1005
spanning-tree portfast trunk
interface GigabitEthernet5/1
description GigabitEthernet5/1 Inside Interface
ip address 10.57.1.1 255.255.255.0
interface GigabitEthernet6/2
ip address 172.26.177.251 255.255.252.0
ip address 192.168.241.1 255.255.255.0
crypto map dynamic-map-vlan100
crypto engine subslot 4/0
ip address 192.168.242.1 255.255.255.0
crypto map dynamic-map-vlan101
crypto engine subslot 4/0
ip route 0.0.0.0 0.0.0.0 172.26.176.1
ip route 10.60.0.254 255.255.255.255 192.168.241.2
ip route 10.60.1.254 255.255.255.255 192.168.241.2
ip route 10.60.2.254 255.255.255.255 192.168.241.2
ip route 10.60.3.254 255.255.255.255 192.168.241.2
ip route 10.60.4.254 255.255.255.255 192.168.241.2
ip route 10.60.5.254 255.255.255.255 192.168.241.2
ip route 10.60.6.254 255.255.255.255 192.168.241.2
ip route 10.60.7.254 255.255.255.255 192.168.241.2
ip route 10.60.8.254 255.255.255.255 192.168.241.2
ip route 10.60.9.254 255.255.255.255 192.168.241.2
ip route 10.60.10.254 255.255.255.255 192.168.241.2
. . . lines omitted . . .
ip route 10.67.0.254 255.255.255.255 192.168.242.2
ip route 10.67.1.254 255.255.255.255 192.168.242.2
ip route 10.67.2.254 255.255.255.255 192.168.242.2
ip route 10.67.3.254 255.255.255.255 192.168.242.2
ip route 10.67.4.254 255.255.255.255 192.168.242.2
ip route 10.67.5.254 255.255.255.255 192.168.242.2
ip route 10.67.6.254 255.255.255.255 192.168.242.2
ip route 10.67.7.254 255.255.255.255 192.168.242.2
ip route 10.67.8.254 255.255.255.255 192.168.242.2
ip route 10.67.9.254 255.255.255.255 192.168.242.2
ip route 10.67.10.254 255.255.255.255 192.168.242.2
ip route 10.67.11.254 255.255.255.255 192.168.242.2
ip route 10.67.12.254 255.255.255.255 192.168.242.2
ip route 10.67.13.254 255.255.255.255 192.168.242.2
ip route 10.67.14.254 255.255.255.255 192.168.242.2
ip route 10.67.15.254 255.255.255.255 192.168.242.2
ip route 10.67.16.254 255.255.255.255 192.168.242.2
ip route 10.67.17.254 255.255.255.255 192.168.242.2
ip route 10.67.18.254 255.255.255.255 192.168.242.2
ip route 10.67.19.254 255.255.255.255 192.168.242.2
ip route 172.26.0.0 255.255.0.0 172.26.176.1
ip route 192.168.0.0 255.255.0.0 192.168.241.2
ip route 192.168.0.0 255.255.0.0 192.168.242.2
snmp-server community public RO
snmp-server community private RW
snmp-server system-shutdown
ntp clock-period 17180019
Cisco 7200VXR/Cisco 7600 Dual Tier Architecture Headend Configuration
This configuration is for the Cisco 7200VXR terminating mGRE and the Cisco 7600 with Sup720 and VPN SPA providing high-capacity IPsec encryption.
Tier #1 (mGRE)
clock summer-time EDT recurring
no ftp-server write-enable
ip address 10.56.0.1 255.255.252.0
no ip next-hop-self eigrp 1
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105600
ip nhrp registration timeout 120
no ip split-horizon eigrp 1
tunnel source 192.168.161.1
tunnel mode gre multipoint
ip address 10.56.16.1 255.255.252.0
no ip next-hop-self eigrp 1
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 1056160
ip nhrp registration timeout 120
no ip split-horizon eigrp 1
tunnel source 192.168.181.1
tunnel mode gre multipoint
ip address 10.57.255.251 255.255.255.255
interface FastEthernet0/0
ip address 172.26.176.14 255.255.252.0
interface FastEthernet0/1
description FastEthernet0/1
interface GigabitEthernet0/1
description GigabitEthernet0/1
ip address 192.168.181.1 255.255.255.0 secondary
ip address 192.168.161.1 255.255.255.0
interface GigabitEthernet0/2
description GigabitEthernet0/2
ip address 10.57.1.1 255.255.255.0
interface GigabitEthernet0/3
description GigabitEthernet0/3
ip route 0.0.0.0 0.0.0.0 172.26.176.1
ip route 172.26.0.0 255.255.0.0 172.26.176.1
ip route 192.168.0.0 255.255.0.0 192.168.161.2
ip route 192.168.0.0 255.255.0.0 192.168.181.2
snmp-server community public RO
snmp-server community private RW
snmp-server system-shutdown
snmp-server enable traps tty
ntp clock-period 17180034
Tier #2 (IPsec)
clock summer-time EDT recurring
ipv6 mfib hardware-switching replication-mode ingress
mls ip multicast flow-stat-timer 9
no mls acl tcam share-global
mls cef error action freeze
crypto isakmp key bigsecret address 0.0.0.0 0.0.0.0
crypto isakmp keepalive 10
crypto ipsec transform-set vpn-test esp-3des esp-sha-hmac
no crypto ipsec nat-transparency udp-encaps
crypto dynamic-map dmap 10
set transform-set vpn-test
crypto map dynamic-map local-address Vlan100
crypto map dynamic-map 10 ipsec-isakmp dynamic dmap
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
power redundancy-mode combined
no diagnostic cns publish
no diagnostic cns subscribe
vlan internal allocation policy ascending
vlan access-log ratelimit 2000
interface GigabitEthernet3/1
description GigabitEthernet3/1 Outside Interface
interface GigabitEthernet3/2
description GigabitEthernet3/2
interface GigabitEthernet4/0/1
description GigabitEthernet4/0/1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,100,1002-1005
spanning-tree portfast trunk
interface GigabitEthernet4/0/2
description GigabitEthernet4/0/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,1002-1005
spanning-tree portfast trunk
interface GigabitEthernet5/1
description GigabitEthernet5/1 to vpn2-7200-1 GE0/1
ip address 192.168.181.2 255.255.255.0 secondary
ip address 192.168.161.2 255.255.255.0
interface GigabitEthernet5/2
description GigabitEthernet5/2 to vpn2-7200-2 GE0/1
ip address 192.168.191.2 255.255.255.0 secondary
ip address 192.168.171.2 255.255.255.0
interface GigabitEthernet5/3
description GigabitEthernet5/3
interface GigabitEthernet6/2
ip address 172.26.177.251 255.255.252.0
ip address 192.168.241.1 255.255.255.0
crypto engine subslot 4/0
ip route 0.0.0.0 0.0.0.0 172.26.176.1
ip route 172.26.0.0 255.255.0.0 172.26.176.1
ip route 192.168.0.0 255.255.0.0 192.168.241.2
snmp-server community public RO
snmp-server community private RW
snmp-server system-shutdown
ntp clock-period 17180035
Cisco ISR Branch Office Configuration
The following shows relevant configurations for one branch site router. A dual hub-dual DMVPN cloud design is employed by using two tunnels, one to each headend. The EIGRP delay metric is used to make Tunnel0 the preferred path. This configuration shows QoS for VoIP flows (shaping and queuing) applied to the physical (outside) interface, the recommended use of summary routes, and an EIGRP stub configuration.
Branch #1:
crypto isakmp key bigsecret address 192.168.251.1
crypto isakmp key bigsecret address 192.168.252.1
crypto ipsec transform-set vpn-test esp-3des esp-sha-hmac
no crypto ipsec nat-transparency udp-encaps
crypto ipsec profile vpn-dmvpn
set transform-set vpn-test
class-map match-all VOICE
class-map match-any CALL-SETUP
class-map match-any INTERNETWORK-CONTROL
match access-group name IKE
class-map match-all TRANSACTIONAL-DATA
class INTERNETWORK-CONTROL
shape average 182400 1824 0
ip address 10.61.138.254 255.255.255.255
ip address 10.56.3.10 255.255.252.0
ip nhrp authentication test
ip nhrp map 10.56.0.1 192.168.251.1
ip nhrp map multicast 192.168.251.1
ip nhrp network-id 105600
ip summary-address eigrp 1 10.61.148.0 255.255.255.0 5
tunnel source 192.168.100.6
tunnel destination 192.168.251.1
tunnel protection ipsec profile vpn-dmvpn
ip address 10.56.7.10 255.255.252.0
ip nhrp authentication test
ip nhrp map 10.56.4.1 192.168.252.1
ip nhrp map multicast 192.168.252.1
ip nhrp network-id 105640
ip summary-address eigrp 1 10.61.148.0 255.255.255.0 5
tunnel source 192.168.100.6
tunnel destination 192.168.252.1
tunnel protection ipsec profile vpn-dmvpn
ip address 192.168.100.6 255.255.255.252
service-policy output 192kb-shaper
interface FastEthernet0/1
description FastEthernet0/1
ip address 10.61.148.129 255.255.255.192 secondary
ip address 10.61.148.1 255.255.255.128
eigrp stub connected summary
ip route 0.0.0.0 0.0.0.0 192.168.100.5!
ip access-list extended IKE
permit udp any any eq isakmp