Securing DMVPN Tunnels - IPsec Tunnel Protection

9 important questions on Securing DMVPN Tunnels - IPsec Tunnel Protection

Which 4 things need to be created for IPsec tunnel protection with the use of a static PSK?

  1. IKEv2 keyring
  2. IKEv2 profile
  3. IPsec transform set
  4. IPsec profile

What is a IKEv2 keyring?

  • It is a repository of pre-shared keys
  • In a IKEv2 keyring it is possible to define which keys apply to which hosts.
  • Identification of the password is based on the IP address of the remote router.

How is an IKEv2 keyring created?

  1. Create the keyring
    crypto ikev2 keyring keyring-name
  2. Create the peer
    peer peer-name
  3. Identify the peer IP address
    address network subnet-mask
  4. Define the pre-shared key
    pre-shared-key secure-key
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What is an IKEv2 Profile?

  • A collection of nonnegotiable security parameters used during IKE security association.
  • Later associated with the IPsec profile.
  • Local and remote authentication methods must be defined within the profile, as well as a match statement.

What are the steps to create an IKEv2 profile?

  1. Define the IKEv2 profile
    crypto ikev2 profile ike-profile-name
  2. Define the peer IP address
    match identity remote address ip-address
  3. Optionally set the local router's identity
    identity local address ip-address
  4. If Front Door VRF (FVRF) is used, associate the FVRF with the Profile
    match fvrf {rf-name | Any}
  5. define the authentication methods for received connection requests
    authentication local {pre-share | Rsa-sig}
  6. define the authentication  methods for sent connection requests
    authentication remote {pre-share | Rsa-sig}
  7. for pre-shared auth, associate the IKEv2 keyring with the IKEv2 profile
    keyring local keyring-name


What is the IPsec Transform Set?

  • Identifies Security Protocols for encrypting traffic
  • Specifies protocol ESP or AH to authenticate the data

How is the IPsec Transform Set created?

  1. Create the transform set en identify the protocols
    crypto ipsec transform-set transform-set-name [esp-encryption-name] [esp-authentication-name] [ah-authentication-name]
  2. Configure the ESP mode
    mode {transport | Tunnel}

What command is used to encrypt a tunnel interface by applying the ipsec profile.

Tunnel protection ipsec profile profile-name [shared]

What commands are used to verify IPsec protection on a DMVPN tunnel?

  1. Show dmvpn detail
  2. show crypto ipsec sa


The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo