I think that should work. It would work better if you would use separate tunnel interfaces at each Hub to interconnect via DMVPN.
DMVPN - HUB B will use tunnel 0 to terminate all tunnels for its spokes, while use tunnel 1 to terminate DMVPN tunnels comming in from Hub A and Hub C. Also make sure Hub B always uses static address so that Hub A and Hub C can point their tunnels to Hub B.
I have heard a few comments in this forum about not mixing DMVPN with site to site VPNs. I have done this type of deployment for a customer, where 10 remote sites where coming in via DMVPN, while we had 5 extra tunnels that were strictly site to site, using Crypto maps, over GRE as well as without GRE. I dont see a problem with this configuration at all. Note that you can only apply one crypto map on a router's interface. So each site to site tunnel has to be a different instance of the same crypto map.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...