crypto map (**K**E**Y**) 10 ipsec-manualand tie into DMVPN.
I don't think I can setup crypto maps with DMVPN if the encryption/decryption and tunnel end-points are on the same Cisco box.
It appears Cisco wants you to use Pre-shared keys OR Certs.
I thought since IKEv1 has been "broken" and IKEv2 is not available on the DMVPN Hub Cisco router (only available on the spoke Cisco 881G router), I would revert to manual IPsec mode. I assumed this would be a better way to proceed since the issues with IKEv1.
But, if I can use a Cisco router to distribute Certs and verify the Certs for the DMVPN setup then this is a much better option while being the most secure.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...