YES, make the hub static IP address, spokes can use dynamic.
Works VERY well, as I am using this setup with CDMA.
Here is a link to the doc
Sample Hub config:
crypto isakmp policy 1
crypto isakmp key bigsecret address 0.0.0.0 0.0.0.0
crypto ipsec transform-set vpn-test esp-3des esp-sha-hmac
no crypto ipsec nat-transparency udp-encaps
crypto ipsec profile vpn-dmvpn
set transform-set vpn-test
ip address 10.57.1.255 255.255.255.255
ip address 10.56.0.1 255.255.252.0
no ip redirects
ip hold-time eigrp 1 35
ip nhrp authentication test
ip nhrp map multicast dynamic
ip nhrp network-id 105600
ip nhrp holdtime 600
no ip split-horizon eigrp 1
ip summary-address eigrp 1 10.0.0.0 255.0.0.0 5
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel key 105600
tunnel protection ipsec profile vpn-dmvpn
ip address 192.168.251.1 255.255.255.248
ip address 10.57.1.1 255.255.255.248
router eigrp 1
ip route 192.168.0.0 255.255.0.0 192.168.251.2
Thanks for information.
But what about spoke config??
And what with ACL rules to send traffic through VPN to hub and not internet.
You do not have to configure an ACL for the interesting traffic. You will have to work with IPSEC
The Routing protocol (or statics) will be in charge to define where to send the traffic. Only the HUB needs a static IP.
Yes this should be possible.
These are my favorite guides for understanding how to setup DMVPN:
Phase 1 and Phase 2 DMVPN:
Phase 3 DMVPN:
Hope this helps
If you are going to have only 2 routers in the VPN you can work with Easy VPN.
You can Work with Dynamic maps so your router with the static
IP will not need to know the peer IP Address.
The only problem with dynamic cryto maps is that only the
router with the dhcp address can initiate the connection or the vpn.
Well I managed to established connection between routers but I have one problem.
In a moment when the spoke IP address has changed it took too long to establish another connection.
In monitor (using CCP) I can see old tunnel but the new one going to established in approximately 10 minutes.
How to solve this problem??
configure a short holdtime in the ip nhrp
maybe 120 seconds.
Yes, it helped.
But I was thinking if I can use site2site VPN connection with Dynamic Crypto Map Sets.
And this also works for me.
But in this case I found a problem when the connection is established and the peer IP has changed.
Which option is responsible to check if the peer is still connected on IP? If not, close the vpn connection and establish new one on new IP.
In Crypto map I found security association lifetime and idle time.
In IKE policy is lifetime also.
Where should I look??