The following commands help in testing connection between two spokes. As the feature supported is DMVPN-Phase 3, the traceroute command displays the packets sent from spoke 1 to spoke 2. However, the first packet is lost due to NHRP resolution as Spoke
1 sends the packet to the hub to obtain the address of Spoke 2. When Spoke 1 receives the address, a dynamic IPsec tunnel
is established between Spoke 1 and Spoke 2.
Spoke1# clear crypto sa counters
Spoke1# ping 12.1.1.4 source gigabitEthernet 2 repeat 100
Type escape sequence to abort.
Sending 100, 100-byte ICMP Echos to 12.1.1.4, timeout is 2 seconds:
Packet sent with a source address of 11.1.1.4
.!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Success rate is 99 percent (99/100), round-trip min/avg/max = 1/1/6 ms
Spoke# show dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
T1 - Route Installed, T2 - Nexthop-override
C - CTS Capable, I2 - Temporary
# Ent --> Number of NHRP entries with same NBMA peer
NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting
UpDn Time --> Up or Down Time for a Tunnel
==========================================================================
Interface: Tunnel11, IPv4 NHRP Details
Type:Spoke, NHRP Peers:3,
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- -----
1 40.117.131.133 172.16.1.1 UP 1w3d S
1 40.117.128.85 172.16.1.2 UP 1w3d S
1 40.114.69.24 172.16.1.137 UP 00:00:07 DN
Spoke# traceroute 12.1.1.4 source gigabitEthernet 2
Type escape sequence to abort.
Tracing the route to 12.1.1.4
VRF info: (vrf in name/id, vrf out name/id)
1 172.16.1.137 2 msec * 3 msec
p1spoke1#
p1spoke1#
p1spoke1#sh crypto sess detail | i pkts
Inbound: #pkts dec'ed 101 drop 0 life (KB/Sec) 4607985/3581
Outbound: #pkts enc'ed 100 drop 0 life (KB/Sec) 4607989/3581
Inbound: #pkts dec'ed 12 drop 0 life (KB/Sec) 4607924/621
Outbound: #pkts enc'ed 14 drop 0 life (KB/Sec) 4607955/621
Inbound: #pkts dec'ed 13 drop 0 life (KB/Sec) 4607957/1941
Outbound: #pkts enc'ed 13 drop 0 life (KB/Sec) 4607975/1941
Spoke# show crypto session detail
Crypto session current status
Code: C - IKE Configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal, T - cTCP encapsulation
X - IKE Extended Authentication, F - IKE Fragmentation
R - IKE Auto Reconnect, U - IKE Dynamic Route Update
Interface: Tunnel11
Uptime: 00:00:36
Session status: UP-ACTIVE
Peer: 40.114.69.24 port 4500 fvrf: (none) ivrf: (none)
Phase1_id: 12.1.0.4
Desc: (none)
Session ID: 0
IKEv1 SA: local 11.1.0.4/4500 remote 40.114.69.24/4500 Active
Capabilities:DN connid:1027 lifetime:23:59:23
IPSEC FLOW: permit 47 host 11.1.0.4 host 40.114.69.24
Active SAs: 4, origin: crypto map
Inbound: #pkts dec'ed 101 drop 0 life (KB/Sec) 4607985/3563
Outbound: #pkts enc'ed 100 drop 0 life (KB/Sec) 4607989/3563
Interface: Tunnel11
Uptime: 1w3d
Session status: UP-ACTIVE
Peer: 40.117.131.133 port 4500 fvrf: (none) ivrf: (none)
Phase1_id: 10.1.0.4
Desc: (none)
Session ID: 0
IKEv1 SA: local 11.1.0.4/4500 remote 40.117.131.133/4500 Active
Capabilities:DN connid:1025 lifetime:17:31:38
IPSEC FLOW: permit 47 host 11.1.0.4 host 40.117.131.133
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 16 drop 0 life (KB/Sec) 4607923/603
Outbound: #pkts enc'ed 18 drop 0 life (KB/Sec) 4607955/603
Interface: Tunnel11
Uptime: 1w3d
Session status: UP-ACTIVE
Peer: 40.117.128.85 port 4500 fvrf: (none) ivrf: (none)
Phase1_id: 10.1.0.5
Desc: (none)
Session ID: 0
IKEv1 SA: local 11.1.0.4/4500 remote 40.117.128.85/4500 Active
Capabilities:DN connid:1026 lifetime:17:31:41
IPSEC FLOW: permit 47 host 11.1.0.4 host 40.117.128.85
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 17 drop 0 life (KB/Sec) 4607957/1923
Outbound: #pkts enc'ed 17 drop 0 life (KB/Sec) 4607975/1923