FlexVPN and DMVPN are the two VPN frameworks that define Cisco’s site-to-site and remote access tunnel architectures — and the CCIE Security v6.1 lab tests both extensively. FlexVPN, built on IKEv2 (RFC 7296), unifies site-to-site, hub-and-spoke, and remote access VPN under a single CLI framework with smart defaults that cut configuration by 60-70%. DMVPN, the mGRE + NHRP + IPsec overlay that has dominated enterprise branch networking since IOS 12.4, still powers over 70% of production branch VPN deployments according to Cisco’s enterprise networking data.
Key Takeaway: You cannot choose one framework over the other for CCIE Security v6.1 — you must master both. DMVPN Phase 3 dual-hub troubleshooting and FlexVPN IKEv2 configuration are separate lab sections, and candidates who skip either one consistently fail the VPN portion.
What Is the Core Architectural Difference Between FlexVPN and DMVPN?
FlexVPN uses IKEv2 as both the signaling protocol and the keying mechanism for all tunnel types, while DMVPN relies on a three-protocol stack — mGRE for tunnel encapsulation, NHRP for dynamic address resolution, and IPsec (IKEv1 or IKEv2) for optional encryption. This architectural split creates fundamentally different operational models. FlexVPN treats every VPN scenario — site-to-site, spoke-to-spoke, remote access — as an IKEv2 session with different authorization policies. DMVPN treats the overlay as a separate network layer where NHRP handles tunnel-to-NBMA address mapping independently from the encryption layer.

DMVPN: The Three-Protocol Stack
DMVPN’s architecture consists of three interdependent components, each defined by separate standards:
mGRE (Multipoint GRE) — A single tunnel interface handles multiple remote endpoints. Unlike point-to-point GRE where each peer requires a dedicated tunnel interface and subnet, mGRE eliminates the N-squared configuration problem. According to the Cisco NHRP Configuration Guide, this is what makes DMVPN scalable from 10 to 10,000 spokes on a single hub.
NHRP (Next Hop Resolution Protocol) — Defined in RFC 2332, NHRP maps tunnel overlay addresses to NBMA underlay addresses. Spokes dynamically register with the hub (NHS — Next Hop Server), and in Phase 3, the hub issues NHRP redirect messages that trigger spoke-to-spoke shortcut routes. As the DMVPN Deep Dive by This Bridge is the Root explains: “Phase 3 is more about optimization of the NHRP lookup process rather than a dramatic change to traffic flow.”
IPsec — Optional but standard in production. Applied via
tunnel protection ipsec profileon the mGRE interface. Can use either IKEv1 or IKEv2 for key exchange.
FlexVPN: The Unified IKEv2 Framework
FlexVPN collapses the three-protocol stack into IKEv2-driven sessions. The Cisco FlexVPN Configuration Guide describes it as “a unified framework for configuring IPsec VPNs on Cisco IOS devices using IKEv2.” The key components are:
- IKEv2 Proposal — Defines encryption (AES-CBC-256), integrity (SHA-512), PRF, and DH group
- IKEv2 Policy — Matches proposals to sessions
- IKEv2 Profile — The central configuration element: peer matching, authentication method, authorization policies
- IKEv2 Keyring — Stores pre-shared keys or references certificate trustpoints
- IPsec Profile — Links the IKEv2 profile to tunnel interfaces (SVTI or DVTI)
| Feature | DMVPN | FlexVPN |
|---|---|---|
| Tunnel protocol | mGRE (GRE multipoint) | IKEv2 (RFC 7296) |
| Address resolution | NHRP (RFC 2332) | IKEv2 Configuration Payload / NHRP |
| Key exchange | IKEv1 or IKEv2 (separate) | IKEv2 (integrated) |
| Smart defaults | None | Yes — auto proposal, policy, transform-set |
| Remote access | Requires AnyConnect/ASA | Native IKEv2 RA with DVTI |
| AAA integration | Limited (NHRP-level) | Full per-tunnel AAA via IKEv2 authorization |
| Spoke-to-spoke | NHRP shortcut + redirect | NHRP over IKEv2 or direct IKEv2 sessions |
| Multicast support | Native (mGRE) | Requires mGRE overlay |
| Typical config lines (hub) | 25-35 lines | 10-15 lines with smart defaults |
How Does DMVPN Phase 3 Spoke-to-Spoke Actually Work?
DMVPN Phase 3 enables direct spoke-to-spoke tunnels without routing traffic through the hub by using two NHRP commands: ip nhrp redirect on the hub and ip nhrp shortcut on spokes. When Spoke A sends traffic destined for Spoke B, the packet initially traverses the hub. The hub, seeing a more efficient path exists, sends an NHRP Traffic Indication (redirect) message back to Spoke A containing Spoke B’s NBMA address. Spoke A then installs a /32 NHRP shortcut route in CEF, overriding the routing table’s next-hop via hub, and subsequent packets flow directly spoke-to-spoke.
According to Cisco’s NHRP documentation, Phase 3 provides two key improvements over Phase 2: hierarchical hub designs (daisy-chaining was impossible in Phase 2) and summarized routing on the hub (Phase 2 required specific routes to maintain NHRP next-hop accuracy).
Hub Configuration (IOS-XE 17.x)
interface Tunnel0
ip address 172.16.0.1 255.255.255.0
no ip redirects
ip mtu 1400
ip nhrp authentication DMVPN-KEY
ip nhrp network-id 100
ip nhrp redirect
ip nhrp map multicast dynamic
tunnel source GigabitEthernet0/0/0
tunnel mode gre multipoint
tunnel key 100
tunnel protection ipsec profile DMVPN-IPSEC
The critical command is ip nhrp redirect — this instructs the hub to send NHRP Traffic Indication messages when it detects spoke-to-spoke traffic traversing it.
Spoke Configuration (IOS-XE 17.x)
interface Tunnel0
ip address 172.16.0.2 255.255.255.0
no ip redirects
ip mtu 1400
ip nhrp authentication DMVPN-KEY
ip nhrp network-id 100
ip nhrp nhs 172.16.0.1 nbma 203.0.113.1 multicast
ip nhrp shortcut
ip nhrp registration timeout 60
tunnel source GigabitEthernet0/0/0
tunnel mode gre multipoint
tunnel key 100
tunnel protection ipsec profile DMVPN-IPSEC
The ip nhrp shortcut command is the Phase 3 enabler on spokes. On modern IOS-XE (17.x), this command is enabled by default — run show run all | include nhrp shortcut to verify. The shortcut command allows the spoke to install NHRP-learned /32 routes directly into CEF, bypassing the routing table’s next-hop.
Verification Commands
! Check DMVPN tunnel status and peer types
show dmvpn
! Verify NHRP mappings (static vs dynamic)
show ip nhrp
! Confirm shortcut routes in CEF
show ip cef 10.100.0.3
nexthop 203.0.113.3 Tunnel0 ← direct spoke-to-spoke
! Monitor NHRP redirect/shortcut activity
debug nhrp
How Does FlexVPN Simplify Configuration with IKEv2 Smart Defaults?
IKEv2 smart defaults in FlexVPN auto-generate the proposal, policy, and transform-set with strong cryptographic parameters — AES-256-CBC encryption, SHA-512 integrity, and DH Group 19 (256-bit ECP). According to the Cisco FlexVPN Configuration Guide, smart defaults “minimize the FlexVPN configuration by covering most of the use cases.” This means a basic site-to-site VPN requires only a keyring (for PSK) and a profile — everything else is auto-populated.
Minimal FlexVPN Site-to-Site (Smart Defaults)
Hub Router:
! Step 1: Define keyring with pre-shared keys
crypto ikev2 keyring FLEX-KEYS
peer BRANCH1
address 198.51.100.2
pre-shared-key local HubKey123
pre-shared-key remote Branch1Key456
!
! Step 2: Create IKEv2 profile
crypto ikev2 profile FLEX-PROFILE
match identity remote address 198.51.100.2 255.255.255.255
authentication local pre-share
authentication remote pre-share
keyring local FLEX-KEYS
lifetime 86400
! Step 3: Apply to tunnel interface (SVTI)
interface Tunnel0
ip address 10.0.0.1 255.255.255.252
tunnel source GigabitEthernet0/0/0
tunnel destination 198.51.100.2
tunnel mode ipsec ipv4
tunnel protection ipsec profile default
That is the entire configuration. No explicit proposal, no policy, no transform-set — smart defaults handle all of it. Compare this with the equivalent DMVPN configuration that requires explicit crypto isakmp policy, crypto ipsec transform-set, crypto ipsec profile, plus the mGRE and NHRP commands.
Full Custom FlexVPN (When Smart Defaults Are Not Enough)
For CCIE Security lab scenarios that require specific crypto parameters or Next Generation Encryption (NGE), you need to override smart defaults:
! Custom IKEv2 proposal with NGE
crypto ikev2 proposal NGE-PROPOSAL
encryption aes-gcm-256
prf sha512
group 20
! Custom IKEv2 policy
crypto ikev2 policy NGE-POLICY
proposal NGE-PROPOSAL
! Custom IPsec transform set
crypto ipsec transform-set NGE-TS esp-gcm 256
mode transport
! Custom IPsec profile
crypto ipsec profile NGE-IPSEC
set transform-set NGE-TS
set ikev2-profile FLEX-PROFILE
According to Send The Payload’s FlexVPN examples, the custom approach adds about 15 lines but provides “granular control” needed for compliance requirements or mixed-vendor environments.
What Does the CCIE Security v6.1 Lab Actually Test?
The CCIE Security v6.1 exam blueprint splits VPN technologies across multiple sections. DMVPN appears under “3.0 Virtual Private Networks” as a site-to-site technology requiring Phase 3 dual-hub troubleshooting with IPsec/IKEv2 encryption. FlexVPN appears in the same section covering IKEv2-based site-to-site and remote access configurations. Candidates on study forums like Packet-Forwarding.net consistently report that VPN technologies consume 20-30% of the 8-hour lab exam.

DMVPN Lab Scenarios to Expect
Based on the blueprint and candidate reports, expect these DMVPN scenarios:
- Phase 3 dual-hub troubleshooting — Two NHS servers with failover. Verify NHRP registration, shortcut switching, and spoke failover between hubs
- Routing protocol integration — EIGRP or BGP over DMVPN with proper next-hop handling (EIGRP requires
no ip next-hop-self eigrpon the hub for Phase 3) - IPsec overlay — Adding
tunnel protection ipsec profilewith IKEv2 to existing DMVPN tunnels - NHRP authentication — Matching authentication strings across hub and spokes
FlexVPN Lab Scenarios to Expect
- Site-to-site with certificates — IKEv2 profile with RSA-SIG authentication using a local PKI CA
- Remote access with DVTI — Dynamic Virtual Tunnel Interfaces for per-user tunnel assignment
- AAA authorization policies — Per-tunnel attribute assignment through IKEv2 authorization (IP address, DNS, split-tunnel ACL)
- ISE integration — FlexVPN with external RADIUS for EAP authentication, as documented in Cisco’s FlexVPN with ISE guide
Critical Verification Commands for Both
| Command | What It Shows | Framework |
|---|---|---|
show crypto ikev2 sa | IKEv2 SA state, encryption, lifetime | Both |
show crypto ikev2 sa detailed | Full SA details including DPD, fragmentation | Both |
show crypto ipsec sa | IPsec SA counters, encaps/decaps, errors | Both |
show dmvpn | DMVPN peer table, type (static/dynamic), state | DMVPN |
show ip nhrp | NHRP cache — address mappings, type, expiry | DMVPN |
show ip nhrp nhs | NHS registration status and timers | DMVPN |
show crypto ikev2 profile | IKEv2 profile config and match criteria | FlexVPN |
show crypto ikev2 stats | IKEv2 negotiation counters and errors | FlexVPN |
debug crypto ikev2 | Real-time IKEv2 negotiation messages | Both |
When Should You Use FlexVPN Over DMVPN in Production?
FlexVPN is the better choice for greenfield deployments, remote access consolidation, and environments requiring per-tunnel security policies through AAA integration. According to the Cisco Live BRKSEC-3001 session on Advanced IKEv2, FlexVPN’s authorization model allows the hub to push unique QoS policies, firewall rules, and IP assignments per spoke — something DMVPN cannot do natively without external tooling.
Choose FlexVPN When
- Deploying new site-to-site tunnels where no DMVPN overlay exists
- Consolidating remote access — FlexVPN replaces separate AnyConnect/ASA RA deployments with router-based IKEv2 RA using DVTI
- Per-tunnel policy enforcement is required (compliance, multi-tenancy)
- Certificate-based authentication is mandated — FlexVPN’s native PKI integration is cleaner than DMVPN + separate IKEv2 config
- Integrating with Cisco ISE for posture assessment and EAP-based authentication on VPN tunnels
Choose DMVPN When
- Existing overlay is DMVPN — Migration cost rarely justifies switching for brownfield deployments
- Multicast routing is required across the overlay — DMVPN’s mGRE natively supports
ip nhrp map multicast dynamic, while FlexVPN requires additional mGRE overlay configuration - Large-scale hub-and-spoke with 500+ spokes — DMVPN Phase 3 with dual-hub redundancy is battle-tested at this scale
- SD-WAN migration is planned — Cisco’s SD-WAN (Viptela) migration tools convert DMVPN overlays to SD-WAN, not FlexVPN overlays
- Team expertise — Most network teams have deeper DMVPN troubleshooting skills than FlexVPN
The Hybrid Approach: IKEv2 Over DMVPN
The most practical production pattern — and the one most likely on the CCIE lab — is running IKEv2 encryption over DMVPN tunnels. This gives you DMVPN’s dynamic spoke-to-spoke overlay with FlexVPN’s stronger IKEv2 key exchange:
! IKEv2 proposal for DMVPN encryption
crypto ikev2 proposal DMVPN-IKEV2
encryption aes-cbc-256
integrity sha256
group 14
crypto ikev2 policy DMVPN-POLICY
proposal DMVPN-IKEV2
crypto ikev2 profile DMVPN-PROFILE
match identity remote address 0.0.0.0
authentication local pre-share
authentication remote pre-share
keyring local DMVPN-KEYS
crypto ipsec transform-set DMVPN-TS esp-aes 256 esp-sha256-hmac
mode transport
crypto ipsec profile DMVPN-IPSEC
set transform-set DMVPN-TS
set ikev2-profile DMVPN-PROFILE
interface Tunnel0
! ... existing DMVPN config ...
tunnel protection ipsec profile DMVPN-IPSEC
Note the mode transport on the transform-set — this is critical for DMVPN because the GRE header is already providing encapsulation. Using mode tunnel would add a redundant IP header, increasing overhead by 20 bytes per packet and potentially causing MTU issues.
How Do FlexVPN and DMVPN Handle Scalability Differently?
DMVPN scales horizontally through NHRP’s dynamic registration model — adding a new spoke requires zero hub configuration changes. The spoke registers with the NHS automatically, and Phase 3 shortcut switching keeps spoke-to-spoke traffic off the hub. According to Cisco’s documentation, a single DMVPN hub can support thousands of spokes with hierarchical NHS designs in Phase 3.
FlexVPN scales vertically through AAA-driven configuration. Each spoke gets its IKEv2 session authorized by RADIUS (typically Cisco ISE), which pushes per-tunnel attributes. Adding a new spoke requires an ISE policy entry rather than router CLI changes. This centralizes spoke management but introduces a dependency on the AAA infrastructure.
| Scalability Dimension | DMVPN | FlexVPN |
|---|---|---|
| Adding spokes | Zero-touch on hub (NHRP auto-registration) | RADIUS policy entry or keyring addition |
| Hub redundancy | Dual NHS with ip nhrp nhs failover | IKEv2 profile with multiple match + DPD failover |
| Spoke-to-spoke efficiency | NHRP shortcut (direct after first packet) | Direct IKEv2 or NHRP-over-IKEv2 |
| Maximum spokes per hub | 2,000-4,000 (hardware dependent) | 1,000-2,000 (IKEv2 SA memory intensive) |
| Configuration management | Distributed (spoke-level) | Centralized (AAA/RADIUS) |
| Routing protocol overhead | EIGRP/BGP over mGRE | EIGRP/BGP over SVTI/DVTI |
What Are the Common Pitfalls to Avoid on Exam Day?
CCIE Security candidates consistently report these VPN configuration and troubleshooting mistakes that cost them points in the lab. Knowing these patterns before exam day can save 30-60 minutes of debugging time.
DMVPN Pitfalls
- Forgetting
ip nhrp redirecton the hub — Without this, Phase 3 shortcut switching never activates. Spokes will show all traffic hairpinning through the hub inshow ip nhrp - Using
mode tunnelinstead ofmode transportin the IPsec transform-set when encrypting DMVPN. This adds 20 bytes of unnecessary overhead and can cause silent packet drops at MTU boundaries - EIGRP next-hop-self on the hub — By default, EIGRP rewrites the next-hop to itself. For Phase 3 spoke-to-spoke routing, you must configure
no ip next-hop-self eigrp <AS>on the hub tunnel interface - Mismatched NHRP authentication strings — The
ip nhrp authenticationstring must match exactly between hub and all spokes. A single character mismatch causes silent registration failure with no syslog message by default - Not setting
ip mtu 1400andip tcp adjust-mss 1360— GRE + IPsec overhead requires MTU adjustment. Without it, you get intermittent failures on large packets while pings (small packets) succeed — a classic “pings work but SSH/HTTPS doesn’t” scenario
FlexVPN Pitfalls
- Leaving smart defaults enabled when custom crypto is required — If the lab specifies AES-GCM-256, you must explicitly
no crypto ikev2 proposal defaultbefore configuring custom proposals. Smart defaults may still match if not removed - Forgetting
keyring localin the profile — The IKEv2 profile must reference the keyring explicitly withkeyring local <NAME>. Omitting this causes authentication failure with%CRYPTO-4-IKEV2_AUTH_FAIL - Using SVTI when DVTI is required — Remote access scenarios require Dynamic VTI (virtual-template) for per-user tunnel assignment. Static VTI only works for known, fixed peers
- DPD timer mismatch — If the hub and spoke have different Dead Peer Detection intervals (
crypto ikev2 dpd), one side may tear down the tunnel while the other considers it active - Certificate DN matching errors — When using RSA-SIG authentication, the
match identity remotestatement in the IKEv2 profile must match the certificate Subject or SAN field exactly
How Should You Structure Your CCIE Security VPN Study Plan?
A systematic study approach for VPN technologies should take approximately 120-160 hours across both frameworks, based on candidate study blogs and forum discussions on the Cisco Learning Network. The most efficient sequence mirrors real-world deployment patterns: build DMVPN first (it is the more established technology), then layer FlexVPN concepts on top.
Recommended Study Sequence
- Weeks 1-2: DMVPN fundamentals — Build Phase 1, 2, and 3 labs in EVE-NG. Focus on understanding how NHRP resolution, redirect, and shortcut switching work at the packet level using Wireshark captures
- Weeks 3-4: DMVPN + routing protocols — EIGRP and BGP over DMVPN with dual-hub redundancy. Master the next-hop behavior differences between Phase 2 and Phase 3
- Weeks 5-6: FlexVPN site-to-site — Start with smart defaults, then progress to custom proposals. Compare the configuration line-by-line with equivalent DMVPN setups
- Week 7: FlexVPN remote access — DVTI, AnyConnect integration, EAP with ISE. This is unique to FlexVPN and cannot be done with DMVPN alone
- Week 8: IKEv2 over DMVPN — The hybrid approach. Practice converting existing DMVPN from IKEv1 to IKEv2, which is the most realistic migration scenario
- Weeks 9-10: Troubleshooting sprints — Break configurations intentionally. Practice identifying issues using only
showanddebugcommands within 15-minute time windows
Recommended Lab Resources
- EVE-NG or CML with IOSv and CSR1000v images (IOS-XE 17.x) — both frameworks require IOS-XE for full feature support
- Cisco’s FlexVPN with ISE integration guide for AAA-based scenarios
- Packet Pushers FlexVPN design series for architecture comparison from a design perspective
Frequently Asked Questions
Does CCIE Security v6.1 test FlexVPN or DMVPN more heavily?
Both are tested. DMVPN appears under “Site-to-Site VPN” requiring Phase 3 dual-hub troubleshooting, while FlexVPN covers IKEv2-based tunnels including remote access. Candidates on study forums report roughly equal weight in lab scenarios, with VPN technologies consuming 20-30% of the 8-hour lab.
Can FlexVPN replace DMVPN in production?
Yes, FlexVPN can replicate DMVPN’s spoke-to-spoke behavior using IKEv2 with NHRP shortcut switching. However, most brownfield networks still run DMVPN with over 70% market share in enterprise branch deployments. Migration is typically gradual — adding IKEv2 encryption to existing DMVPN rather than ripping out the overlay entirely.
What are IKEv2 smart defaults in FlexVPN?
Smart defaults auto-configure the IKEv2 proposal (AES-256-CBC, SHA-512, DH Group 19), policy, and transform-set when no custom configuration exists. According to Cisco’s documentation, this “minimizes the FlexVPN configuration by covering most of the use cases.” You only define the keyring and profile — cutting total configuration from 30+ lines to under 10.
Is DMVPN Phase 3 still relevant in 2026?
Absolutely. DMVPN Phase 3 remains the dominant enterprise branch VPN overlay, and Cisco continues to add features (IPv6 over DMVPN, DMVPN with IPv6 underlay) in IOS-XE releases. It is also the foundation for SD-WAN migration — Cisco’s SD-WAN migration tools convert DMVPN overlays to Viptela fabric, making DMVPN knowledge directly transferable.
Which VPN framework is better for SD-WAN migration?
Neither framework migrates directly to SD-WAN, but DMVPN sites have an easier transition path. Cisco’s SD-WAN migration tools map DMVPN hub-and-spoke topologies to SD-WAN overlay fabric. FlexVPN’s IKEv2 underpinnings align better with SD-WAN’s architecture philosophically, but there are no automated migration tools from FlexVPN to vManage-controlled SD-WAN.
Ready to fast-track your CCIE journey? Contact us on Telegram @firstpasslab for a free assessment.
