<s>
Dynamic	B-Application
Multipoint	I-Application
Virtual	I-Application
Private	I-Application
Network	I-Application
(	O
DMVPN	B-Application
)	O
is	O
a	O
dynamic	O
tunneling	O
form	O
of	O
a	O
virtual	B-Application
private	I-Application
network	I-Application
(	O
VPN	B-Application
)	O
supported	O
on	O
Cisco	O
IOS-based	O
routers	B-Protocol
,	O
and	O
Huawei	O
AR	O
G3	O
routers	B-Protocol
,	O
and	O
on	O
Unix-like	O
operating	B-General_Concept
systems	I-General_Concept
.	O
</s>
<s>
DMVPN	B-Application
provides	O
the	O
capability	O
for	O
creating	O
a	O
dynamic-mesh	O
VPN	B-Application
network	O
without	O
having	O
to	O
pre-configure	O
(	O
static	O
)	O
all	O
possible	O
tunnel	O
end-point	O
peers	O
,	O
including	O
IPsec	B-Protocol
(	O
Internet	B-Protocol
Protocol	I-Protocol
Security	I-Protocol
)	O
and	O
ISAKMP	B-Protocol
(	O
Internet	B-Protocol
Security	I-Protocol
Association	I-Protocol
and	I-Protocol
Key	I-Protocol
Management	I-Protocol
Protocol	I-Protocol
)	O
peers	O
.	O
</s>
<s>
DMVPN	B-Application
is	O
initially	O
configured	O
to	O
build	O
out	O
a	O
hub-and-spoke	O
network	O
by	O
statically	O
configuring	O
the	O
hubs	O
(	O
VPN	B-Application
headends	O
)	O
on	O
the	O
spokes	O
,	O
no	O
change	O
in	O
the	O
configuration	O
on	O
the	O
hub	O
is	O
required	O
to	O
accept	O
new	O
spokes	O
.	O
</s>
<s>
NHRP	B-Protocol
(	O
next-hop	O
resolution	O
protocol	O
)	O
,	O
</s>
<s>
IPsec	B-Protocol
(	O
Internet	B-Protocol
Protocol	I-Protocol
Security	I-Protocol
)	O
using	O
an	O
IPsec	B-Protocol
profile	O
,	O
which	O
is	O
associated	O
with	O
a	O
virtual	O
tunnel	O
interface	O
in	O
IOS	B-Protocol
software	O
.	O
</s>
<s>
An	O
IP-based	O
routing	B-Protocol
protocol	I-Protocol
,	O
EIGRP	B-Protocol
,	O
OSPF	B-Protocol
,	O
RIPv2	O
,	O
BGP	B-Protocol
or	O
ODR	B-Protocol
(	O
DMVPN	B-Application
hub-and-spoke	O
only	O
)	O
.	O
</s>
<s>
Routing	B-Protocol
protocols	I-Protocol
such	O
as	O
OSPF	B-Protocol
,	O
EIGRP	B-Protocol
v1	I-Protocol
or	I-Protocol
v2	I-Protocol
or	O
BGP	B-Protocol
are	O
generally	O
run	O
between	O
the	O
hub	O
and	O
spoke	O
to	O
allow	O
for	O
growth	O
and	O
scalability	O
.	O
</s>
<s>
Both	O
EIGRP	B-Protocol
and	O
BGP	B-Protocol
allow	O
a	O
higher	O
number	O
of	O
supported	O
spokes	O
per	O
hub	O
.	O
</s>
<s>
As	O
with	O
GRE	B-Protocol
tunnels	I-Protocol
,	O
DMVPN	B-Application
allows	O
for	O
several	O
encryption	O
schemes	O
(	O
including	O
none	O
)	O
for	O
the	O
encryption	O
of	O
data	O
traversing	O
the	O
tunnels	O
.	O
</s>
<s>
For	O
security	O
reasons	O
Cisco	O
recommend	O
that	O
customers	O
use	O
AES	B-Algorithm
.	O
</s>
<s>
DMVPN	B-Application
has	O
three	O
phases	O
that	O
route	O
data	O
differently	O
.	O
</s>
