The October Lab(Linux, GLBP, IPSEC, DMVPN, NAT, eBGP, OSPF, EIGRP)
Big Picture
In October of 2025, I began working on a lab that has an HQ site and three Branch sites.
This is an Information Technology Lab using VMWare Workstation Pro, GNS3 server, and Cisco CML.


- - Technologies used in this lab:
- VLANs
- Trunking (802.1Q)
- GLBP
- eBGP
- OSPF
- Named EIGRP
- Static Routing
- DHCP (Cisco IOS-XE)
- DNS
- DMVPN
- NHRP
- IPsec
- GRE
- NAT
- ACLs
- Route Redistribution
- Route Maps
- SSH
- AAA
- RADIUS Authentication
- Linux (Debian)
- FreeRADIUS 3.0
- BIND9 DNS
- VPN Encryption
- Each site has its own IGP, and each site is able to communicate with the others over an IPsec DMVPN tunnel.
- The HQ site is the hub and the Branch sites are the spokes.
- Each site is connected to the ISP-CLOUD router through eBGP.
- ISP-CLOUD router provides real internet connectivity to each site from its WAN connection on interface g0/4.
- Traffic from each site going to the public internet is translated with NAT at the core routers, and then translated again at interface g0/4 on the ISP-CLOUD router.
- Traffic from each site going to another site is redistributed into EIGRP (name: “CORPORATE TUNNEL”, AS 7500), encapsulated in GRE, and then protected with IPsec.
- Traffic received from another site is redistributed into the EIGRP DMVPN TUNNEL and then sent to the host.
- The access layer at each site is layer 2.
- Each switch at the access layer of each site advertises it's VLAN networks into their site's IGP.
- There are only 2 VLANs at each site, the PC VLAN and the SERVER VLAN.
- Each PC in the PC VLAN can get DHCP IPv4 addressing from BRANCH-2-DHCP in AS 7502.
- Each device in the network can resolve hostnames of Linux or network devices at any site by using BRANCH-1-DNS in AS 7501.
- You must sign into each network device at a site using credentials stored on the RADIUS server, HQ-RADIUS, in AS 7500.
- You can only SSH into a network device at a site using credentials stored in HQ-RADIUS in AS 7500.
- Core router HQ-R1-CORE is the hub in the DMVPN tunnel(172.16.0.1/28) between each site.
- AS 7500 uses OSPF as the IGP.
- The hosts in AS 7500 use 10.0.0.1 as their default gateway, which is the virtual IP in GLBP 10.
- HQ-R3-GLBP is the Active Virtual Gateway and HQ-R2-GLBP is an Active Virtual Forwarder with the next highest priority.
- The connection between the GLBP routers and HQ-SW are trunk connections.
- This radius server is powered by the FreeRADIUS 3.0 package.
- Each client is able to authenticate using the key october-lab over ports 1812 and 1813.
- Core router BRANCH-1-CORE is a spoke(172.16.0.2/28) in the DMVPN tunnel.
- AS 7501 uses named EIGRP as the IGP.
- This DNS server is powered by the BIND9 package.
- Core router BRANCH-2-CORE is a spoke(172.16.0.3/28) in the DMVPN tunnel.
- AS 7502 uses OSPF as the IGP.
- This DHCP server is technically a Cisco router, so I have enabled RADIUS authentication on it.
- Core router BRANCH-3-CORE is a spoke(172.16.0.4/28) in the DMVPN tunnel.
- AS 7502 uses static routing inside its network.

- The Cisco IOS image I'm using for the routers was causing DMVPN bugs.
- The Cisco image I'm using for the routers causes the 'ip nhrp map multicast dynamic' command not to appear in the running config on the hub and the command 'ip nhrp shortcut' does not appear in the running config of the spokes.
- Notice how there are no public addresses in this traceroute due to NAT implementation at the core routers.
- Active BGP connection between ISP-CLOUD and BRANCH-3-CORE routers. The ISP-CLOUD router does not route any packets with private addresses and I've applied ACLs to filter them out of the eBGP connections.
- PC5 successfully pinging FQDNs.
- 'show ip nat translations' output.
- Redistribution at each core router is performed with ACLs and route-maps of the site's internal network to avoid loops.




- 10.0.1.34 is the DNS server. BRANCH-1-DNS also uses public DNS servers 1.1.1.1 and 8.8.8.8.

HQ - AS 7500





HQ-RADIUS(Debian Linux)



Branch 1 - AS 7501


BRANCH-1-DNS(Debian Linux)





