mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
l2tp/pptp : configuration and grammar check
pptp - The cfg-mode 'set vpn pptp remote-access gateway-address' and op-mode 'show pptp-server sessions' commands are not available, so replaced with correct one l2tp - corrected the grammar
This commit is contained in:
parent
f601ca43e0
commit
176acce28d
@ -1,3 +1,5 @@
|
||||
:lastproofread:2021-07-15
|
||||
|
||||
.. _l2tp:
|
||||
|
||||
L2TP over IPsec
|
||||
@ -85,7 +87,7 @@ operational command.
|
||||
RADIUS authentication
|
||||
^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
The above configuration made use of local accounts on the VyOS router for
|
||||
The above configuration uses local accounts on the VyOS router for
|
||||
authenticating L2TP/IPSec clients. In bigger environments usually something
|
||||
like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used.
|
||||
|
||||
@ -104,9 +106,9 @@ nodes:
|
||||
set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo'
|
||||
set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo'
|
||||
|
||||
.. note:: Some RADIUS_ severs make use of an access control list who is allowed
|
||||
to query the server. Please configure your VyOS router in the allowed client
|
||||
list.
|
||||
.. note:: Some RADIUS_ severs make use of an access control list which is
|
||||
allowed to query the server. Please configure your VyOS router in the
|
||||
allowed client list.
|
||||
|
||||
RADIUS source address
|
||||
*********************
|
||||
|
||||
@ -1,3 +1,5 @@
|
||||
:lastproofread:2021-07-15
|
||||
|
||||
.. _pptp:
|
||||
|
||||
PPTP-Server
|
||||
@ -17,8 +19,7 @@ server example
|
||||
set vpn pptp remote-access authentication local-users username test password 'test'
|
||||
set vpn pptp remote-access authentication mode 'local'
|
||||
set vpn pptp remote-access client-ip-pool start '192.168.0.10'
|
||||
set vpn pptp remote-access client-ip-pool stop '192.168.0.15'
|
||||
set vpn pptp remote-access gateway-address '10.100.100.1'
|
||||
set vpn pptp remote-access client-ip-pool stop '192.168.0.15'
|
||||
set vpn pptp remote-access outside-address '10.1.1.120'
|
||||
|
||||
|
||||
@ -41,7 +42,9 @@ All tunnel sessions can be checked via:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
run sh pptp-server sessions
|
||||
ifname | username | calling-sid | ip | type | comp | state | uptime
|
||||
--------+----------+-------------+--------------+------+------+--------+----------
|
||||
ppp0 | test | 10.1.1.99 | 192.168.0.10 | pptp | mppe | active | 00:00:58
|
||||
run show vpn remote-access
|
||||
Active remote access VPN sessions:
|
||||
|
||||
User Proto Iface Tunnel IP TX byte RX byte Time
|
||||
---- ----- ----- --------- ------- ------- ----
|
||||
test PPTP pptp0 192.168.0.10 288 66 00h00m07s
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user