l2tp/pptp : configuration and grammar check

pptp - The cfg-mode 'set vpn pptp remote-access gateway-address' and op-mode
'show pptp-server sessions' commands are not available, so replaced with
correct one

l2tp - corrected the grammar
This commit is contained in:
srividya0208 2021-07-15 09:39:02 -04:00
parent f601ca43e0
commit 176acce28d
2 changed files with 15 additions and 10 deletions

View File

@ -1,3 +1,5 @@
:lastproofread:2021-07-15
.. _l2tp: .. _l2tp:
L2TP over IPsec L2TP over IPsec
@ -85,7 +87,7 @@ operational command.
RADIUS authentication RADIUS authentication
^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^
The above configuration made use of local accounts on the VyOS router for The above configuration uses local accounts on the VyOS router for
authenticating L2TP/IPSec clients. In bigger environments usually something authenticating L2TP/IPSec clients. In bigger environments usually something
like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used. like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used.
@ -104,9 +106,9 @@ nodes:
set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo' set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo'
set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo' set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo'
.. note:: Some RADIUS_ severs make use of an access control list who is allowed .. note:: Some RADIUS_ severs make use of an access control list which is
to query the server. Please configure your VyOS router in the allowed client allowed to query the server. Please configure your VyOS router in the
list. allowed client list.
RADIUS source address RADIUS source address
********************* *********************

View File

@ -1,3 +1,5 @@
:lastproofread:2021-07-15
.. _pptp: .. _pptp:
PPTP-Server PPTP-Server
@ -18,7 +20,6 @@ server example
set vpn pptp remote-access authentication mode 'local' set vpn pptp remote-access authentication mode 'local'
set vpn pptp remote-access client-ip-pool start '192.168.0.10' set vpn pptp remote-access client-ip-pool start '192.168.0.10'
set vpn pptp remote-access client-ip-pool stop '192.168.0.15' set vpn pptp remote-access client-ip-pool stop '192.168.0.15'
set vpn pptp remote-access gateway-address '10.100.100.1'
set vpn pptp remote-access outside-address '10.1.1.120' set vpn pptp remote-access outside-address '10.1.1.120'
@ -41,7 +42,9 @@ All tunnel sessions can be checked via:
.. code-block:: none .. code-block:: none
run sh pptp-server sessions run show vpn remote-access
ifname | username | calling-sid | ip | type | comp | state | uptime Active remote access VPN sessions:
--------+----------+-------------+--------------+------+------+--------+----------
ppp0 | test | 10.1.1.99 | 192.168.0.10 | pptp | mppe | active | 00:00:58 User Proto Iface Tunnel IP TX byte RX byte Time
---- ----- ----- --------- ------- ------- ----
test PPTP pptp0 192.168.0.10 288 66 00h00m07s