mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	l2tp/pptp : configuration and grammar check
pptp - The cfg-mode 'set vpn pptp remote-access gateway-address' and op-mode 'show pptp-server sessions' commands are not available, so replaced with correct one l2tp - corrected the grammar
This commit is contained in:
		
							parent
							
								
									f601ca43e0
								
							
						
					
					
						commit
						176acce28d
					
				| @ -1,3 +1,5 @@ | |||||||
|  | :lastproofread:2021-07-15 | ||||||
|  | 
 | ||||||
| .. _l2tp: | .. _l2tp: | ||||||
| 
 | 
 | ||||||
| L2TP over IPsec | L2TP over IPsec | ||||||
| @ -85,7 +87,7 @@ operational command. | |||||||
| RADIUS authentication | RADIUS authentication | ||||||
| ^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| The above configuration made use of local accounts on the VyOS router for | The above configuration uses local accounts on the VyOS router for | ||||||
| authenticating L2TP/IPSec clients. In bigger environments usually something | authenticating L2TP/IPSec clients. In bigger environments usually something | ||||||
| like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used. | like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used. | ||||||
| 
 | 
 | ||||||
| @ -104,9 +106,9 @@ nodes: | |||||||
|   set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo' |   set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo' | ||||||
|   set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo' |   set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo' | ||||||
| 
 | 
 | ||||||
| .. note:: Some RADIUS_ severs make use of an access control list who is allowed | .. note:: Some RADIUS_ severs make use of an access control list which is  | ||||||
|    to query the server. Please configure your VyOS router in the allowed client |    allowed to query the server. Please configure your VyOS router in the  | ||||||
|    list. |    allowed client list. | ||||||
| 
 | 
 | ||||||
| RADIUS source address | RADIUS source address | ||||||
| ********************* | ********************* | ||||||
|  | |||||||
| @ -1,3 +1,5 @@ | |||||||
|  | :lastproofread:2021-07-15 | ||||||
|  | 
 | ||||||
| .. _pptp: | .. _pptp: | ||||||
| 
 | 
 | ||||||
| PPTP-Server | PPTP-Server | ||||||
| @ -18,7 +20,6 @@ server example | |||||||
|   set vpn pptp remote-access authentication mode 'local' |   set vpn pptp remote-access authentication mode 'local' | ||||||
|   set vpn pptp remote-access client-ip-pool start '192.168.0.10' |   set vpn pptp remote-access client-ip-pool start '192.168.0.10' | ||||||
|   set vpn pptp remote-access client-ip-pool stop '192.168.0.15'  |   set vpn pptp remote-access client-ip-pool stop '192.168.0.15'  | ||||||
|   set vpn pptp remote-access gateway-address '10.100.100.1' |  | ||||||
|   set vpn pptp remote-access outside-address '10.1.1.120' |   set vpn pptp remote-access outside-address '10.1.1.120' | ||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| @ -41,7 +42,9 @@ All tunnel sessions can be checked via: | |||||||
| 
 | 
 | ||||||
| .. code-block:: none | .. code-block:: none | ||||||
| 
 | 
 | ||||||
|   run sh pptp-server sessions |   run show vpn remote-access | ||||||
|    ifname | username | calling-sid |      ip      | type | comp | state  |  uptime |   Active remote access VPN sessions: | ||||||
|   --------+----------+-------------+--------------+------+------+--------+---------- | 
 | ||||||
|    ppp0   | test     | 10.1.1.99   | 192.168.0.10 | pptp | mppe | active | 00:00:58 |   User            Proto Iface     Tunnel IP       TX byte RX byte  Time | ||||||
|  |   ----            ----- -----     ---------       ------- -------  ---- | ||||||
|  |   test            PPTP  pptp0     192.168.0.10     288      66  00h00m07s | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user