l2tp: fix linter errors

This commit is contained in:
rebortg 2020-12-11 14:32:32 +01:00
parent 4fd8e9cdf9
commit 3ba03aeed5

View File

@ -72,12 +72,8 @@ parameter to the client.
.. code-block:: none .. code-block:: none
set vpn l2tp remote-access dns-servers server-1 '8.8.8.8' set vpn l2tp remote-access dns-servers server-1 '198.51.100.8'
set vpn l2tp remote-access dns-servers server-2 '8.8.4.4' set vpn l2tp remote-access dns-servers server-2 '198.51.100.4'
.. note:: Those are the `Google public DNS`_ servers, but you can choose
any public available servers, like Quad9_ (9.9.9.9), Cloudflare_ (1.1.1.1)
or OpenNIC_.
Established sessions can be viewed using the **show vpn remote-access** Established sessions can be viewed using the **show vpn remote-access**
operational command, or **show l2tp-server sessions** operational command, or **show l2tp-server sessions**
@ -107,11 +103,11 @@ Below is an example to configure a LNS:
set vpn l2tp remote-access authentication mode local set vpn l2tp remote-access authentication mode local
set vpn l2tp remote-access authentication local-users username test password 'test' set vpn l2tp remote-access authentication local-users username test password 'test'
The example above uses 192.0.2.2 as external IP address. A LAC normally The example above uses 192.0.2.2 as external IP address. A LAC normally requires
requires an authentication password, which is set in the example configuration an authentication password, which is set in the example configuration to
to ``lns shared-secret 'secret'``. This setup requires the Compression Control ``lns shared-secret 'secret'``. This setup requires the Compression Control
Protocol (CCP) being disabled, the command ``set vpn l2tp remote-access ccp-disable`` Protocol (CCP) being disabled, the command ``set vpn l2tp remote-access
accomplishes that. ccp-disable`` accomplishes that.
Bandwidth Shaping Bandwidth Shaping
@ -166,9 +162,9 @@ servers can be setup and will be used subsequentially.
RADIUS source address RADIUS source address
^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^
If you are using OSPF as IGP always the closets interface connected to the RADIUS If you are using OSPF as IGP always the closets interface connected to the
server is used. With VyOS 1.2 you can bind all outgoing RADIUS requests to a RADIUS server is used. With VyOS 1.2 you can bind all outgoing RADIUS requests
single source IP e.g. the loopback interface. to a single source IP e.g. the loopback interface.
.. code-block:: none .. code-block:: none
@ -183,14 +179,15 @@ on this NAS.
RADIUS bandwidth shaping attribute RADIUS bandwidth shaping attribute
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
To enable bandwidth shaping via RADIUS, the option rate-limit needs to be enabled. To enable bandwidth shaping via RADIUS, the option rate-limit needs to be
enabled.
.. code-block:: none .. code-block:: none
set vpn l2tp remote-access authentication radius rate-limit enable set vpn l2tp remote-access authentication radius rate-limit enable
The default RADIUS attribute for rate limiting is ``Filter-Id``, but you may also The default RADIUS attribute for rate limiting is ``Filter-Id``, but you may
redefine it. also redefine it.
.. code-block:: none .. code-block:: none