mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-11-03 04:12:03 +01:00
openvpn: correct build error
This commit is contained in:
parent
d7b7cbff34
commit
4d95c2ad1e
@ -34,8 +34,9 @@ In the VyOS CLI, a key point often overlooked is that rather than being
|
|||||||
configured using the `set vpn` stanza, OpenVPN is configured as a network
|
configured using the `set vpn` stanza, OpenVPN is configured as a network
|
||||||
interface using `set interfaces openvpn`.
|
interface using `set interfaces openvpn`.
|
||||||
|
|
||||||
|
************
|
||||||
Site-To-Site
|
Site-To-Site
|
||||||
============
|
************
|
||||||
|
|
||||||
.. figure:: /_static/images/openvpn_site2site_diagram.jpg
|
.. figure:: /_static/images/openvpn_site2site_diagram.jpg
|
||||||
|
|
||||||
@ -130,9 +131,9 @@ Remote Configuration - Annotated:
|
|||||||
set interfaces openvpn vtun1 local-address '10.255.1.2' # Local IP of vtun interface
|
set interfaces openvpn vtun1 local-address '10.255.1.2' # Local IP of vtun interface
|
||||||
set interfaces openvpn vtun1 remote-address '10.255.1.1' # Remote IP of vtun interface
|
set interfaces openvpn vtun1 remote-address '10.255.1.1' # Remote IP of vtun interface
|
||||||
|
|
||||||
*******************
|
|
||||||
Firewall Exceptions
|
Firewall Exceptions
|
||||||
*******************
|
===================
|
||||||
|
|
||||||
For the OpenVPN traffic to pass through the WAN interface, you must create a
|
For the OpenVPN traffic to pass through the WAN interface, you must create a
|
||||||
firewall exception.
|
firewall exception.
|
||||||
@ -245,8 +246,9 @@ to each tunnel. Another option is to dedicate a port number to each tunnel
|
|||||||
OpenVPN status can be verified using the `show openvpn` operational commands.
|
OpenVPN status can be verified using the `show openvpn` operational commands.
|
||||||
See the built-in help for a complete list of options.
|
See the built-in help for a complete list of options.
|
||||||
|
|
||||||
|
******
|
||||||
Server
|
Server
|
||||||
======
|
******
|
||||||
|
|
||||||
Multi-client server is the most popular OpenVPN mode on routers. It always uses
|
Multi-client server is the most popular OpenVPN mode on routers. It always uses
|
||||||
x.509 authentication and therefore requires a PKI setup. Refer this section
|
x.509 authentication and therefore requires a PKI setup. Refer this section
|
||||||
@ -322,7 +324,7 @@ internally, so we need to create a route to the 10.23.0.0/20 network ourselves:
|
|||||||
set protocols static interface-route 10.23.0.0/20 next-hop-interface vtun10
|
set protocols static interface-route 10.23.0.0/20 next-hop-interface vtun10
|
||||||
|
|
||||||
Generate X.509 Certificate and Keys
|
Generate X.509 Certificate and Keys
|
||||||
-----------------------------------
|
===================================
|
||||||
|
|
||||||
OpenVPN ships with a set of scripts called Easy-RSA that can generate the
|
OpenVPN ships with a set of scripts called Easy-RSA that can generate the
|
||||||
appropriate files needed for an OpenVPN setup using X.509 certificates.
|
appropriate files needed for an OpenVPN setup using X.509 certificates.
|
||||||
@ -535,8 +537,10 @@ example:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
******
|
||||||
Client
|
Client
|
||||||
======
|
******
|
||||||
|
|
||||||
VyOS can not only act as an OpenVPN site-to-site or server for multiple clients.
|
VyOS can not only act as an OpenVPN site-to-site or server for multiple clients.
|
||||||
You can indeed also configure any VyOS OpenVPN interface as an OpenVPN client
|
You can indeed also configure any VyOS OpenVPN interface as an OpenVPN client
|
||||||
@ -548,7 +552,7 @@ static client IP address to the OpenVPN client. Remember, clients are identified
|
|||||||
using their CN attribute in the SSL certificate.
|
using their CN attribute in the SSL certificate.
|
||||||
|
|
||||||
Server
|
Server
|
||||||
------
|
======
|
||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
@ -572,7 +576,7 @@ Server
|
|||||||
set interfaces openvpn vtun10 use-lzo-compression
|
set interfaces openvpn vtun10 use-lzo-compression
|
||||||
|
|
||||||
Client
|
Client
|
||||||
------
|
======
|
||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
@ -614,13 +618,14 @@ Will add ``push "keepalive 1 10"`` to the generated OpenVPN config file.
|
|||||||
quotes using the ``"`` statement.
|
quotes using the ``"`` statement.
|
||||||
|
|
||||||
|
|
||||||
|
***************
|
||||||
Troubleshooting
|
Troubleshooting
|
||||||
===============
|
***************
|
||||||
|
|
||||||
VyOS provides some operational commands on OpenVPN.
|
VyOS provides some operational commands on OpenVPN.
|
||||||
|
|
||||||
Check status
|
Check status
|
||||||
------------
|
============
|
||||||
|
|
||||||
The following commands let you check tunnel status.
|
The following commands let you check tunnel status.
|
||||||
|
|
||||||
@ -639,7 +644,7 @@ The following commands let you check tunnel status.
|
|||||||
|
|
||||||
|
|
||||||
Reset OpenVPN
|
Reset OpenVPN
|
||||||
-------------
|
=============
|
||||||
|
|
||||||
The following commands let you reset OpenVPN.
|
The following commands let you reset OpenVPN.
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user