mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
fix build errors after arrange
This commit is contained in:
parent
ce090a4ced
commit
6f6950d14e
@ -1,3 +1,6 @@
|
||||
.. _release-notes:
|
||||
|
||||
|
||||
#########
|
||||
Changelog
|
||||
#########
|
||||
|
||||
@ -12,8 +12,7 @@ Operational Mode
|
||||
|
||||
Operational mode allows for commands to perform operational system tasks and
|
||||
view system and service status, while configuration mode allows for the
|
||||
modification of system configuration. The list of all operational level commands
|
||||
is available at :ref:`operational_level_commands`.
|
||||
modification of system configuration.
|
||||
|
||||
The CLI provides a built-in help system. In the CLI the ``?`` key may be used
|
||||
to display available commands. The ``TAB`` key can be used to auto-complete
|
||||
@ -75,9 +74,6 @@ When viewing in page mode the following commands are available:
|
||||
Configuration Mode
|
||||
##################
|
||||
|
||||
The list of all operational level commands is available at
|
||||
:ref:`configuration_level_commands`.
|
||||
|
||||
To enter configuration mode use the ``configure`` command:
|
||||
|
||||
.. code-block:: none
|
||||
@ -112,7 +108,8 @@ thus also be easily cloned by simply copying the required configuration
|
||||
files.
|
||||
|
||||
Terminology
|
||||
===========
|
||||
###########
|
||||
|
||||
live
|
||||
A VyOS system has three major types of configurations:
|
||||
|
||||
|
||||
@ -1,11 +1,12 @@
|
||||
.. _firewall:
|
||||
|
||||
########
|
||||
Firewall
|
||||
========
|
||||
|
||||
########
|
||||
|
||||
********
|
||||
Overview
|
||||
--------
|
||||
********
|
||||
|
||||
VyOS makes use of Linux `netfilter <https://netfilter.org/>`_ for packet
|
||||
filtering.
|
||||
@ -24,8 +25,9 @@ or zone based firewall policy.
|
||||
OS, is a reference to as `local` with respect to its input interface.
|
||||
|
||||
|
||||
***************
|
||||
Global settings
|
||||
---------------
|
||||
***************
|
||||
|
||||
Some firewall settings are global and have a affect on the whole system.
|
||||
|
||||
@ -140,8 +142,9 @@ Some firewall settings are global and have a affect on the whole system.
|
||||
Set the global setting for related connections.
|
||||
|
||||
|
||||
******
|
||||
Groups
|
||||
------
|
||||
******
|
||||
|
||||
Firewall groups represent collections of IP addresses, networks, or
|
||||
ports. Once created, a group can be referenced by firewall rules as
|
||||
@ -158,7 +161,7 @@ names.
|
||||
|
||||
|
||||
Address Groups
|
||||
**************
|
||||
==============
|
||||
|
||||
In a **address group** a single IP adresses or IP address ranges are
|
||||
definded.
|
||||
@ -182,7 +185,7 @@ definded.
|
||||
|
||||
|
||||
Network Groups
|
||||
**************
|
||||
==============
|
||||
|
||||
While **network groups** accept IP networks in CIDR notation, specific
|
||||
IP addresses can be added as a 32-bit prefix. If you foresee the need
|
||||
@ -207,7 +210,7 @@ recommended.
|
||||
|
||||
|
||||
Port Groups
|
||||
***********
|
||||
===========
|
||||
|
||||
A **port group** represents only port numbers, not the protocol. Port
|
||||
groups can be referenced for either TCP or UDP. It is recommended that
|
||||
@ -232,8 +235,9 @@ filtering unnecessary ports. Ranges of ports can be specified by using
|
||||
Provide a port group description.
|
||||
|
||||
|
||||
*********
|
||||
Rule-Sets
|
||||
----------
|
||||
*********
|
||||
|
||||
A rule-set is a named collection of firewall rules that can be applied
|
||||
to an interface or zone. Each rule is numbered, has an action to apply
|
||||
@ -281,7 +285,7 @@ the action of the rule will executed.
|
||||
If you want to disable a rule but let it in the configuration.
|
||||
|
||||
Matching criteria
|
||||
*****************
|
||||
=================
|
||||
|
||||
There are a lot of matching criteria gainst which the package can be tested.
|
||||
|
||||
@ -413,8 +417,9 @@ There are a lot of matching criteria gainst which the package can be tested.
|
||||
Match against the state of a packet.
|
||||
|
||||
|
||||
***********************************
|
||||
Applying a Rule-Set to an Interface
|
||||
-----------------------------------
|
||||
***********************************
|
||||
|
||||
A Rule-Set can be appliend to every inteface:
|
||||
|
||||
@ -439,8 +444,9 @@ A Rule-Set can be appliend to every inteface:
|
||||
several interfaces. An interface can only have one rule-set per chain.
|
||||
|
||||
|
||||
**************************
|
||||
Zone-based Firewall Policy
|
||||
--------------------------
|
||||
**************************
|
||||
|
||||
As an alternative to applying policy to an interface directly, a
|
||||
zone-based firewall can be created to simplify configuration when
|
||||
@ -453,7 +459,7 @@ An basic introduction to zone-based firewalls can be found `here
|
||||
and an example at :ref:`examples-zone-policy`.
|
||||
|
||||
Define a Zone
|
||||
*************
|
||||
=============
|
||||
|
||||
To define a zone setup either one with interfaces or a local zone.
|
||||
|
||||
@ -477,7 +483,7 @@ To define a zone setup either one with interfaces or a local zone.
|
||||
|
||||
|
||||
Applying a Rule-Set to a Zone
|
||||
*****************************
|
||||
=============================
|
||||
|
||||
Before you are able to apply a rule-set to a zone you have to create the zones
|
||||
first.
|
||||
@ -496,11 +502,12 @@ first.
|
||||
set zone-policy zone LAN from DMZ firewall name DMZv4-to-LANv4
|
||||
|
||||
|
||||
***********************
|
||||
Operation-mode Firewall
|
||||
-----------------------
|
||||
***********************
|
||||
|
||||
Rule-set overview
|
||||
*****************
|
||||
=================
|
||||
|
||||
.. opcmd:: show firewall
|
||||
|
||||
@ -663,7 +670,7 @@ Rule-set overview
|
||||
|
||||
|
||||
Zone-Policy Overview
|
||||
********************
|
||||
====================
|
||||
|
||||
.. opcmd:: show zone-policy zone <name>
|
||||
|
||||
@ -684,7 +691,7 @@ Zone-Policy Overview
|
||||
|
||||
|
||||
Show Firewall log
|
||||
*****************
|
||||
=================
|
||||
|
||||
.. opcmd:: show log firewall [name | ipv6name] <name>
|
||||
|
||||
@ -698,7 +705,7 @@ Show Firewall log
|
||||
|
||||
|
||||
Example Partial Config
|
||||
----------------------
|
||||
======================
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
@ -770,9 +777,10 @@ Example Partial Config
|
||||
|
||||
.. _routing-mss-clamp:
|
||||
|
||||
################
|
||||
|
||||
****************
|
||||
TCP-MSS Clamping
|
||||
################
|
||||
****************
|
||||
|
||||
As Internet wide PMTU discovery rarely works, we sometimes need to clamp
|
||||
our TCP MSS value to a specific value. This is a field in the TCP
|
||||
@ -788,9 +796,11 @@ value for IPv4 and IPv6.
|
||||
in 1452 bytes on a 1492 byte MTU.
|
||||
|
||||
|
||||
|
||||
IPv4
|
||||
====
|
||||
|
||||
|
||||
.. cfgcmd:: set firewall options interface <interface> adjust-mss <number-of-bytes>
|
||||
|
||||
Use this command to set the maximum segment size for IPv4 transit
|
||||
@ -808,6 +818,8 @@ for your WireGuard `wg02` tunnel.
|
||||
set firewall options interface pppoe0 adjust-mss '1452'
|
||||
set firewall options interface wg02 adjust-mss '1372'
|
||||
|
||||
|
||||
|
||||
IPv6
|
||||
====
|
||||
|
||||
|
||||
@ -15,8 +15,9 @@ collection of all routes the router has learned from its configuration or from
|
||||
its dynamic routing protocols is stored in the RIB. Unicast routes are directly
|
||||
used to determine the forwarding table used for unicast packet forwarding.
|
||||
|
||||
*************
|
||||
Static Routes
|
||||
#############
|
||||
*************
|
||||
|
||||
.. cfgcmd:: set protocols static route <subnet> next-hop <address>
|
||||
|
||||
@ -152,8 +153,9 @@ provided by the Neighbor Discovery Protocol (NDP).
|
||||
To manipulate or display ARP_ table entries, the following commands are
|
||||
implemented.
|
||||
|
||||
*********
|
||||
Configure
|
||||
=========
|
||||
*********
|
||||
|
||||
.. cfgcmd:: set protocols static arp <address> hwaddr <mac>
|
||||
|
||||
@ -166,8 +168,11 @@ Configure
|
||||
|
||||
set protocols static arp 192.0.2.100 hwaddr 00:53:27:de:23:aa
|
||||
|
||||
|
||||
*********
|
||||
Operation
|
||||
=========
|
||||
*********
|
||||
|
||||
|
||||
.. opcmd:: show protocols static arp
|
||||
|
||||
|
||||
@ -22,7 +22,7 @@ System
|
||||
name-server
|
||||
name-servers-dhcp
|
||||
ntp
|
||||
options
|
||||
option
|
||||
proxy
|
||||
static-host-mapping
|
||||
sysctl
|
||||
@ -30,3 +30,11 @@ System
|
||||
task-scheduler
|
||||
time-zone
|
||||
wifi-requlatory-domain
|
||||
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
:includehidden:
|
||||
|
||||
default-route
|
||||
eventhandler
|
||||
|
||||
@ -12,4 +12,15 @@ VPN
|
||||
openconnect
|
||||
pptp
|
||||
rsa-keys
|
||||
sstp
|
||||
sstp
|
||||
|
||||
|
||||
|
||||
pages to sort
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
:includehidden:
|
||||
|
||||
dmvpn
|
||||
site2site_ipsec
|
||||
4
docs/configuration/vpn/rsa-keys.rst
Normal file
4
docs/configuration/vpn/rsa-keys.rst
Normal file
@ -0,0 +1,4 @@
|
||||
|
||||
########
|
||||
RSA-Keys
|
||||
########
|
||||
@ -261,7 +261,7 @@ Page content
|
||||
The documentation have 3 different types of pages, the same kind of pages must
|
||||
have the same structure to achieve a recognition factor.
|
||||
|
||||
For all *.rst files must follow the same TOC Level syntax and have to start with
|
||||
For all rst files must follow the same TOC Level syntax and have to start with
|
||||
|
||||
.. code-block::
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user