mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
configexamples: fix lint errors
This commit is contained in:
parent
2d11378b6a
commit
71c8077efb
@ -6,7 +6,9 @@ Route-Based Site-to-Site VPN to Azure (BGP over IKEv2/IPsec)
|
||||
This guide shows an example of a route-based IKEv2 site-to-site VPN to
|
||||
Azure using VTI and BGP for dynamic routing updates.
|
||||
|
||||
For redundant / active-active configurations see `Route-Based Redundant Site-to-Site VPN to Azure (BGP over IKEv2/IPsec) <https://docs.vyos.io/en/crux/appendix/examples/azure-vpn-dual-bgp.html>`_
|
||||
For redundant / active-active configurations see
|
||||
`Route-Based Redundant Site-to-Site VPN to Azure (BGP over IKEv2/IPsec)
|
||||
<https://docs.vyos.io/en/crux/appendix/examples/azure-vpn-dual-bgp.html>`_
|
||||
|
||||
Prerequisites
|
||||
^^^^^^^^^^^^^
|
||||
|
||||
@ -21,18 +21,18 @@ DHCP Server
|
||||
.. code-block:: none
|
||||
|
||||
set interfaces ethernet eth0 address '10.0.2.1/24'
|
||||
set interfaces loopback lo address '3.3.3.3/24'
|
||||
set interfaces loopback lo address '192.168.3.3/24'
|
||||
set interfaces tunnel tun100 address '172.16.0.2/30'
|
||||
set interfaces tunnel tun100 encapsulation 'gre-bridge'
|
||||
set interfaces tunnel tun100 local-ip '10.0.2.1'
|
||||
set interfaces tunnel tun100 remote-ip '192.168.0.1'
|
||||
set protocols ospf area 0 network '3.3.3.0/24'
|
||||
set protocols ospf area 0 network '192.168.3.0/24'
|
||||
set protocols ospf area 0 network '10.0.2.0/24'
|
||||
set protocols ospf parameters router-id '3.3.3.3'
|
||||
set protocols ospf parameters router-id '192.168.3.3'
|
||||
set protocols static interface-route 10.0.1.2/32 next-hop-interface tun100
|
||||
set service dhcp-server shared-network-name asdf authoritative
|
||||
set service dhcp-server shared-network-name asdf subnet 3.3.3.0/24 range 0 start '3.3.3.30'
|
||||
set service dhcp-server shared-network-name asdf subnet 3.3.3.0/24 range 0 stop '3.3.3.40'
|
||||
set service dhcp-server shared-network-name asdf subnet 192.168.3.0/24 range 0 start '192.168.3.30'
|
||||
set service dhcp-server shared-network-name asdf subnet 192.168.3.0/24 range 0 stop '192.168.3.40'
|
||||
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 default-router '10.0.1.2'
|
||||
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 range 0 start '10.0.1.200'
|
||||
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 range 0 stop '10.0.1.210'
|
||||
@ -61,17 +61,17 @@ DHCP Relay
|
||||
|
||||
set interfaces ethernet eth0 address '10.0.1.2/24'
|
||||
set interfaces ethernet eth1 address '192.168.0.1/24'
|
||||
set interfaces loopback lo address '1.1.1.1'
|
||||
set interfaces loopback lo address '10.100.100.1'
|
||||
set interfaces tunnel tun100 address '172.16.0.1/30'
|
||||
set interfaces tunnel tun100 encapsulation 'gre-bridge'
|
||||
set interfaces tunnel tun100 local-ip '192.168.0.1'
|
||||
set interfaces tunnel tun100 remote-ip '10.0.2.1'
|
||||
set protocols ospf area 0 network '10.0.1.0/24'
|
||||
set protocols ospf area 0 network '192.168.0.0/24'
|
||||
set protocols ospf area 0 network '1.1.1.0/24'
|
||||
set protocols ospf parameters router-id '1.1.1.1'
|
||||
set protocols static interface-route 3.3.3.3/32 next-hop-interface tun100
|
||||
set protocols ospf area 0 network '10.100.100.0/24'
|
||||
set protocols ospf parameters router-id '10.100.100.1'
|
||||
set protocols static interface-route 192.168.3.3/32 next-hop-interface tun100
|
||||
set service dhcp-relay interface 'eth0'
|
||||
set service dhcp-relay interface 'tun100'
|
||||
set service dhcp-relay server '3.3.3.3'
|
||||
set service dhcp-relay server '192.168.3.3'
|
||||
|
||||
|
||||
@ -1,5 +1,7 @@
|
||||
.. _examples-tunnelbroker-ipv6:
|
||||
|
||||
.. stop_vyoslinter
|
||||
|
||||
#######################
|
||||
Tunnelbroker.net (IPv6)
|
||||
#######################
|
||||
@ -110,7 +112,9 @@ should be replaced with the information from your `Routed /64` tunnel):
|
||||
set service router-advert interface eth1 name-server '2001:4860:4860::8844'
|
||||
set service router-advert interface eth1 prefix 2001:470:xxxx:xxxx::/64
|
||||
|
||||
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default, 'valid-lifetime' and 'preferred-lifetime' are set to default values of 30 days and 4 hours respectively.
|
||||
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
|
||||
'valid-lifetime' and 'preferred-lifetime' are set to default values of
|
||||
30 days and 4 hours respectively.
|
||||
|
||||
This accomplishes a few things:
|
||||
|
||||
@ -155,7 +159,9 @@ So, when your LAN is eth1, your DMZ is eth2, your cameras live on eth3, etc:
|
||||
set service router-advert interface eth3 name-server '2001:4860:4860::8844'
|
||||
set service router-advert interface eth3 prefix 2001:470:xxxx:3::/64
|
||||
|
||||
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default, 'valid-lifetime' and 'preferred-lifetime' are set to default values of 30 days and 4 hours respectively.
|
||||
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
|
||||
'valid-lifetime' and 'preferred-lifetime' are set to default values of
|
||||
30 days and 4 hours respectively.
|
||||
|
||||
Firewall
|
||||
========
|
||||
@ -167,3 +173,6 @@ NAME`.
|
||||
Similarly, to attach the firewall, you would use `set interfaces ethernet eth0
|
||||
firewall in ipv6-name` or `set zone-policy zone LOCAL from WAN firewall
|
||||
ipv6-name`.
|
||||
|
||||
|
||||
.. start_vyoslinter
|
||||
|
||||
@ -1,5 +1,7 @@
|
||||
.. _wan-load-balancing:
|
||||
|
||||
.. stop_vyoslinter # pictures and text have to change
|
||||
|
||||
WAN Load Balancer examples
|
||||
==========================
|
||||
|
||||
@ -168,3 +170,5 @@ eth+ is used as an alias that refers to all ethernet interfaces:
|
||||
set load-balancing wan rule 5 exclude
|
||||
set load-balancing wan rule 5 inbound-interface eth+
|
||||
set load-balancing wan rule 5 destination address 10.0.0.0/8
|
||||
|
||||
.. start_vyoslinter
|
||||
Loading…
x
Reference in New Issue
Block a user