mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
Merge branch 'vyos:master' into patch-2
This commit is contained in:
commit
80c25fa38b
@ -1 +1 @@
|
|||||||
Subproject commit 22e3558834784a8ca37f6335c15c58a631a7fe10
|
Subproject commit b675c8b6187c4b77759e3f96c9c92dd382dabeae
|
||||||
@ -19,7 +19,7 @@ VyOS support three types of config sources.
|
|||||||
|
|
||||||
* Metadata - Metadata is sourced by the cloud platform or hypervisor.
|
* Metadata - Metadata is sourced by the cloud platform or hypervisor.
|
||||||
In some clouds, there is implemented as an HTTP endpoint at
|
In some clouds, there is implemented as an HTTP endpoint at
|
||||||
```http://169.254.169.254```.
|
``http://169.254.169.254``.
|
||||||
* Network configuration - This config source informs the system about the
|
* Network configuration - This config source informs the system about the
|
||||||
network settings like IP addresses, routes, DNS. Available only in several
|
network settings like IP addresses, routes, DNS. Available only in several
|
||||||
cloud and virtualization platforms.
|
cloud and virtualization platforms.
|
||||||
@ -44,13 +44,14 @@ described below.
|
|||||||
Cloud-config modules
|
Cloud-config modules
|
||||||
********************
|
********************
|
||||||
|
|
||||||
In VyOS, by default, enabled only two modules:
|
In VyOS, by default, enables only two modules:
|
||||||
|
|
||||||
* ``write_files`` - this module allows to insert any files into the filesystem
|
* ``write_files`` - this module allows to insert any files into the filesystem
|
||||||
before the first boot, for example, pre-generated encryption keys,
|
before the first boot, for example, pre-generated encryption keys,
|
||||||
certificates, or even a whole ``config.boot`` file.
|
certificates, or even a whole ``config.boot`` file.
|
||||||
* ``vyos_userdata`` - the module accepts a list of CLI configuration commands in
|
* ``vyos_userdata`` - the module accepts a list of CLI configuration commands in
|
||||||
a ``vyos_config_commands`` section, which gives an easy way to configure the
|
a ``vyos_config_commands`` section, which gives an easy way to configure the
|
||||||
|
|
||||||
system during deployment.
|
system during deployment.
|
||||||
|
|
||||||
************************
|
************************
|
||||||
@ -169,6 +170,51 @@ obtained from the EC2 metadata service.
|
|||||||
commit
|
commit
|
||||||
exit
|
exit
|
||||||
|
|
||||||
|
*******
|
||||||
|
NoCloud
|
||||||
|
*******
|
||||||
|
|
||||||
|
Injecting configuration data is not limited to cloud platforms. Users can
|
||||||
|
employ the NoCloud data source to inject user-data and meta-data on
|
||||||
|
virtualization platforms such as VMware, Hyper-V and KVM.
|
||||||
|
|
||||||
|
While other methods exist, the most straightforward method for using the
|
||||||
|
NoCloud data source is creating a seed ISO and attaching it to the virtual
|
||||||
|
machine as a CD drive. The volume must be formatted as a vfat or ISO 9660
|
||||||
|
file system with the label "cidata" or "CIDATA".
|
||||||
|
|
||||||
|
Create text files named user-data and meta-data. On linux-based systems,
|
||||||
|
the mkisofs utility can be used to create the seed ISO. The following
|
||||||
|
syntax will add these files to the ISO 9660 file system.
|
||||||
|
|
||||||
|
.. code-block:: none
|
||||||
|
|
||||||
|
mkisofs -joliet -rock -volid "cidata" -output seed.iso meta-data user-data
|
||||||
|
|
||||||
|
The seed.iso file can be attached to the virtual machine. As an example,
|
||||||
|
the method with KVM to attach the ISO as a CD drive follows.
|
||||||
|
|
||||||
|
.. code-block:: none
|
||||||
|
|
||||||
|
$ virt-install -n vyos_r1 \
|
||||||
|
--ram 4096 \
|
||||||
|
--vcpus 2 \
|
||||||
|
--cdrom seed.iso \
|
||||||
|
--os-type linux \
|
||||||
|
--os-variant debian10 \
|
||||||
|
--network network=default \
|
||||||
|
--graphics vnc \
|
||||||
|
--hvm \
|
||||||
|
--virt-type kvm \
|
||||||
|
--disk path=/var/lib/libvirt/images/vyos_kvm.qcow2,bus=virtio \
|
||||||
|
--import \
|
||||||
|
--noautoconsole
|
||||||
|
|
||||||
|
|
||||||
|
For more information on the NoCloud data source, visit its
|
||||||
|
`page <https://cloudinit.readthedocs.io/en/latest/topics/datasources/nocloud.html>`_
|
||||||
|
in the cloud-init documentation.
|
||||||
|
|
||||||
***************
|
***************
|
||||||
Troubleshooting
|
Troubleshooting
|
||||||
***************
|
***************
|
||||||
|
|||||||
@ -8,6 +8,37 @@
|
|||||||
_ext/releasenotes.py
|
_ext/releasenotes.py
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-28
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3999` (bug): show lldp neighbor Traceback error
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-26
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T4019` (bug): Smoketests for SSTP and openconnect fails
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-25
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T4005` (feature): Feature Request: IPsec IKEv1 + IKEv2 for one peer
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-24
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T4015` (feature): Update Accel-PPP to a newer revision
|
||||||
|
* :vytask:`T1083` (feature): Implement persistent/random address and port mapping options for NAT rules
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-23
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3990` (bug): WATCHFRR: crashlog and per-thread log buffering unavailable (due to files left behind in /var/tmp/frr/ after reboot)
|
||||||
|
|
||||||
|
|
||||||
2021-11-20
|
2021-11-20
|
||||||
==========
|
==========
|
||||||
|
|
||||||
@ -1141,7 +1172,7 @@
|
|||||||
2021-02-16
|
2021-02-16
|
||||||
==========
|
==========
|
||||||
|
|
||||||
* :vytask:`T3318` (feature): Update Linux Kernel to v5.4.160 / 5.10.80
|
* :vytask:`T3318` (feature): Update Linux Kernel to v5.4.162 / 5.10.82
|
||||||
|
|
||||||
|
|
||||||
2021-02-14
|
2021-02-14
|
||||||
|
|||||||
@ -8,6 +8,47 @@
|
|||||||
_ext/releasenotes.py
|
_ext/releasenotes.py
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-28
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3999` (bug): show lldp neighbor Traceback error
|
||||||
|
* :vytask:`T3928` (feature): Add OSPFv3 VRF support
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-27
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3755` (feature): ospf: adjust to new FRR 8 syntax where "no passive-interface " moved to interface section
|
||||||
|
* :vytask:`T3753` (feature): frr: upgrade to stable/8.1 release train
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-26
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3978` (bug): containers add network without declaring prefix raise ConfigError
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-25
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T4006` (default): Add additional Linux capabilities to container configuration
|
||||||
|
* :vytask:`T3986` (bug): Incorrect description for vpn ipsec site-to-site authentication and connection
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-24
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T4015` (feature): Update Accel-PPP to a newer revision
|
||||||
|
* :vytask:`T3865` (bug): loadkey command help text missing escape sequence
|
||||||
|
* :vytask:`T1083` (feature): Implement persistent/random address and port mapping options for NAT rules
|
||||||
|
|
||||||
|
|
||||||
|
2021-11-23
|
||||||
|
==========
|
||||||
|
|
||||||
|
* :vytask:`T3990` (bug): WATCHFRR: crashlog and per-thread log buffering unavailable (due to files left behind in /var/tmp/frr/ after reboot)
|
||||||
|
|
||||||
|
|
||||||
2021-11-20
|
2021-11-20
|
||||||
==========
|
==========
|
||||||
|
|
||||||
@ -1290,7 +1331,7 @@
|
|||||||
==========
|
==========
|
||||||
|
|
||||||
* :vytask:`T3313` (bug): ospfv3 interface missing options
|
* :vytask:`T3313` (bug): ospfv3 interface missing options
|
||||||
* :vytask:`T3318` (feature): Update Linux Kernel to v5.4.160 / 5.10.80
|
* :vytask:`T3318` (feature): Update Linux Kernel to v5.4.162 / 5.10.82
|
||||||
|
|
||||||
|
|
||||||
2021-02-15
|
2021-02-15
|
||||||
|
|||||||
105
docs/cli.rst
105
docs/cli.rst
@ -228,6 +228,111 @@ special way on how to :ref:`run_opmode_from_config_mode`.
|
|||||||
|
|
||||||
.. _`forum`: https://forum.vyos.io
|
.. _`forum`: https://forum.vyos.io
|
||||||
|
|
||||||
|
.. opcmd:: show configuration json
|
||||||
|
|
||||||
|
View the current active configuration in JSON format.
|
||||||
|
|
||||||
|
.. code-block:: none
|
||||||
|
|
||||||
|
{"interfaces": {"ethernet": {"eth0": {"address": ["192.0.2.11/24", "192.0.2.35/24"], "hw-id": "52:54:00:48:a0:c6"}, "eth1": {"address": ["203.0.113.1/24"], "hw-id": "52:54:00:fc:50:0b"}}, "loopback": {"lo": {}}}, "protocols": {"static": {"route": {"0.0.0.0/0": {"next-hop": {"192.0.2.254": {}}}}}}, "service": {"ssh": {"disable-host-validation": {}}}, "system": {"config-management": {"commit-revisions": "100"}, "console": {"device": {"ttyS0": {"speed": "115200"}}}, "host-name": "r11-vyos", "login": {"user": {"vyos": {"authentication": {"encrypted-password": "$6$Vt68...F0", "plaintext-password": "", "public-keys": {"vyos@vyos": {"key": "AAAAxxx=", "type": "ssh-rsa"}}}}}}, "name-server": ["203.0.113.254"], "ntp": {"server": {"time1.vyos.net": {}, "time2.vyos.net": {}, "time3.vyos.net": {}}}, "syslog": {"global": {"facility": {"all": {"level": "info"}, "protocols": {"level": "debug"}}}}, "time-zone": "America/New_York"}}
|
||||||
|
|
||||||
|
.. opcmd:: show configuration json pretty
|
||||||
|
|
||||||
|
View the current active configuration in readable JSON format.
|
||||||
|
|
||||||
|
.. code-block:: none
|
||||||
|
|
||||||
|
{
|
||||||
|
"interfaces": {
|
||||||
|
"ethernet": {
|
||||||
|
"eth0": {
|
||||||
|
"address": [
|
||||||
|
"192.0.2.11/24",
|
||||||
|
"192.0.2.35/24"
|
||||||
|
],
|
||||||
|
"hw-id": "52:54:00:48:a0:c6"
|
||||||
|
},
|
||||||
|
"eth1": {
|
||||||
|
"address": [
|
||||||
|
"203.0.113.1/24"
|
||||||
|
],
|
||||||
|
"hw-id": "52:54:00:fc:50:0b"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"loopback": {
|
||||||
|
"lo": {}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"protocols": {
|
||||||
|
"static": {
|
||||||
|
"route": {
|
||||||
|
"0.0.0.0/0": {
|
||||||
|
"next-hop": {
|
||||||
|
"192.0.2.254": {}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"service": {
|
||||||
|
"ssh": {
|
||||||
|
"disable-host-validation": {}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"system": {
|
||||||
|
"config-management": {
|
||||||
|
"commit-revisions": "100"
|
||||||
|
},
|
||||||
|
"console": {
|
||||||
|
"device": {
|
||||||
|
"ttyS0": {
|
||||||
|
"speed": "115200"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"host-name": "r11-vyos",
|
||||||
|
"login": {
|
||||||
|
"user": {
|
||||||
|
"vyos": {
|
||||||
|
"authentication": {
|
||||||
|
"encrypted-password": "$6$Vt68...F0",
|
||||||
|
"plaintext-password": "",
|
||||||
|
"public-keys": {
|
||||||
|
"vyos@vyos": {
|
||||||
|
"key": "AAAAxxx=",
|
||||||
|
"type": "ssh-rsa"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"name-server": [
|
||||||
|
"203.0.113.254"
|
||||||
|
],
|
||||||
|
"ntp": {
|
||||||
|
"server": {
|
||||||
|
"time1.vyos.net": {},
|
||||||
|
"time2.vyos.net": {},
|
||||||
|
"time3.vyos.net": {}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"syslog": {
|
||||||
|
"global": {
|
||||||
|
"facility": {
|
||||||
|
"all": {
|
||||||
|
"level": "info"
|
||||||
|
},
|
||||||
|
"protocols": {
|
||||||
|
"level": "debug"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"time-zone": "America/New_York"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
The config mode
|
The config mode
|
||||||
---------------
|
---------------
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@ -3,8 +3,8 @@ Wireguard
|
|||||||
#########
|
#########
|
||||||
|
|
||||||
|
|
||||||
| Testdate: 2021-11-23
|
| Testdate: 2021-11-30
|
||||||
| Version: 1.4-rolling-202106170808
|
| Version: 1.4-rolling-202104132216
|
||||||
|
|
||||||
|
|
||||||
This simple structure show how to connect two offices. One remote branch and the
|
This simple structure show how to connect two offices. One remote branch and the
|
||||||
@ -46,7 +46,7 @@ After this, the public key can be displayed, to save for later.
|
|||||||
|
|
||||||
vyos@central:~$ generate wireguard default-keypair
|
vyos@central:~$ generate wireguard default-keypair
|
||||||
vyos@central:~$ show wireguard keypairs pubkey default
|
vyos@central:~$ show wireguard keypairs pubkey default
|
||||||
+mLLOGxR37k3EsWba7+G7vIDq6yW4t0s549rNVShWy4=
|
P9y9TTRzIOVl27Ij9n/BXjZUdQFADZ5WnHV0kQr1ulQ=
|
||||||
|
|
||||||
|
|
||||||
After you have each public key. The wireguard interfaces can be setup.
|
After you have each public key. The wireguard interfaces can be setup.
|
||||||
@ -65,6 +65,20 @@ Branch
|
|||||||
:lines: 4-11
|
:lines: 4-11
|
||||||
|
|
||||||
|
|
||||||
|
To reach the network, a route must be set on each VyOS host.
|
||||||
|
In this structure, a static interface route will fit the requirements.
|
||||||
|
|
||||||
|
Central
|
||||||
|
|
||||||
|
.. literalinclude:: _include/central.conf
|
||||||
|
:language: none
|
||||||
|
:lines: 13
|
||||||
|
|
||||||
|
Branch
|
||||||
|
|
||||||
|
.. literalinclude:: _include/branch.conf
|
||||||
|
:language: none
|
||||||
|
:lines: 13
|
||||||
|
|
||||||
*********************
|
*********************
|
||||||
Testing and debugging
|
Testing and debugging
|
||||||
@ -88,11 +102,11 @@ And ping the Branch PC from your central router to check the response.
|
|||||||
|
|
||||||
vyos@central:~$ ping 10.0.2.100 count 4
|
vyos@central:~$ ping 10.0.2.100 count 4
|
||||||
PING 10.0.2.100 (10.0.2.100) 56(84) bytes of data.
|
PING 10.0.2.100 (10.0.2.100) 56(84) bytes of data.
|
||||||
64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.609 ms
|
64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.526 ms
|
||||||
64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=0.871 ms
|
64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=0.583 ms
|
||||||
64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=0.937 ms
|
64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=0.873 ms
|
||||||
64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=0.746 ms
|
64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=0.753 ms
|
||||||
|
|
||||||
--- 10.0.2.100 ping statistics ---
|
--- 10.0.2.100 ping statistics ---
|
||||||
4 packets transmitted, 4 received, 0% packet loss, time 4ms
|
4 packets transmitted, 4 received, 0% packet loss, time 48ms
|
||||||
rtt min/avg/max/mdev = 0.609/0.790/0.937/0.130 ms
|
rtt min/avg/max/mdev = 0.526/0.683/0.873/0.141 ms
|
||||||
|
|||||||
@ -7,7 +7,7 @@ set interfaces wireguard wg01 peer central allowed-ips 10.0.1.0/24
|
|||||||
set interfaces wireguard wg01 peer central allowed-ips 192.168.0.0/24
|
set interfaces wireguard wg01 peer central allowed-ips 192.168.0.0/24
|
||||||
set interfaces wireguard wg01 peer central address 198.51.100.1
|
set interfaces wireguard wg01 peer central address 198.51.100.1
|
||||||
set interfaces wireguard wg01 peer central port 51820
|
set interfaces wireguard wg01 peer central port 51820
|
||||||
set interfaces wireguard wg01 peer central pubkey "+mLLOGxR37k3EsWba7+G7vIDq6yW4t0s549rNVShWy4="
|
set interfaces wireguard wg01 peer central pubkey "P9y9TTRzIOVl27Ij9n/BXjZUdQFADZ5WnHV0kQr1ulQ="
|
||||||
set interfaces wireguard wg01 port 51820
|
set interfaces wireguard wg01 port 51820
|
||||||
|
|
||||||
set protocols static route 10.0.1.0/24 interface wg01
|
set protocols static route 10.0.1.0/24 interface wg01
|
||||||
@ -7,7 +7,7 @@ set interfaces wireguard wg01 peer branch allowed-ips 10.0.2.0/24
|
|||||||
set interfaces wireguard wg01 peer branch allowed-ips 192.168.0.0/24
|
set interfaces wireguard wg01 peer branch allowed-ips 192.168.0.0/24
|
||||||
set interfaces wireguard wg01 peer branch address 198.51.100.2
|
set interfaces wireguard wg01 peer branch address 198.51.100.2
|
||||||
set interfaces wireguard wg01 peer branch port 51820
|
set interfaces wireguard wg01 peer branch port 51820
|
||||||
set interfaces wireguard wg01 peer branch pubkey "HF1LJSEgAtknAtkqK2d12DzfuPlx475Y+I4SpJiBWzs="
|
set interfaces wireguard wg01 peer branch pubkey "iUUItk5zA22azMltN+Kpp7Bh4g2mf1ea3liSEp9eQEs="
|
||||||
set interfaces wireguard wg01 port 51820
|
set interfaces wireguard wg01 port 51820
|
||||||
|
|
||||||
set protocols static route 10.0.2.0/24 interface wg01
|
set protocols static route 10.0.2.0/24 interface wg01
|
||||||
@ -37,12 +37,12 @@ starts when the first ospf enabled interface is configured.
|
|||||||
This command is also used to enable the OSPF process. The area number can be
|
This command is also used to enable the OSPF process. The area number can be
|
||||||
specified in decimal notation in the range from 0 to 4294967295. Or it
|
specified in decimal notation in the range from 0 to 4294967295. Or it
|
||||||
can be specified in dotted decimal notation similar to ip address.
|
can be specified in dotted decimal notation similar to ip address.
|
||||||
|
|
||||||
Prefix length in interface must be equal or bigger (i.e. smaller network) than
|
Prefix length in interface must be equal or bigger (i.e. smaller network) than
|
||||||
prefix length in network statement. For example statement above doesn't enable
|
prefix length in network statement. For example statement above doesn't enable
|
||||||
ospf on interface with address 192.168.1.1/23, but it does on interface with
|
ospf on interface with address 192.168.1.1/23, but it does on interface with
|
||||||
address 192.168.1.129/25.
|
address 192.168.1.129/25.
|
||||||
|
|
||||||
In some cases it may be more convenient to enable OSPF on a per interface/subnet
|
In some cases it may be more convenient to enable OSPF on a per interface/subnet
|
||||||
basis :cfgcmd:`set protocols ospf interface <interface> area <x.x.x.x | x>`
|
basis :cfgcmd:`set protocols ospf interface <interface> area <x.x.x.x | x>`
|
||||||
|
|
||||||
@ -145,12 +145,16 @@ Optional
|
|||||||
|
|
||||||
This command should NOT be set normally.
|
This command should NOT be set normally.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospf passive-interface <interface>
|
.. cfgcmd:: set protocols ospf interface <interface> passive [disable]
|
||||||
|
|
||||||
This command specifies interface as passive. Passive interface advertises
|
This command specifies interface as passive. Passive interface advertises
|
||||||
its address, but does not run the OSPF protocol (adjacencies are not formed
|
its address, but does not run the OSPF protocol (adjacencies are not formed
|
||||||
and hello packets are not generated).
|
and hello packets are not generated).
|
||||||
|
|
||||||
|
The optional `disable` option allows to exclude interface from passive state.
|
||||||
|
This command is used if the command :cfgcmd:`passive-interface default` was
|
||||||
|
configured.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospf passive-interface default
|
.. cfgcmd:: set protocols ospf passive-interface default
|
||||||
|
|
||||||
This command specifies all interfaces as passive by default. Because this
|
This command specifies all interfaces as passive by default. Because this
|
||||||
@ -158,11 +162,6 @@ Optional
|
|||||||
interfaces where router adjacencies are expected need to be configured
|
interfaces where router adjacencies are expected need to be configured
|
||||||
with the :cfgcmd:`passive-interface-exclude` command.
|
with the :cfgcmd:`passive-interface-exclude` command.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospf passive-interface-exclude <interface>
|
|
||||||
|
|
||||||
This command allows exclude interface from passive state. This command is
|
|
||||||
used if the command :cfgcmd:`passive-interface default` was configured.
|
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospf refresh timers <seconds>
|
.. cfgcmd:: set protocols ospf refresh timers <seconds>
|
||||||
|
|
||||||
The router automatically updates link-state information with its neighbors.
|
The router automatically updates link-state information with its neighbors.
|
||||||
@ -549,12 +548,12 @@ Operational Mode Commands
|
|||||||
This command displays the neighbors information in a detailed form for a
|
This command displays the neighbors information in a detailed form for a
|
||||||
neighbor whose IP address is specified.
|
neighbor whose IP address is specified.
|
||||||
|
|
||||||
.. opcmd:: show ip ospf neighbor <intname>
|
.. opcmd:: show ip ospf neighbor <interface>
|
||||||
|
|
||||||
This command displays the neighbors status for a neighbor on the specified
|
This command displays the neighbors status for a neighbor on the specified
|
||||||
interface.
|
interface.
|
||||||
|
|
||||||
.. opcmd:: show ip ospf interface [<intname>]
|
.. opcmd:: show ip ospf interface [<interface>]
|
||||||
|
|
||||||
This command displays state and configuration of OSPF the specified
|
This command displays state and configuration of OSPF the specified
|
||||||
interface, or all interfaces if no interface is given.
|
interface, or all interfaces if no interface is given.
|
||||||
@ -754,6 +753,8 @@ address and the node 1 sending the default route:
|
|||||||
set policy route-map CONNECT rule 10 match interface lo
|
set policy route-map CONNECT rule 10 match interface lo
|
||||||
|
|
||||||
|
|
||||||
|
.. _routing-ospfv3:
|
||||||
|
|
||||||
*************
|
*************
|
||||||
OSPFv3 (IPv6)
|
OSPFv3 (IPv6)
|
||||||
*************
|
*************
|
||||||
@ -826,20 +827,20 @@ Area Configuration
|
|||||||
Interface Configuration
|
Interface Configuration
|
||||||
-----------------------
|
-----------------------
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> ipv6 cost <number>
|
.. cfgcmd:: set protocols ospfv3 interface <interface> ipv6 cost <number>
|
||||||
|
|
||||||
This command sets link cost for the specified interface. The cost value is
|
This command sets link cost for the specified interface. The cost value is
|
||||||
set to router-LSA’s metric field and used for SPF calculation. The cost
|
set to router-LSA’s metric field and used for SPF calculation. The cost
|
||||||
range is 1 to 65535.
|
range is 1 to 65535.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> dead-interval <number>
|
.. cfgcmd:: set protocols ospfv3 interface <interface> dead-interval <number>
|
||||||
|
|
||||||
Set number of seconds for router Dead Interval timer value used for Wait
|
Set number of seconds for router Dead Interval timer value used for Wait
|
||||||
Timer and Inactivity Timer. This value must be the same for all routers
|
Timer and Inactivity Timer. This value must be the same for all routers
|
||||||
attached to a common network. The default value is 40 seconds. The
|
attached to a common network. The default value is 40 seconds. The
|
||||||
interval range is 1 to 65535.
|
interval range is 1 to 65535.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> hello-interval
|
.. cfgcmd:: set protocols ospfv3 interface <interface> hello-interval
|
||||||
<number>
|
<number>
|
||||||
|
|
||||||
Set number of seconds for Hello Interval timer value. Setting this value,
|
Set number of seconds for Hello Interval timer value. Setting this value,
|
||||||
@ -848,14 +849,14 @@ Interface Configuration
|
|||||||
common network. The default value is 10 seconds. The interval range is 1
|
common network. The default value is 10 seconds. The interval range is 1
|
||||||
to 65535.
|
to 65535.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> mtu-ignore
|
.. cfgcmd:: set protocols ospfv3 interface <interface> mtu-ignore
|
||||||
|
|
||||||
This command disables check of the MTU value in the OSPF DBD packets.
|
This command disables check of the MTU value in the OSPF DBD packets.
|
||||||
Thus, use of this command allows the OSPF adjacency to reach the FULL
|
Thus, use of this command allows the OSPF adjacency to reach the FULL
|
||||||
state even though there is an interface MTU mismatch between two OSPF
|
state even though there is an interface MTU mismatch between two OSPF
|
||||||
routers.
|
routers.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> network <type>
|
.. cfgcmd:: set protocols ospfv3 interface <interface> network <type>
|
||||||
|
|
||||||
This command allows to specify the distribution type for the network
|
This command allows to specify the distribution type for the network
|
||||||
connected to this interface:
|
connected to this interface:
|
||||||
@ -863,20 +864,20 @@ Interface Configuration
|
|||||||
**broadcast** – broadcast IP addresses distribution.
|
**broadcast** – broadcast IP addresses distribution.
|
||||||
**point-to-point** – address distribution in point-to-point networks.
|
**point-to-point** – address distribution in point-to-point networks.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> priority <number>
|
.. cfgcmd:: set protocols ospfv3 interface <interface> priority <number>
|
||||||
|
|
||||||
This command sets Router Priority integer value. The router with the
|
This command sets Router Priority integer value. The router with the
|
||||||
highest priority will be more eligible to become Designated Router.
|
highest priority will be more eligible to become Designated Router.
|
||||||
Setting the value to 0, makes the router ineligible to become Designated
|
Setting the value to 0, makes the router ineligible to become Designated
|
||||||
Router. The default value is 1. The interval range is 0 to 255.
|
Router. The default value is 1. The interval range is 0 to 255.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> passive
|
.. cfgcmd:: set protocols ospfv3 interface <interface> passive
|
||||||
|
|
||||||
This command specifies interface as passive. Passive interface advertises
|
This command specifies interface as passive. Passive interface advertises
|
||||||
its address, but does not run the OSPF protocol (adjacencies are not formed
|
its address, but does not run the OSPF protocol (adjacencies are not formed
|
||||||
and hello packets are not generated).
|
and hello packets are not generated).
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> retransmit-interval
|
.. cfgcmd:: set protocols ospfv3 interface <interface> retransmit-interval
|
||||||
<number>
|
<number>
|
||||||
|
|
||||||
This command sets number of seconds for RxmtInterval timer value. This
|
This command sets number of seconds for RxmtInterval timer value. This
|
||||||
@ -884,7 +885,7 @@ Interface Configuration
|
|||||||
Request packets if acknowledge was not received. The default value is 5
|
Request packets if acknowledge was not received. The default value is 5
|
||||||
seconds. The interval range is 3 to 65535.
|
seconds. The interval range is 3 to 65535.
|
||||||
|
|
||||||
.. cfgcmd:: set protocols ospfv3 interface <intname> transmit-delay
|
.. cfgcmd:: set protocols ospfv3 interface <interface> transmit-delay
|
||||||
<number>
|
<number>
|
||||||
|
|
||||||
This command sets number of seconds for InfTransDelay value. It allows to
|
This command sets number of seconds for InfTransDelay value. It allows to
|
||||||
@ -927,7 +928,7 @@ Operational Mode Commands
|
|||||||
|
|
||||||
This command displays the neighbor DR choice information.
|
This command displays the neighbor DR choice information.
|
||||||
|
|
||||||
.. opcmd:: show ipv6 ospfv3 interface [prefix]|[<intname> [prefix]]
|
.. opcmd:: show ipv6 ospfv3 interface [prefix]|[<interface> [prefix]]
|
||||||
|
|
||||||
This command displays state and configuration of OSPF the specified
|
This command displays state and configuration of OSPF the specified
|
||||||
interface, or all interfaces if no interface is given. Whith the argument
|
interface, or all interfaces if no interface is given. Whith the argument
|
||||||
|
|||||||
@ -28,6 +28,14 @@ Configure the IPv4 or IPv6 listen address of the TFTP server. Multiple IPv4 and
|
|||||||
IPv6 addresses can be given. There will be one TFTP server instances listening
|
IPv6 addresses can be given. There will be one TFTP server instances listening
|
||||||
on each IP address.
|
on each IP address.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service tftp-server listen-address <address> vrf <name>
|
||||||
|
|
||||||
|
.. stop_vyoslinter
|
||||||
|
|
||||||
|
Additional option to run TFTP server in the :abbr:`VRF (Virtual Routing and Forwarding)` context
|
||||||
|
|
||||||
|
.. start_vyoslinter
|
||||||
|
|
||||||
.. note:: Configuring a listen-address is essential for the service to work.
|
.. note:: Configuring a listen-address is essential for the service to work.
|
||||||
|
|
||||||
.. cfgcmd:: set service tftp-server allow-upload
|
.. cfgcmd:: set service tftp-server allow-upload
|
||||||
|
|||||||
@ -29,6 +29,88 @@ for the cipher and hash. Adjust this as necessary.
|
|||||||
.. NOTE:: VMware users should ensure that a VMXNET3 adapter is used. E1000
|
.. NOTE:: VMware users should ensure that a VMXNET3 adapter is used. E1000
|
||||||
adapters have known issues with GRE processing.
|
adapters have known issues with GRE processing.
|
||||||
|
|
||||||
|
**************************************
|
||||||
|
IKE (Internet Key Exchange) Attributes
|
||||||
|
**************************************
|
||||||
|
IKE performs mutual authentication between two parties and establishes
|
||||||
|
an IKE security association (SA) that includes shared secret information
|
||||||
|
that can be used to efficiently establish SAs for Encapsulating Security
|
||||||
|
Payload (ESP) or Authentication Header (AH) and a set of cryptographic
|
||||||
|
algorithms to be used by the SAs to protect the traffic that they carry.
|
||||||
|
https://datatracker.ietf.org/doc/html/rfc5996
|
||||||
|
|
||||||
|
In VyOS, IKE attributes are specified through IKE groups.
|
||||||
|
Multiple proposals can be specified in a single group.
|
||||||
|
|
||||||
|
VyOS IKE group has the next options:
|
||||||
|
|
||||||
|
* ``close-action`` defines the action to take if the remote peer unexpectedly
|
||||||
|
closes a CHILD_SA:
|
||||||
|
|
||||||
|
* ``none`` set action to none (default);
|
||||||
|
|
||||||
|
* ``hold`` set action to hold;
|
||||||
|
|
||||||
|
* ``clear`` set action to clear;
|
||||||
|
|
||||||
|
* ``restart`` set action to restart;
|
||||||
|
|
||||||
|
* ``dead-peer-detection`` controls the use of the Dead Peer Detection protocol
|
||||||
|
(DPD, RFC 3706) where R_U_THERE notification messages (IKEv1) or empty
|
||||||
|
INFORMATIONAL messages (IKEv2) are periodically sent in order to check the
|
||||||
|
liveliness of the IPsec peer:
|
||||||
|
|
||||||
|
* ``action`` keep-alive failure action:
|
||||||
|
|
||||||
|
* ``hold`` set action to hold (default)
|
||||||
|
|
||||||
|
* ``clear`` set action to clear;
|
||||||
|
|
||||||
|
* ``restart`` set action to restart;
|
||||||
|
|
||||||
|
* ``interval`` keep-alive interval in seconds <2-86400> (default 30);
|
||||||
|
|
||||||
|
* ``timeout`` keep-alive timeout in seconds <2-86400> (default 120) IKEv1 only
|
||||||
|
|
||||||
|
* ``ikev2-reauth`` whether rekeying of an IKE_SA should also reauthenticate
|
||||||
|
the peer. In IKEv1, reauthentication is always done:
|
||||||
|
|
||||||
|
* ``yes`` enable remote host re-authentication during an IKE rekey;
|
||||||
|
|
||||||
|
* ``no`` disable remote host re-authenticaton during an IKE rekey;
|
||||||
|
|
||||||
|
* ``key-exchange`` which protocol should be used to initialize the connection
|
||||||
|
If not set both protocols are handled and connections will use IKEv2 when
|
||||||
|
initiating, but accept any protocol version when responding:
|
||||||
|
|
||||||
|
* ``ikev1`` use IKEv1 for Key Exchange;
|
||||||
|
|
||||||
|
* ``ikev2`` use IKEv2 for Key Exchange;
|
||||||
|
|
||||||
|
* ``lifetime`` IKE lifetime in seconds <30-86400> (default 28800);
|
||||||
|
|
||||||
|
* ``mobike`` enable MOBIKE Support. MOBIKE is only available for IKEv2:
|
||||||
|
|
||||||
|
* ``enable`` enable MOBIKE (default for IKEv2);
|
||||||
|
|
||||||
|
* ``disable`` disable MOBIKE;
|
||||||
|
|
||||||
|
* ``mode`` IKEv1 Phase 1 Mode Selection:
|
||||||
|
|
||||||
|
* ``main`` use Main mode for Key Exchanges in the IKEv1 Protocol
|
||||||
|
(Recommended Default);
|
||||||
|
|
||||||
|
* ``aggressive`` use Aggressive mode for Key Exchanges in the IKEv1 protocol
|
||||||
|
aggressive mode is much more insecure compared to Main mode;
|
||||||
|
|
||||||
|
* ``proposal`` the list of proposals and their parameters:
|
||||||
|
|
||||||
|
* ``dh-group`` dh-group;
|
||||||
|
|
||||||
|
* ``encryption`` encryption algorithm;
|
||||||
|
|
||||||
|
* ``hash`` hash algorithm.
|
||||||
|
|
||||||
*************************
|
*************************
|
||||||
IPsec policy matching GRE
|
IPsec policy matching GRE
|
||||||
*************************
|
*************************
|
||||||
|
|||||||
@ -62,6 +62,7 @@ Currently dynamic routing is supported for the following protocols:
|
|||||||
- :ref:`routing-bgp`
|
- :ref:`routing-bgp`
|
||||||
- :ref:`routing-isis`
|
- :ref:`routing-isis`
|
||||||
- :ref:`routing-ospf`
|
- :ref:`routing-ospf`
|
||||||
|
- :ref:`routing-ospfv3`
|
||||||
- :ref:`routing-static`
|
- :ref:`routing-static`
|
||||||
|
|
||||||
The CLI configuration is same as mentioned in above articles. The only
|
The CLI configuration is same as mentioned in above articles. The only
|
||||||
@ -77,6 +78,7 @@ routing protocol inside a given vrf:
|
|||||||
- :ref:`routing-bgp`: ``set vrf name <name> protocols bgp ...``
|
- :ref:`routing-bgp`: ``set vrf name <name> protocols bgp ...``
|
||||||
- :ref:`routing-isis`: ``set vrf name <name> protocols isis ...``
|
- :ref:`routing-isis`: ``set vrf name <name> protocols isis ...``
|
||||||
- :ref:`routing-ospf`: ``set vrf name <name> protocols ospf ...``
|
- :ref:`routing-ospf`: ``set vrf name <name> protocols ospf ...``
|
||||||
|
- :ref:`routing-ospfv3`: ``set vrf name <name> protocols ospfv3 ...``
|
||||||
- :ref:`routing-static`: ``set vrf name <name> protocols static ...``
|
- :ref:`routing-static`: ``set vrf name <name> protocols static ...``
|
||||||
|
|
||||||
Operation
|
Operation
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user