Merge pull request #1087 from Nephiaust/master

Fixed minor issues in documentation
This commit is contained in:
Daniil Baturin 2023-09-17 18:06:41 +01:00 committed by GitHub
commit b966542cf7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 6 additions and 2 deletions

View File

@ -16,7 +16,7 @@ Zone Based Firewall
chapter. The examples in this section use the legacy firewall configuration
commands, since this feature has been removed in earlier releases.
.. note:: For latest releases, refer the `firewall
.. note:: For latest releases, refer the `firewall (interface-groups)
<https://docs.vyos.io/en/latest/configuration/firewall/general.html#interface-groups>`_
main page to configure zone based rules. New syntax was introduced here
:vytask:`T5160`

View File

@ -148,6 +148,7 @@ Local Configuration:
set interfaces openvpn vtun1 tls certificate 'openvpn-local' # The self-signed certificate
set interfaces openvpn vtun1 tls peer-fingerprint <remote cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256
on the remote rout
Remote Configuration:
.. code-block:: none
@ -163,6 +164,7 @@ Remote Configuration:
set interfaces openvpn vtun1 tls certificate 'openvpn-remote' # The self-signed certificate
set interfaces openvpn vtun1 tls peer-fingerprint <local cert fingerprint> # The output of 'run show pki certificate <name> fingerprint sha256
on the local router
Pre-shared keys
---------------
@ -200,6 +202,7 @@ Then you need to install the key on the remote router:
Then you need to set the key in your OpenVPN interface settings:
.. code-block:: none
set interfaces openvpn vtun1 shared-secret-key s2s
Firewall Exceptions

View File

@ -110,7 +110,7 @@ Sagitta (the Arrow) is the codename of the current development
branch, so there's no VyOS 1.4 yet.
Circinus (1.5)
-------------
--------------
Circinus (the Compass) is the codename of the upcoming development
branch, so there's no VyOS 1.5 yet.

View File

@ -305,6 +305,7 @@ the DNS recursor we configured earlier, accepting traffic bound for port 53 from
all hosts on the ``NET-INSIDE-v4`` network:
.. code-block:: none
set firewall ipv4 input filter rule 30 action 'accept'
set firewall ipv4 input filter rule 30 icmp type-name 'echo-request'
set firewall ipv4 input filter rule 30 protocol 'icmp'