mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-12-16 10:32:02 +01:00
Merge pull request #1416 from Embezzle/spelling
Fix spelling mistakes across multiple files
This commit is contained in:
commit
ccc07b4601
@ -13,7 +13,7 @@ configuration is done only on one router.
|
|||||||
Network Topology and requirements
|
Network Topology and requirements
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
This configuration example and the requirments consists of:
|
This configuration example and the requirements consists of:
|
||||||
|
|
||||||
- Two VyOS routers with public IP address.
|
- Two VyOS routers with public IP address.
|
||||||
|
|
||||||
@ -37,7 +37,7 @@ This configuration example and the requirments consists of:
|
|||||||
|
|
||||||
- Allow all new connections from local subnets.
|
- Allow all new connections from local subnets.
|
||||||
|
|
||||||
- Allow connections from LANs to LANs throught the tunnel.
|
- Allow connections from LANs to LANs through the tunnel.
|
||||||
|
|
||||||
|
|
||||||
.. image:: /_static/images/policy-based-ipsec-and-firewall.png
|
.. image:: /_static/images/policy-based-ipsec-and-firewall.png
|
||||||
|
|||||||
@ -69,7 +69,7 @@ Example 2: Failover based on interface weights
|
|||||||
|
|
||||||
This example uses the failover mode.
|
This example uses the failover mode.
|
||||||
|
|
||||||
.. _wan:example2_overwiew:
|
.. _wan:example2_overview:
|
||||||
|
|
||||||
Overview
|
Overview
|
||||||
^^^^^^^^
|
^^^^^^^^
|
||||||
@ -98,7 +98,7 @@ The previous example used the failover command to send traffic through
|
|||||||
eth1 if eth0 fails. In this example, failover functionality is provided
|
eth1 if eth0 fails. In this example, failover functionality is provided
|
||||||
by rule order.
|
by rule order.
|
||||||
|
|
||||||
.. _wan:example3_overwiew:
|
.. _wan:example3_overview:
|
||||||
|
|
||||||
Overview
|
Overview
|
||||||
^^^^^^^^
|
^^^^^^^^
|
||||||
@ -129,7 +129,7 @@ traffic. It is assumed for this example that eth1 is connected to a
|
|||||||
slower connection than eth0 and should prioritize VoIP traffic.
|
slower connection than eth0 and should prioritize VoIP traffic.
|
||||||
|
|
||||||
|
|
||||||
.. _wan:example4_overwiew:
|
.. _wan:example4_overview:
|
||||||
|
|
||||||
Overview
|
Overview
|
||||||
^^^^^^^^
|
^^^^^^^^
|
||||||
|
|||||||
@ -6,7 +6,7 @@ Zone-Policy example
|
|||||||
-------------------
|
-------------------
|
||||||
|
|
||||||
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
|
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
|
||||||
structure can be found on all vyos instalations, and zone based firewall is
|
structure can be found on all vyos installations, and zone based firewall is
|
||||||
no longer supported. Documentation for most of the new firewall CLI can be
|
no longer supported. Documentation for most of the new firewall CLI can be
|
||||||
found in the `firewall
|
found in the `firewall
|
||||||
<https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_
|
<https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_
|
||||||
|
|||||||
@ -125,7 +125,7 @@ Configuration
|
|||||||
- **net-bind-service**: Bind a socket to privileged ports (port numbers less than 1024)
|
- **net-bind-service**: Bind a socket to privileged ports (port numbers less than 1024)
|
||||||
- **net-raw**: Permission to create raw network sockets
|
- **net-raw**: Permission to create raw network sockets
|
||||||
- **setpcap**: Capability sets (from bounded or inherited set)
|
- **setpcap**: Capability sets (from bounded or inherited set)
|
||||||
- **sys-admin**: Administation operations (quotactl, mount, sethostname, setdomainame)
|
- **sys-admin**: Administration operations (quotactl, mount, sethostname, setdomainame)
|
||||||
- **sys-time**: Permission to set system clock
|
- **sys-time**: Permission to set system clock
|
||||||
|
|
||||||
.. cfgcmd:: set container name <name> disable
|
.. cfgcmd:: set container name <name> disable
|
||||||
|
|||||||
@ -13,7 +13,7 @@ Overview
|
|||||||
********
|
********
|
||||||
|
|
||||||
In this section there's useful information of all firewall configuration that
|
In this section there's useful information of all firewall configuration that
|
||||||
can be done regarding bridge, and appropiate op-mode commands.
|
can be done regarding bridge, and appropriate op-mode commands.
|
||||||
Configuration commands covered in this section:
|
Configuration commands covered in this section:
|
||||||
|
|
||||||
.. cfgcmd:: set firewall bridge ...
|
.. cfgcmd:: set firewall bridge ...
|
||||||
@ -37,13 +37,13 @@ for this layer is shown next:
|
|||||||
|
|
||||||
.. figure:: /_static/images/firewall-bridge-packet-flow.png
|
.. figure:: /_static/images/firewall-bridge-packet-flow.png
|
||||||
|
|
||||||
For traffic that needs to be forwared internally by the bridge, base chain is
|
For traffic that needs to be forwarded internally by the bridge, base chain is
|
||||||
is **forward**, and it's base command for filtering is ``set firewall bridge
|
is **forward**, and it's base command for filtering is ``set firewall bridge
|
||||||
forward filter ...``, which happens in stage 4, highlightened with red color.
|
forward filter ...``, which happens in stage 4, highlighted with red color.
|
||||||
|
|
||||||
Custom bridge firewall chains can be create with command ``set firewall bridge
|
Custom bridge firewall chains can be create with command ``set firewall bridge
|
||||||
name <name> ...``. In order to use such custom chain, a rule with action jump,
|
name <name> ...``. In order to use such custom chain, a rule with action jump,
|
||||||
and the appropiate target should be defined in a base chain.
|
and the appropriate target should be defined in a base chain.
|
||||||
|
|
||||||
.. note:: **Layer 3 bridge**:
|
.. note:: **Layer 3 bridge**:
|
||||||
When an IP address is assigned to the bridge interface, and if traffic
|
When an IP address is assigned to the bridge interface, and if traffic
|
||||||
@ -137,7 +137,7 @@ not match any rule in it's chain. For base chains, possible options for
|
|||||||
|
|
||||||
.. cfgcmd:: set firewall bridge name <name> default-jump-target <text>
|
.. cfgcmd:: set firewall bridge name <name> default-jump-target <text>
|
||||||
|
|
||||||
To be used only when ``defult-action`` is set to ``jump``. Use this
|
To be used only when ``default-action`` is set to ``jump``. Use this
|
||||||
command to specify jump target for default rule.
|
command to specify jump target for default rule.
|
||||||
|
|
||||||
.. note:: **Important note about default-actions:**
|
.. note:: **Important note about default-actions:**
|
||||||
@ -236,9 +236,9 @@ There are a lot of matching criteria against which the packet can be tested.
|
|||||||
.. cfgcmd:: set firewall bridge name <name> rule <1-999999>
|
.. cfgcmd:: set firewall bridge name <name> rule <1-999999>
|
||||||
inbound-interface name <iface>
|
inbound-interface name <iface>
|
||||||
|
|
||||||
Match based on inbound interface. Wilcard ``*`` can be used.
|
Match based on inbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
@ -246,16 +246,16 @@ There are a lot of matching criteria against which the packet can be tested.
|
|||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on inbound interface group. Prepending character ``!`` for
|
Match based on inbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
.. cfgcmd:: set firewall bridge name <name> rule <1-999999>
|
.. cfgcmd:: set firewall bridge name <name> rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
|
|
||||||
Match based on outbound interface. Wilcard ``*`` can be used.
|
Match based on outbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
@ -263,7 +263,7 @@ There are a lot of matching criteria against which the packet can be tested.
|
|||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on outbound interface group. Prepending character ``!`` for
|
Match based on outbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
.. cfgcmd:: set firewall bridge forward filter rule <1-999999>
|
||||||
vlan id <0-4096>
|
vlan id <0-4096>
|
||||||
@ -288,7 +288,7 @@ Rule-set overview
|
|||||||
|
|
||||||
In this section you can find all useful firewall op-mode commands.
|
In this section you can find all useful firewall op-mode commands.
|
||||||
|
|
||||||
General commands for firewall configuration, counter and statiscits:
|
General commands for firewall configuration, counter and statistics:
|
||||||
|
|
||||||
.. opcmd:: show firewall
|
.. opcmd:: show firewall
|
||||||
.. opcmd:: show firewall summary
|
.. opcmd:: show firewall summary
|
||||||
|
|||||||
@ -99,20 +99,20 @@ Creating rules for using flow tables:
|
|||||||
Configuration Example
|
Configuration Example
|
||||||
*********************
|
*********************
|
||||||
|
|
||||||
Things to be considred in this setup:
|
Things to be considered in this setup:
|
||||||
|
|
||||||
* Two interfaces are going to be used in the flowtables: eth0 and eth1
|
* Two interfaces are going to be used in the flowtables: eth0 and eth1
|
||||||
|
|
||||||
* Minumum firewall ruleset is provided, which includes some filtering rules,
|
* Minimum firewall ruleset is provided, which includes some filtering rules,
|
||||||
and appropiate rules for using flowtable offload capabilities.
|
and appropriate rules for using flowtable offload capabilities.
|
||||||
|
|
||||||
As described, first packet will be evaluated by all the firewall path, so
|
As described, first packet will be evaluated by all the firewall path, so
|
||||||
desired connection should be explicitely accepted. Same thing should be taken
|
desired connection should be explicitly accepted. Same thing should be taken
|
||||||
into account for traffic in reverse order. In most cases state policies are
|
into account for traffic in reverse order. In most cases state policies are
|
||||||
used in order to accept connection in reverse patch.
|
used in order to accept connection in reverse patch.
|
||||||
|
|
||||||
We will only accept traffic comming from interface eth0, protocol tcp and
|
We will only accept traffic coming from interface eth0, protocol tcp and
|
||||||
destination port 1122. All other traffic traspassing the router should be
|
destination port 1122. All other traffic trespassing the router should be
|
||||||
blocked.
|
blocked.
|
||||||
|
|
||||||
Commands
|
Commands
|
||||||
|
|||||||
@ -24,7 +24,7 @@ firewall are covered below:
|
|||||||
where the packet was received is part of a bridge, or not.
|
where the packet was received is part of a bridge, or not.
|
||||||
|
|
||||||
If the interface where the packet was received isn't part of a bridge, then
|
If the interface where the packet was received isn't part of a bridge, then
|
||||||
packetis processed at the **IP Layer**:
|
packet is processed at the **IP Layer**:
|
||||||
|
|
||||||
* **Prerouting**: several actions can be done in this stage, and currently
|
* **Prerouting**: several actions can be done in this stage, and currently
|
||||||
these actions are defined in different parts in VyOS configuration. Order
|
these actions are defined in different parts in VyOS configuration. Order
|
||||||
@ -65,7 +65,7 @@ packetis processed at the **IP Layer**:
|
|||||||
* **Output**: stage where traffic that originates from the router itself
|
* **Output**: stage where traffic that originates from the router itself
|
||||||
can be filtered and controlled. Bear in mind that this traffic can be a
|
can be filtered and controlled. Bear in mind that this traffic can be a
|
||||||
new connection originated by a internal process running on VyOS router,
|
new connection originated by a internal process running on VyOS router,
|
||||||
such as NTP, or a response to traffic received externaly through
|
such as NTP, or a response to traffic received externally through
|
||||||
**input** (for example response to an ssh login attempt to the router).
|
**input** (for example response to an ssh login attempt to the router).
|
||||||
This includes ipv4 and ipv6 filtering rules, defined in:
|
This includes ipv4 and ipv6 filtering rules, defined in:
|
||||||
|
|
||||||
@ -84,7 +84,7 @@ If the interface where the packet was received is part of a bridge, then
|
|||||||
the packet is processed at the **Bridge Layer**, which contains a basic setup for
|
the packet is processed at the **Bridge Layer**, which contains a basic setup for
|
||||||
bridge filtering:
|
bridge filtering:
|
||||||
|
|
||||||
* **Forward (Bridge)**: stage where traffic that is trespasing through the
|
* **Forward (Bridge)**: stage where traffic that is trespassing through the
|
||||||
bridge is filtered and controlled:
|
bridge is filtered and controlled:
|
||||||
|
|
||||||
* ``set firewall bridge forward filter ...``.
|
* ``set firewall bridge forward filter ...``.
|
||||||
|
|||||||
@ -11,7 +11,7 @@ Overview
|
|||||||
********
|
********
|
||||||
|
|
||||||
In this section there's useful information of all firewall configuration that
|
In this section there's useful information of all firewall configuration that
|
||||||
can be done regarding IPv4, and appropiate op-mode commands.
|
can be done regarding IPv4, and appropriate op-mode commands.
|
||||||
Configuration commands covered in this section:
|
Configuration commands covered in this section:
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 ...
|
.. cfgcmd:: set firewall ipv4 ...
|
||||||
@ -41,12 +41,12 @@ next:
|
|||||||
|
|
||||||
Where firewall base chain to configure firewall filtering rules for transit
|
Where firewall base chain to configure firewall filtering rules for transit
|
||||||
traffic is ``set firewall ipv4 forward filter ...``, which happens in stage 5,
|
traffic is ``set firewall ipv4 forward filter ...``, which happens in stage 5,
|
||||||
highlightened with red color.
|
highlighted with red color.
|
||||||
|
|
||||||
For traffic towards the router itself, base chain is **input**, while traffic
|
For traffic towards the router itself, base chain is **input**, while traffic
|
||||||
originated by the router, base chain is **output**.
|
originated by the router, base chain is **output**.
|
||||||
A new simplified packet flow diagram is shown next, which shows the path
|
A new simplified packet flow diagram is shown next, which shows the path
|
||||||
for traffic destinated to the router itself, and traffic generated by the
|
for traffic destined to the router itself, and traffic generated by the
|
||||||
router (starting from circle number 6):
|
router (starting from circle number 6):
|
||||||
|
|
||||||
.. figure:: /_static/images/firewall-input-packet-flow.png
|
.. figure:: /_static/images/firewall-input-packet-flow.png
|
||||||
@ -64,7 +64,7 @@ output filter ...``
|
|||||||
|
|
||||||
Custom firewall chains can be created, with commands
|
Custom firewall chains can be created, with commands
|
||||||
``set firewall ipv4 name <name> ...``. In order to use
|
``set firewall ipv4 name <name> ...``. In order to use
|
||||||
such custom chain, a rule with **action jump**, and the appropiate **target**
|
such custom chain, a rule with **action jump**, and the appropriate **target**
|
||||||
should be defined in a base chain.
|
should be defined in a base chain.
|
||||||
|
|
||||||
*********************
|
*********************
|
||||||
@ -184,7 +184,7 @@ not match any rule in it's chain. For base chains, possible options for
|
|||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 name <name> default-jump-target <text>
|
.. cfgcmd:: set firewall ipv4 name <name> default-jump-target <text>
|
||||||
|
|
||||||
To be used only when ``defult-action`` is set to ``jump``. Use this
|
To be used only when ``default-action`` is set to ``jump``. Use this
|
||||||
command to specify jump target for default rule.
|
command to specify jump target for default rule.
|
||||||
|
|
||||||
.. note:: **Important note about default-actions:**
|
.. note:: **Important note about default-actions:**
|
||||||
@ -683,9 +683,9 @@ geoip) to keep database and rules updated.
|
|||||||
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
|
||||||
inbound-interface name <iface>
|
inbound-interface name <iface>
|
||||||
|
|
||||||
Match based on inbound interface. Wilcard ``*`` can be used.
|
Match based on inbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
@ -695,7 +695,7 @@ geoip) to keep database and rules updated.
|
|||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on inbound interface group. Prepending character ``!`` for
|
Match based on inbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
@ -704,9 +704,9 @@ geoip) to keep database and rules updated.
|
|||||||
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
|
|
||||||
Match based on outbound interface. Wilcard ``*`` can be used.
|
Match based on outbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
@ -716,7 +716,7 @@ geoip) to keep database and rules updated.
|
|||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on outbound interface group. Prepending character ``!`` for
|
Match based on outbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
|
||||||
ipsec [match-ipsec | match-none]
|
ipsec [match-ipsec | match-none]
|
||||||
|
|||||||
@ -11,7 +11,7 @@ Overview
|
|||||||
********
|
********
|
||||||
|
|
||||||
In this section there's useful information of all firewall configuration that
|
In this section there's useful information of all firewall configuration that
|
||||||
can be done regarding IPv6, and appropiate op-mode commands.
|
can be done regarding IPv6, and appropriate op-mode commands.
|
||||||
Configuration commands covered in this section:
|
Configuration commands covered in this section:
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 ...
|
.. cfgcmd:: set firewall ipv6 ...
|
||||||
@ -41,12 +41,12 @@ next:
|
|||||||
|
|
||||||
Where firewall base chain to configure firewall filtering rules for transit
|
Where firewall base chain to configure firewall filtering rules for transit
|
||||||
traffic is ``set firewall ipv6 forward filter ...``, which happens in stage 5,
|
traffic is ``set firewall ipv6 forward filter ...``, which happens in stage 5,
|
||||||
highlightened with red color.
|
highlighted with red color.
|
||||||
|
|
||||||
For traffic towards the router itself, base chain is **input**, while traffic
|
For traffic towards the router itself, base chain is **input**, while traffic
|
||||||
originated by the router, base chain is **output**.
|
originated by the router, base chain is **output**.
|
||||||
A new simplified packet flow diagram is shown next, which shows the path
|
A new simplified packet flow diagram is shown next, which shows the path
|
||||||
for traffic destinated to the router itself, and traffic generated by the
|
for traffic destined to the router itself, and traffic generated by the
|
||||||
router (starting from circle number 6):
|
router (starting from circle number 6):
|
||||||
|
|
||||||
.. figure:: /_static/images/firewall-input-packet-flow.png
|
.. figure:: /_static/images/firewall-input-packet-flow.png
|
||||||
@ -64,7 +64,7 @@ output filter ...``
|
|||||||
|
|
||||||
Custom firewall chains can be created, with commands
|
Custom firewall chains can be created, with commands
|
||||||
``set firewall ipv6 name <name> ...``. In order to use
|
``set firewall ipv6 name <name> ...``. In order to use
|
||||||
such custom chain, a rule with **action jump**, and the appropiate **target**
|
such custom chain, a rule with **action jump**, and the appropriate **target**
|
||||||
should be defined in a base chain.
|
should be defined in a base chain.
|
||||||
|
|
||||||
******************************
|
******************************
|
||||||
@ -184,7 +184,7 @@ not match any rule in it's chain. For base chains, possible options for
|
|||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 name <name> default-jump-target <text>
|
.. cfgcmd:: set firewall ipv6 name <name> default-jump-target <text>
|
||||||
|
|
||||||
To be used only when ``defult-action`` is set to ``jump``. Use this
|
To be used only when ``default-action`` is set to ``jump``. Use this
|
||||||
command to specify jump target for default rule.
|
command to specify jump target for default rule.
|
||||||
|
|
||||||
.. note:: **Important note about default-actions:**
|
.. note:: **Important note about default-actions:**
|
||||||
@ -670,9 +670,9 @@ geoip) to keep database and rules updated.
|
|||||||
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
|
||||||
inbound-interface name <iface>
|
inbound-interface name <iface>
|
||||||
|
|
||||||
Match based on inbound interface. Wilcard ``*`` can be used.
|
Match based on inbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
@ -682,7 +682,7 @@ geoip) to keep database and rules updated.
|
|||||||
inbound-interface group <iface_group>
|
inbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on inbound interface group. Prepending character ``!`` for
|
Match based on inbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
@ -691,9 +691,9 @@ geoip) to keep database and rules updated.
|
|||||||
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
|
||||||
outbound-interface name <iface>
|
outbound-interface name <iface>
|
||||||
|
|
||||||
Match based on outbound interface. Wilcard ``*`` can be used.
|
Match based on outbound interface. Wildcard ``*`` can be used.
|
||||||
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
For example: ``eth2*``. Prepending character ``!`` for inverted matching
|
||||||
criteria is also supportd. For example ``!eth2``
|
criteria is also supported. For example ``!eth2``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
@ -703,7 +703,7 @@ geoip) to keep database and rules updated.
|
|||||||
outbound-interface group <iface_group>
|
outbound-interface group <iface_group>
|
||||||
|
|
||||||
Match based on outbound interface group. Prepending character ``!`` for
|
Match based on outbound interface group. Prepending character ``!`` for
|
||||||
inverted matching criteria is also supportd. For example ``!IFACE_GROUP``
|
inverted matching criteria is also supported. For example ``!IFACE_GROUP``
|
||||||
|
|
||||||
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
|
||||||
ipsec [match-ipsec | match-none]
|
ipsec [match-ipsec | match-none]
|
||||||
|
|||||||
@ -11,7 +11,7 @@ Overview
|
|||||||
********
|
********
|
||||||
|
|
||||||
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
|
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
|
||||||
structure can be found on all vyos instalations. Zone based firewall was
|
structure can be found on all VyOS installations. Zone based firewall was
|
||||||
removed in that version, but re introduced in VyOS 1.4 and 1.5. All
|
removed in that version, but re introduced in VyOS 1.4 and 1.5. All
|
||||||
versions built after 2023-10-22 has this feature.
|
versions built after 2023-10-22 has this feature.
|
||||||
Documentation for most of the new firewall CLI can be
|
Documentation for most of the new firewall CLI can be
|
||||||
|
|||||||
@ -8,7 +8,7 @@
|
|||||||
PKI
|
PKI
|
||||||
###
|
###
|
||||||
|
|
||||||
VyOS 1.4 changed the way in how encrytion keys or certificates are stored on the
|
VyOS 1.4 changed the way in how encryption keys or certificates are stored on the
|
||||||
system. In the pre VyOS 1.4 era, certificates got stored under /config and every
|
system. In the pre VyOS 1.4 era, certificates got stored under /config and every
|
||||||
service referenced a file. That made copying a running configuration from system
|
service referenced a file. That made copying a running configuration from system
|
||||||
A to system B a bit harder, as you had to copy the files and their permissions
|
A to system B a bit harder, as you had to copy the files and their permissions
|
||||||
@ -120,12 +120,12 @@ OpenVPN
|
|||||||
|
|
||||||
.. opcmd:: generate pki openvpn shared-secret
|
.. opcmd:: generate pki openvpn shared-secret
|
||||||
|
|
||||||
Genearate a new OpenVPN shared secret. The generated secret is the output to
|
Generate a new OpenVPN shared secret. The generated secret is the output to
|
||||||
the console.
|
the console.
|
||||||
|
|
||||||
.. opcmd:: generate pki openvpn shared-secret install <name>
|
.. opcmd:: generate pki openvpn shared-secret install <name>
|
||||||
|
|
||||||
Genearate a new OpenVPN shared secret. The generated secret is the output to
|
Generate a new OpenVPN shared secret. The generated secret is the output to
|
||||||
the console.
|
the console.
|
||||||
|
|
||||||
.. include:: pki_cli_import_help.txt
|
.. include:: pki_cli_import_help.txt
|
||||||
@ -163,7 +163,7 @@ WireGuard
|
|||||||
the output from op-mode into configuration mode.
|
the output from op-mode into configuration mode.
|
||||||
|
|
||||||
``peer`` is used for the VyOS CLI command to identify the WireGuard peer where
|
``peer`` is used for the VyOS CLI command to identify the WireGuard peer where
|
||||||
this secred is to be used.
|
this secret is to be used.
|
||||||
|
|
||||||
Key usage (CLI)
|
Key usage (CLI)
|
||||||
===============
|
===============
|
||||||
|
|||||||
@ -12,7 +12,7 @@ interior gateway protocol (IGP) which is described in ISO10589,
|
|||||||
algorithm to create a database of the network’s topology, and
|
algorithm to create a database of the network’s topology, and
|
||||||
from that database to determine the best (that is, lowest cost) path to a
|
from that database to determine the best (that is, lowest cost) path to a
|
||||||
destination. The intermediate systems (the name for routers) exchange topology
|
destination. The intermediate systems (the name for routers) exchange topology
|
||||||
information with their directly conencted neighbors. IS-IS runs directly on
|
information with their directly connected neighbors. IS-IS runs directly on
|
||||||
the data link layer (Layer 2). IS-IS addresses are called
|
the data link layer (Layer 2). IS-IS addresses are called
|
||||||
:abbr:`NETs (Network Entity Titles)` and can be 8 to 20 bytes long, but are
|
:abbr:`NETs (Network Entity Titles)` and can be 8 to 20 bytes long, but are
|
||||||
generally 10 bytes long. The tree database that is created with IS-IS is
|
generally 10 bytes long. The tree database that is created with IS-IS is
|
||||||
@ -39,7 +39,7 @@ occur within IS-IS when it comes to said duplication.
|
|||||||
|
|
||||||
.. cfgcmd:: set protocols isis net <network-entity-title>
|
.. cfgcmd:: set protocols isis net <network-entity-title>
|
||||||
|
|
||||||
This commad sets network entity title (NET) provided in ISO format.
|
This command sets network entity title (NET) provided in ISO format.
|
||||||
|
|
||||||
Here is an example :abbr:`NET (Network Entity Title)` value:
|
Here is an example :abbr:`NET (Network Entity Title)` value:
|
||||||
|
|
||||||
@ -52,9 +52,9 @@ occur within IS-IS when it comes to said duplication.
|
|||||||
* :abbr:`AFI (Address family authority identifier)` - ``49`` The AFI value
|
* :abbr:`AFI (Address family authority identifier)` - ``49`` The AFI value
|
||||||
49 is what IS-IS uses for private addressing.
|
49 is what IS-IS uses for private addressing.
|
||||||
|
|
||||||
* Area identifier: ``0001`` IS-IS area number (numberical area ``1``)
|
* Area identifier: ``0001`` IS-IS area number (numerical area ``1``)
|
||||||
|
|
||||||
* System identifier: ``1921.6800.1002`` - for system idetifiers we recommend
|
* System identifier: ``1921.6800.1002`` - for system identifiers we recommend
|
||||||
to use IP address or MAC address of the router itself. The way to construct
|
to use IP address or MAC address of the router itself. The way to construct
|
||||||
this is to keep all of the zeroes of the router IP address, and then change
|
this is to keep all of the zeroes of the router IP address, and then change
|
||||||
the periods from being every three numbers to every four numbers. The
|
the periods from being every three numbers to every four numbers. The
|
||||||
|
|||||||
@ -20,7 +20,7 @@ Configuration
|
|||||||
.. cfgcmd:: set service broadcast-relay id <n> description <description>
|
.. cfgcmd:: set service broadcast-relay id <n> description <description>
|
||||||
|
|
||||||
A description can be added for each and every unique relay ID. This is
|
A description can be added for each and every unique relay ID. This is
|
||||||
useful to distinguish between multiple different ports/appliactions.
|
useful to distinguish between multiple different ports/applications.
|
||||||
|
|
||||||
.. cfgcmd:: set service broadcast-relay id <n> interface <interface>
|
.. cfgcmd:: set service broadcast-relay id <n> interface <interface>
|
||||||
|
|
||||||
@ -35,7 +35,7 @@ Configuration
|
|||||||
|
|
||||||
.. cfgcmd:: set service broadcast-relay id <n> port <port>
|
.. cfgcmd:: set service broadcast-relay id <n> port <port>
|
||||||
|
|
||||||
The UDP port number used by your apllication. It is mandatory for this kind
|
The UDP port number used by your application. It is mandatory for this kind
|
||||||
of operation.
|
of operation.
|
||||||
|
|
||||||
.. cfgcmd:: set service broadcast-relay id <n> disable
|
.. cfgcmd:: set service broadcast-relay id <n> disable
|
||||||
|
|||||||
@ -29,7 +29,7 @@ will be mandatorily defragmented.
|
|||||||
|
|
||||||
It is possible to use either Multicast or Unicast to sync conntrack traffic.
|
It is possible to use either Multicast or Unicast to sync conntrack traffic.
|
||||||
Most examples below show Multicast, but unicast can be specified by using the
|
Most examples below show Multicast, but unicast can be specified by using the
|
||||||
"peer" keywork after the specificed interface, as in the following example:
|
"peer" keywork after the specified interface, as in the following example:
|
||||||
|
|
||||||
:cfgcmd:`set service conntrack-sync interface eth0 peer 192.168.0.250`
|
:cfgcmd:`set service conntrack-sync interface eth0 peer 192.168.0.250`
|
||||||
|
|
||||||
@ -204,7 +204,7 @@ Now configure conntrack-sync service on ``router1`` **and** ``router2``
|
|||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
set high-availablilty vrrp group internal virtual-address ... etc ...
|
set high-availability vrrp group internal virtual-address ... etc ...
|
||||||
set high-availability vrrp sync-group syncgrp member 'internal'
|
set high-availability vrrp sync-group syncgrp member 'internal'
|
||||||
set service conntrack-sync accept-protocol 'tcp'
|
set service conntrack-sync accept-protocol 'tcp'
|
||||||
set service conntrack-sync accept-protocol 'udp'
|
set service conntrack-sync accept-protocol 'udp'
|
||||||
|
|||||||
@ -33,7 +33,7 @@ Configuration
|
|||||||
Configure direction for processing traffic.
|
Configure direction for processing traffic.
|
||||||
|
|
||||||
.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x>
|
.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x>
|
||||||
.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x>
|
.. cfgcmd:: set service ids ddos-protection exclude-network <h:h:h:h:h:h:h:h/x>
|
||||||
|
|
||||||
Specify IPv4 and/or IPv6 networks which are going to be excluded.
|
Specify IPv4 and/or IPv6 networks which are going to be excluded.
|
||||||
|
|
||||||
@ -56,7 +56,7 @@ Configuration
|
|||||||
|
|
||||||
.. cfgcmd:: set service ids ddos-protection sflow port <1-65535>
|
.. cfgcmd:: set service ids ddos-protection sflow port <1-65535>
|
||||||
|
|
||||||
Configure port number to be used for sflow conection. Default port is 6343.
|
Configure port number to be used for sflow connection. Default port is 6343.
|
||||||
|
|
||||||
.. cfgcmd:: set service ids ddos-protection threshold general
|
.. cfgcmd:: set service ids ddos-protection threshold general
|
||||||
[fps | mbps | pps] <0-4294967294>
|
[fps | mbps | pps] <0-4294967294>
|
||||||
@ -96,7 +96,7 @@ In this simplified scenario, main things to be considered are:
|
|||||||
* Interface **eth0** used to connect to upstream.
|
* Interface **eth0** used to connect to upstream.
|
||||||
|
|
||||||
Since we are analyzing attacks to and from our internal network, two types
|
Since we are analyzing attacks to and from our internal network, two types
|
||||||
of attacks can be identified, and differents actions are needed:
|
of attacks can be identified, and different actions are needed:
|
||||||
|
|
||||||
* External attack: an attack from the internet towards an internal IP
|
* External attack: an attack from the internet towards an internal IP
|
||||||
is identify. In this case, all connections towards such IP will be
|
is identify. In this case, all connections towards such IP will be
|
||||||
|
|||||||
@ -38,7 +38,7 @@ Configuration
|
|||||||
"Cur Hop Limit", "hop-limit", "Hop count field of the outgoing RA packets"
|
"Cur Hop Limit", "hop-limit", "Hop count field of the outgoing RA packets"
|
||||||
"""Managed address configuration"" flag", "managed-flag", "Tell hosts to use the administered stateful protocol (i.e. DHCP) for autoconfiguration"
|
"""Managed address configuration"" flag", "managed-flag", "Tell hosts to use the administered stateful protocol (i.e. DHCP) for autoconfiguration"
|
||||||
"""Other configuration"" flag", "other-config-flag", "Tell hosts to use the administered (stateful) protocol (i.e. DHCP) for autoconfiguration of other (non-address) information"
|
"""Other configuration"" flag", "other-config-flag", "Tell hosts to use the administered (stateful) protocol (i.e. DHCP) for autoconfiguration of other (non-address) information"
|
||||||
"MTU","link-mtu","Link MTU value placed in RAs, exluded in RAs if unset"
|
"MTU","link-mtu","Link MTU value placed in RAs, excluded in RAs if unset"
|
||||||
"Router Lifetime","default-lifetime","Lifetime associated with the default router in units of seconds"
|
"Router Lifetime","default-lifetime","Lifetime associated with the default router in units of seconds"
|
||||||
"Reachable Time","reachable-time","Time, in milliseconds, that a node assumes a neighbor is reachable after having received a reachability confirmation"
|
"Reachable Time","reachable-time","Time, in milliseconds, that a node assumes a neighbor is reachable after having received a reachability confirmation"
|
||||||
"Retransmit Timer","retrans-timer","Time in milliseconds between retransmitted Neighbor Solicitation messages"
|
"Retransmit Timer","retrans-timer","Time in milliseconds between retransmitted Neighbor Solicitation messages"
|
||||||
|
|||||||
@ -17,7 +17,7 @@ Requirements
|
|||||||
************
|
************
|
||||||
|
|
||||||
To use the Salt-Minion, a running Salt-Master is required. You can find more
|
To use the Salt-Minion, a running Salt-Master is required. You can find more
|
||||||
in the `Salt Poject Documentaion
|
in the `Salt Project Documentation
|
||||||
<https://docs.saltproject.io/en/latest/contents.html>`_
|
<https://docs.saltproject.io/en/latest/contents.html>`_
|
||||||
|
|
||||||
*************
|
*************
|
||||||
|
|||||||
@ -94,7 +94,7 @@ states.
|
|||||||
.. cfgcmd:: set system conntrack timeout udp stream <1-21474836>
|
.. cfgcmd:: set system conntrack timeout udp stream <1-21474836>
|
||||||
:defaultvalue:
|
:defaultvalue:
|
||||||
|
|
||||||
Set the timeout in secounds for a protocol or state.
|
Set the timeout in seconds for a protocol or state.
|
||||||
|
|
||||||
You can also define custom timeout values to apply to a specific subset of
|
You can also define custom timeout values to apply to a specific subset of
|
||||||
connections, based on a packet and flow selector. To do this, you need to
|
connections, based on a packet and flow selector. To do this, you need to
|
||||||
@ -172,7 +172,7 @@ create a rule defining the packet and flow selector.
|
|||||||
.. cfgcmd:: set system conntrack timeout custom [ipv4 | ipv6] rule <1-999999>
|
.. cfgcmd:: set system conntrack timeout custom [ipv4 | ipv6] rule <1-999999>
|
||||||
protocol udp unreplied <1-21474836>
|
protocol udp unreplied <1-21474836>
|
||||||
|
|
||||||
Set the timeout in secounds for a protocol or state in a custom rule.
|
Set the timeout in seconds for a protocol or state in a custom rule.
|
||||||
|
|
||||||
Conntrack ignore rules
|
Conntrack ignore rules
|
||||||
======================
|
======================
|
||||||
|
|||||||
@ -50,7 +50,7 @@ interface, the interface must be configured for flow accounting.
|
|||||||
Configure and enable collection of flow information for the interface
|
Configure and enable collection of flow information for the interface
|
||||||
identified by `<interface>`.
|
identified by `<interface>`.
|
||||||
|
|
||||||
You can configure multiple interfaces which whould participate in flow
|
You can configure multiple interfaces which would participate in flow
|
||||||
accounting.
|
accounting.
|
||||||
|
|
||||||
.. note:: Will be recorded only packets/flows on **incoming** direction in
|
.. note:: Will be recorded only packets/flows on **incoming** direction in
|
||||||
|
|||||||
@ -30,7 +30,7 @@ System configuration commands
|
|||||||
Zebra/Kernel route filtering
|
Zebra/Kernel route filtering
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Zebra supports prefix-lists and Route Mapss to match routes received from
|
Zebra supports prefix-lists and Route Maps to match routes received from
|
||||||
other FRR components. The permit/deny facilities provided by these commands
|
other FRR components. The permit/deny facilities provided by these commands
|
||||||
can be used to filter which routes zebra will install in the kernel.
|
can be used to filter which routes zebra will install in the kernel.
|
||||||
|
|
||||||
@ -48,7 +48,7 @@ Nexthop Tracking
|
|||||||
|
|
||||||
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
||||||
by default for a traditional profile of FRR which we use. It and can be disabled if
|
by default for a traditional profile of FRR which we use. It and can be disabled if
|
||||||
you do not wan't to e.g. allow BGP to peer across the default route.
|
you do not want to e.g. allow BGP to peer across the default route.
|
||||||
|
|
||||||
.. cfgcmd:: set system ip nht no-resolve-via-default
|
.. cfgcmd:: set system ip nht no-resolve-via-default
|
||||||
|
|
||||||
|
|||||||
@ -26,7 +26,7 @@ System configuration commands
|
|||||||
Zebra/Kernel route filtering
|
Zebra/Kernel route filtering
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Zebra supports prefix-lists and Route Mapss to match routes received from
|
Zebra supports prefix-lists and Route Maps to match routes received from
|
||||||
other FRR components. The permit/deny facilities provided by these commands
|
other FRR components. The permit/deny facilities provided by these commands
|
||||||
can be used to filter which routes zebra will install in the kernel.
|
can be used to filter which routes zebra will install in the kernel.
|
||||||
|
|
||||||
@ -44,7 +44,7 @@ Nexthop Tracking
|
|||||||
|
|
||||||
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
||||||
by default for a traditional profile of FRR which we use. It and can be disabled if
|
by default for a traditional profile of FRR which we use. It and can be disabled if
|
||||||
you do not wan't to e.g. allow BGP to peer across the default route.
|
you do not want to e.g. allow BGP to peer across the default route.
|
||||||
|
|
||||||
.. cfgcmd:: set system ipv6 nht no-resolve-via-default
|
.. cfgcmd:: set system ipv6 nht no-resolve-via-default
|
||||||
|
|
||||||
|
|||||||
@ -88,7 +88,7 @@ Keyboard Layout
|
|||||||
***************
|
***************
|
||||||
|
|
||||||
When starting a VyOS live system (the installation CD) the configured keyboard
|
When starting a VyOS live system (the installation CD) the configured keyboard
|
||||||
layout defaults to US. As this might not suite everyones use case you can adjust
|
layout defaults to US. As this might not suite everyone's use case you can adjust
|
||||||
the used keyboard layout on the system console.
|
the used keyboard layout on the system console.
|
||||||
|
|
||||||
.. cfgcmd:: set system option keyboard-layout <us | fr | de | fi | no | dk>
|
.. cfgcmd:: set system option keyboard-layout <us | fr | de | fi | no | dk>
|
||||||
|
|||||||
@ -29,7 +29,7 @@ Configuration
|
|||||||
|
|
||||||
Configure and enable collection of flow information for the interface identified by <interface>.
|
Configure and enable collection of flow information for the interface identified by <interface>.
|
||||||
|
|
||||||
You can configure multiple interfaces which whould participate in sflow accounting.
|
You can configure multiple interfaces which would participate in sflow accounting.
|
||||||
|
|
||||||
|
|
||||||
.. cfgcmd:: set system sflow polling <sec>
|
.. cfgcmd:: set system sflow polling <sec>
|
||||||
|
|||||||
@ -45,7 +45,7 @@ Custom File
|
|||||||
|
|
||||||
.. cfgcmd:: set system syslog file <filename> archive file <number>
|
.. cfgcmd:: set system syslog file <filename> archive file <number>
|
||||||
|
|
||||||
Syslog uses logrotate to rotate logiles after a number of gives bytes.
|
Syslog uses logrotate to rotate logfiles after a number of gives bytes.
|
||||||
We keep as many as `<number>` rotated file before they are deleted on the
|
We keep as many as `<number>` rotated file before they are deleted on the
|
||||||
system.
|
system.
|
||||||
|
|
||||||
@ -200,7 +200,7 @@ Display Logs
|
|||||||
.. opcmd:: show log [all | authorization | cluster | conntrack-sync | ...]
|
.. opcmd:: show log [all | authorization | cluster | conntrack-sync | ...]
|
||||||
|
|
||||||
Display log files of given category on the console. Use tab completion to get
|
Display log files of given category on the console. Use tab completion to get
|
||||||
a list of available categories. Thos categories could be: all, authorization,
|
a list of available categories. Those categories could be: all, authorization,
|
||||||
cluster, conntrack-sync, dhcp, directory, dns, file, firewall, https, image
|
cluster, conntrack-sync, dhcp, directory, dns, file, firewall, https, image
|
||||||
lldp, nat, openvpn, snmp, tail, vpn, vrrp
|
lldp, nat, openvpn, snmp, tail, vpn, vrrp
|
||||||
|
|
||||||
|
|||||||
@ -7,7 +7,7 @@ Task Scheduler
|
|||||||
The task scheduler allows you to execute tasks on a given schedule. It makes
|
The task scheduler allows you to execute tasks on a given schedule. It makes
|
||||||
use of UNIX cron_.
|
use of UNIX cron_.
|
||||||
|
|
||||||
.. note:: All scripts excecuted this way are executed as root user - this may
|
.. note:: All scripts executed this way are executed as root user - this may
|
||||||
be dangerous. Together with :ref:`command-scripting` this can be used for
|
be dangerous. Together with :ref:`command-scripting` this can be used for
|
||||||
automating (re-)configuration.
|
automating (re-)configuration.
|
||||||
|
|
||||||
|
|||||||
@ -368,7 +368,7 @@ are to be sent, they could get dropped when trying to get enqueued at
|
|||||||
the tail. This can happen if the queue has still not been able to
|
the tail. This can happen if the queue has still not been able to
|
||||||
release enough packets from its head.
|
release enough packets from its head.
|
||||||
|
|
||||||
This is the policy that requieres the lowest resources for the same
|
This is the policy that requires the lowest resources for the same
|
||||||
amount of traffic. But **very likely you do not need it as you cannot
|
amount of traffic. But **very likely you do not need it as you cannot
|
||||||
get much from it. Sometimes it is used just to enable logging.**
|
get much from it. Sometimes it is used just to enable logging.**
|
||||||
|
|
||||||
@ -504,7 +504,7 @@ and increase `interval` to something around 150 ms.
|
|||||||
the number of sub-queues (default: 1024) into which packets are
|
the number of sub-queues (default: 1024) into which packets are
|
||||||
classified.
|
classified.
|
||||||
|
|
||||||
.. cfgcmd:: set qos policy fq-codel <policy name> interval <miliseconds>
|
.. cfgcmd:: set qos policy fq-codel <policy name> interval <milliseconds>
|
||||||
|
|
||||||
Use this command to configure an fq-codel policy, set its name and
|
Use this command to configure an fq-codel policy, set its name and
|
||||||
the time period used by the control loop of CoDel to detect when a
|
the time period used by the control loop of CoDel to detect when a
|
||||||
@ -518,7 +518,7 @@ and increase `interval` to something around 150 ms.
|
|||||||
define a hard limit on the real queue size. When this limit is
|
define a hard limit on the real queue size. When this limit is
|
||||||
reached, new packets are dropped (default: 10240 packets).
|
reached, new packets are dropped (default: 10240 packets).
|
||||||
|
|
||||||
.. cfgcmd:: set qos policy fq-codel <policy-name> target <miliseconds>
|
.. cfgcmd:: set qos policy fq-codel <policy-name> target <milliseconds>
|
||||||
|
|
||||||
Use this command to configure an fq-codel policy, set its name, and
|
Use this command to configure an fq-codel policy, set its name, and
|
||||||
define the acceptable minimum standing/persistent queue delay. This
|
define the acceptable minimum standing/persistent queue delay. This
|
||||||
@ -710,7 +710,7 @@ continuously, packets from lower priority classes will only be
|
|||||||
transmitted after traffic volume from higher priority classes decreases.
|
transmitted after traffic volume from higher priority classes decreases.
|
||||||
|
|
||||||
|
|
||||||
.. note:: In Priority Queue we do not define clases with a meaningless
|
.. note:: In Priority Queue we do not define classes with a meaningless
|
||||||
class ID number but with a class priority number (1-7). The lower the
|
class ID number but with a class priority number (1-7). The lower the
|
||||||
number, the higher the priority.
|
number, the higher the priority.
|
||||||
|
|
||||||
@ -912,7 +912,7 @@ In principle, values must be
|
|||||||
Rate Control
|
Rate Control
|
||||||
------------
|
------------
|
||||||
|
|
||||||
| **Queueing discipline:** Tocken Bucket Filter.
|
| **Queueing discipline:** Token Bucket Filter.
|
||||||
| **Applies to:** Outbound traffic.
|
| **Applies to:** Outbound traffic.
|
||||||
|
|
||||||
Rate-Control is a classless policy that limits the packet flow to a set
|
Rate-Control is a classless policy that limits the packet flow to a set
|
||||||
|
|||||||
@ -43,7 +43,7 @@ then enslaved to a VRF device.
|
|||||||
Zebra/Kernel route filtering
|
Zebra/Kernel route filtering
|
||||||
----------------------------
|
----------------------------
|
||||||
|
|
||||||
Zebra supports prefix-lists and Route Mapss to match routes received from
|
Zebra supports prefix-lists and Route Maps to match routes received from
|
||||||
other FRR components. The permit/deny facilities provided by these commands
|
other FRR components. The permit/deny facilities provided by these commands
|
||||||
can be used to filter which routes zebra will install in the kernel.
|
can be used to filter which routes zebra will install in the kernel.
|
||||||
|
|
||||||
@ -72,7 +72,7 @@ Nexthop Tracking
|
|||||||
|
|
||||||
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
Nexthop tracking resolve nexthops via the default route by default. This is enabled
|
||||||
by default for a traditional profile of FRR which we use. It and can be disabled if
|
by default for a traditional profile of FRR which we use. It and can be disabled if
|
||||||
you do not wan't to e.g. allow BGP to peer across the default route.
|
you do not want to e.g. allow BGP to peer across the default route.
|
||||||
|
|
||||||
.. cfgcmd:: set vrf name <name> ip nht no-resolve-via-default
|
.. cfgcmd:: set vrf name <name> ip nht no-resolve-via-default
|
||||||
|
|
||||||
|
|||||||
@ -24,7 +24,7 @@ The VyOS implementation of RAID 1 allows the following:
|
|||||||
* The ability to replace a failed disk and initiate re-mirroring
|
* The ability to replace a failed disk and initiate re-mirroring
|
||||||
* The ability to monitor the status of remirroring
|
* The ability to monitor the status of remirroring
|
||||||
|
|
||||||
.. _raid_instalation:
|
.. _raid_installation:
|
||||||
|
|
||||||
Installation Implications
|
Installation Implications
|
||||||
=========================
|
=========================
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user