Merge pull request #1416 from Embezzle/spelling

Fix spelling mistakes across multiple files
This commit is contained in:
Daniil Baturin 2024-05-07 12:46:42 +02:00 committed by GitHub
commit ccc07b4601
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
28 changed files with 88 additions and 88 deletions

View File

@ -13,7 +13,7 @@ configuration is done only on one router.
Network Topology and requirements Network Topology and requirements
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This configuration example and the requirments consists of: This configuration example and the requirements consists of:
- Two VyOS routers with public IP address. - Two VyOS routers with public IP address.
@ -37,7 +37,7 @@ This configuration example and the requirments consists of:
- Allow all new connections from local subnets. - Allow all new connections from local subnets.
- Allow connections from LANs to LANs throught the tunnel. - Allow connections from LANs to LANs through the tunnel.
.. image:: /_static/images/policy-based-ipsec-and-firewall.png .. image:: /_static/images/policy-based-ipsec-and-firewall.png

View File

@ -69,7 +69,7 @@ Example 2: Failover based on interface weights
This example uses the failover mode. This example uses the failover mode.
.. _wan:example2_overwiew: .. _wan:example2_overview:
Overview Overview
^^^^^^^^ ^^^^^^^^
@ -98,7 +98,7 @@ The previous example used the failover command to send traffic through
eth1 if eth0 fails. In this example, failover functionality is provided eth1 if eth0 fails. In this example, failover functionality is provided
by rule order. by rule order.
.. _wan:example3_overwiew: .. _wan:example3_overview:
Overview Overview
^^^^^^^^ ^^^^^^^^
@ -129,7 +129,7 @@ traffic. It is assumed for this example that eth1 is connected to a
slower connection than eth0 and should prioritize VoIP traffic. slower connection than eth0 and should prioritize VoIP traffic.
.. _wan:example4_overwiew: .. _wan:example4_overview:
Overview Overview
^^^^^^^^ ^^^^^^^^

View File

@ -6,7 +6,7 @@ Zone-Policy example
------------------- -------------------
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall .. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
structure can be found on all vyos instalations, and zone based firewall is structure can be found on all vyos installations, and zone based firewall is
no longer supported. Documentation for most of the new firewall CLI can be no longer supported. Documentation for most of the new firewall CLI can be
found in the `firewall found in the `firewall
<https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_ <https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_

View File

@ -125,7 +125,7 @@ Configuration
- **net-bind-service**: Bind a socket to privileged ports (port numbers less than 1024) - **net-bind-service**: Bind a socket to privileged ports (port numbers less than 1024)
- **net-raw**: Permission to create raw network sockets - **net-raw**: Permission to create raw network sockets
- **setpcap**: Capability sets (from bounded or inherited set) - **setpcap**: Capability sets (from bounded or inherited set)
- **sys-admin**: Administation operations (quotactl, mount, sethostname, setdomainame) - **sys-admin**: Administration operations (quotactl, mount, sethostname, setdomainame)
- **sys-time**: Permission to set system clock - **sys-time**: Permission to set system clock
.. cfgcmd:: set container name <name> disable .. cfgcmd:: set container name <name> disable

View File

@ -13,7 +13,7 @@ Overview
******** ********
In this section there's useful information of all firewall configuration that In this section there's useful information of all firewall configuration that
can be done regarding bridge, and appropiate op-mode commands. can be done regarding bridge, and appropriate op-mode commands.
Configuration commands covered in this section: Configuration commands covered in this section:
.. cfgcmd:: set firewall bridge ... .. cfgcmd:: set firewall bridge ...
@ -37,13 +37,13 @@ for this layer is shown next:
.. figure:: /_static/images/firewall-bridge-packet-flow.png .. figure:: /_static/images/firewall-bridge-packet-flow.png
For traffic that needs to be forwared internally by the bridge, base chain is For traffic that needs to be forwarded internally by the bridge, base chain is
is **forward**, and it's base command for filtering is ``set firewall bridge is **forward**, and it's base command for filtering is ``set firewall bridge
forward filter ...``, which happens in stage 4, highlightened with red color. forward filter ...``, which happens in stage 4, highlighted with red color.
Custom bridge firewall chains can be create with command ``set firewall bridge Custom bridge firewall chains can be create with command ``set firewall bridge
name <name> ...``. In order to use such custom chain, a rule with action jump, name <name> ...``. In order to use such custom chain, a rule with action jump,
and the appropiate target should be defined in a base chain. and the appropriate target should be defined in a base chain.
.. note:: **Layer 3 bridge**: .. note:: **Layer 3 bridge**:
When an IP address is assigned to the bridge interface, and if traffic When an IP address is assigned to the bridge interface, and if traffic
@ -137,7 +137,7 @@ not match any rule in it's chain. For base chains, possible options for
.. cfgcmd:: set firewall bridge name <name> default-jump-target <text> .. cfgcmd:: set firewall bridge name <name> default-jump-target <text>
To be used only when ``defult-action`` is set to ``jump``. Use this To be used only when ``default-action`` is set to ``jump``. Use this
command to specify jump target for default rule. command to specify jump target for default rule.
.. note:: **Important note about default-actions:** .. note:: **Important note about default-actions:**
@ -236,9 +236,9 @@ There are a lot of matching criteria against which the packet can be tested.
.. cfgcmd:: set firewall bridge name <name> rule <1-999999> .. cfgcmd:: set firewall bridge name <name> rule <1-999999>
inbound-interface name <iface> inbound-interface name <iface>
Match based on inbound interface. Wilcard ``*`` can be used. Match based on inbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall bridge forward filter rule <1-999999> .. cfgcmd:: set firewall bridge forward filter rule <1-999999>
inbound-interface group <iface_group> inbound-interface group <iface_group>
@ -246,16 +246,16 @@ There are a lot of matching criteria against which the packet can be tested.
inbound-interface group <iface_group> inbound-interface group <iface_group>
Match based on inbound interface group. Prepending character ``!`` for Match based on inbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall bridge forward filter rule <1-999999> .. cfgcmd:: set firewall bridge forward filter rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
.. cfgcmd:: set firewall bridge name <name> rule <1-999999> .. cfgcmd:: set firewall bridge name <name> rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
Match based on outbound interface. Wilcard ``*`` can be used. Match based on outbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall bridge forward filter rule <1-999999> .. cfgcmd:: set firewall bridge forward filter rule <1-999999>
outbound-interface group <iface_group> outbound-interface group <iface_group>
@ -263,7 +263,7 @@ There are a lot of matching criteria against which the packet can be tested.
outbound-interface group <iface_group> outbound-interface group <iface_group>
Match based on outbound interface group. Prepending character ``!`` for Match based on outbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall bridge forward filter rule <1-999999> .. cfgcmd:: set firewall bridge forward filter rule <1-999999>
vlan id <0-4096> vlan id <0-4096>
@ -288,7 +288,7 @@ Rule-set overview
In this section you can find all useful firewall op-mode commands. In this section you can find all useful firewall op-mode commands.
General commands for firewall configuration, counter and statiscits: General commands for firewall configuration, counter and statistics:
.. opcmd:: show firewall .. opcmd:: show firewall
.. opcmd:: show firewall summary .. opcmd:: show firewall summary

View File

@ -99,20 +99,20 @@ Creating rules for using flow tables:
Configuration Example Configuration Example
********************* *********************
Things to be considred in this setup: Things to be considered in this setup:
* Two interfaces are going to be used in the flowtables: eth0 and eth1 * Two interfaces are going to be used in the flowtables: eth0 and eth1
* Minumum firewall ruleset is provided, which includes some filtering rules, * Minimum firewall ruleset is provided, which includes some filtering rules,
and appropiate rules for using flowtable offload capabilities. and appropriate rules for using flowtable offload capabilities.
As described, first packet will be evaluated by all the firewall path, so As described, first packet will be evaluated by all the firewall path, so
desired connection should be explicitely accepted. Same thing should be taken desired connection should be explicitly accepted. Same thing should be taken
into account for traffic in reverse order. In most cases state policies are into account for traffic in reverse order. In most cases state policies are
used in order to accept connection in reverse patch. used in order to accept connection in reverse patch.
We will only accept traffic comming from interface eth0, protocol tcp and We will only accept traffic coming from interface eth0, protocol tcp and
destination port 1122. All other traffic traspassing the router should be destination port 1122. All other traffic trespassing the router should be
blocked. blocked.
Commands Commands

View File

@ -24,7 +24,7 @@ firewall are covered below:
where the packet was received is part of a bridge, or not. where the packet was received is part of a bridge, or not.
If the interface where the packet was received isn't part of a bridge, then If the interface where the packet was received isn't part of a bridge, then
packetis processed at the **IP Layer**: packet is processed at the **IP Layer**:
* **Prerouting**: several actions can be done in this stage, and currently * **Prerouting**: several actions can be done in this stage, and currently
these actions are defined in different parts in VyOS configuration. Order these actions are defined in different parts in VyOS configuration. Order
@ -65,7 +65,7 @@ packetis processed at the **IP Layer**:
* **Output**: stage where traffic that originates from the router itself * **Output**: stage where traffic that originates from the router itself
can be filtered and controlled. Bear in mind that this traffic can be a can be filtered and controlled. Bear in mind that this traffic can be a
new connection originated by a internal process running on VyOS router, new connection originated by a internal process running on VyOS router,
such as NTP, or a response to traffic received externaly through such as NTP, or a response to traffic received externally through
**input** (for example response to an ssh login attempt to the router). **input** (for example response to an ssh login attempt to the router).
This includes ipv4 and ipv6 filtering rules, defined in: This includes ipv4 and ipv6 filtering rules, defined in:
@ -84,7 +84,7 @@ If the interface where the packet was received is part of a bridge, then
the packet is processed at the **Bridge Layer**, which contains a basic setup for the packet is processed at the **Bridge Layer**, which contains a basic setup for
bridge filtering: bridge filtering:
* **Forward (Bridge)**: stage where traffic that is trespasing through the * **Forward (Bridge)**: stage where traffic that is trespassing through the
bridge is filtered and controlled: bridge is filtered and controlled:
* ``set firewall bridge forward filter ...``. * ``set firewall bridge forward filter ...``.

View File

@ -11,7 +11,7 @@ Overview
******** ********
In this section there's useful information of all firewall configuration that In this section there's useful information of all firewall configuration that
can be done regarding IPv4, and appropiate op-mode commands. can be done regarding IPv4, and appropriate op-mode commands.
Configuration commands covered in this section: Configuration commands covered in this section:
.. cfgcmd:: set firewall ipv4 ... .. cfgcmd:: set firewall ipv4 ...
@ -41,12 +41,12 @@ next:
Where firewall base chain to configure firewall filtering rules for transit Where firewall base chain to configure firewall filtering rules for transit
traffic is ``set firewall ipv4 forward filter ...``, which happens in stage 5, traffic is ``set firewall ipv4 forward filter ...``, which happens in stage 5,
highlightened with red color. highlighted with red color.
For traffic towards the router itself, base chain is **input**, while traffic For traffic towards the router itself, base chain is **input**, while traffic
originated by the router, base chain is **output**. originated by the router, base chain is **output**.
A new simplified packet flow diagram is shown next, which shows the path A new simplified packet flow diagram is shown next, which shows the path
for traffic destinated to the router itself, and traffic generated by the for traffic destined to the router itself, and traffic generated by the
router (starting from circle number 6): router (starting from circle number 6):
.. figure:: /_static/images/firewall-input-packet-flow.png .. figure:: /_static/images/firewall-input-packet-flow.png
@ -64,7 +64,7 @@ output filter ...``
Custom firewall chains can be created, with commands Custom firewall chains can be created, with commands
``set firewall ipv4 name <name> ...``. In order to use ``set firewall ipv4 name <name> ...``. In order to use
such custom chain, a rule with **action jump**, and the appropiate **target** such custom chain, a rule with **action jump**, and the appropriate **target**
should be defined in a base chain. should be defined in a base chain.
********************* *********************
@ -184,7 +184,7 @@ not match any rule in it's chain. For base chains, possible options for
.. cfgcmd:: set firewall ipv4 name <name> default-jump-target <text> .. cfgcmd:: set firewall ipv4 name <name> default-jump-target <text>
To be used only when ``defult-action`` is set to ``jump``. Use this To be used only when ``default-action`` is set to ``jump``. Use this
command to specify jump target for default rule. command to specify jump target for default rule.
.. note:: **Important note about default-actions:** .. note:: **Important note about default-actions:**
@ -683,9 +683,9 @@ geoip) to keep database and rules updated.
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> .. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
inbound-interface name <iface> inbound-interface name <iface>
Match based on inbound interface. Wilcard ``*`` can be used. Match based on inbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
inbound-interface group <iface_group> inbound-interface group <iface_group>
@ -695,7 +695,7 @@ geoip) to keep database and rules updated.
inbound-interface group <iface_group> inbound-interface group <iface_group>
Match based on inbound interface group. Prepending character ``!`` for Match based on inbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
@ -704,9 +704,9 @@ geoip) to keep database and rules updated.
.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> .. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
Match based on outbound interface. Wilcard ``*`` can be used. Match based on outbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
outbound-interface group <iface_group> outbound-interface group <iface_group>
@ -716,7 +716,7 @@ geoip) to keep database and rules updated.
outbound-interface group <iface_group> outbound-interface group <iface_group>
Match based on outbound interface group. Prepending character ``!`` for Match based on outbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
ipsec [match-ipsec | match-none] ipsec [match-ipsec | match-none]

View File

@ -11,7 +11,7 @@ Overview
******** ********
In this section there's useful information of all firewall configuration that In this section there's useful information of all firewall configuration that
can be done regarding IPv6, and appropiate op-mode commands. can be done regarding IPv6, and appropriate op-mode commands.
Configuration commands covered in this section: Configuration commands covered in this section:
.. cfgcmd:: set firewall ipv6 ... .. cfgcmd:: set firewall ipv6 ...
@ -41,12 +41,12 @@ next:
Where firewall base chain to configure firewall filtering rules for transit Where firewall base chain to configure firewall filtering rules for transit
traffic is ``set firewall ipv6 forward filter ...``, which happens in stage 5, traffic is ``set firewall ipv6 forward filter ...``, which happens in stage 5,
highlightened with red color. highlighted with red color.
For traffic towards the router itself, base chain is **input**, while traffic For traffic towards the router itself, base chain is **input**, while traffic
originated by the router, base chain is **output**. originated by the router, base chain is **output**.
A new simplified packet flow diagram is shown next, which shows the path A new simplified packet flow diagram is shown next, which shows the path
for traffic destinated to the router itself, and traffic generated by the for traffic destined to the router itself, and traffic generated by the
router (starting from circle number 6): router (starting from circle number 6):
.. figure:: /_static/images/firewall-input-packet-flow.png .. figure:: /_static/images/firewall-input-packet-flow.png
@ -64,7 +64,7 @@ output filter ...``
Custom firewall chains can be created, with commands Custom firewall chains can be created, with commands
``set firewall ipv6 name <name> ...``. In order to use ``set firewall ipv6 name <name> ...``. In order to use
such custom chain, a rule with **action jump**, and the appropiate **target** such custom chain, a rule with **action jump**, and the appropriate **target**
should be defined in a base chain. should be defined in a base chain.
****************************** ******************************
@ -184,7 +184,7 @@ not match any rule in it's chain. For base chains, possible options for
.. cfgcmd:: set firewall ipv6 name <name> default-jump-target <text> .. cfgcmd:: set firewall ipv6 name <name> default-jump-target <text>
To be used only when ``defult-action`` is set to ``jump``. Use this To be used only when ``default-action`` is set to ``jump``. Use this
command to specify jump target for default rule. command to specify jump target for default rule.
.. note:: **Important note about default-actions:** .. note:: **Important note about default-actions:**
@ -670,9 +670,9 @@ geoip) to keep database and rules updated.
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999> .. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
inbound-interface name <iface> inbound-interface name <iface>
Match based on inbound interface. Wilcard ``*`` can be used. Match based on inbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
inbound-interface group <iface_group> inbound-interface group <iface_group>
@ -682,7 +682,7 @@ geoip) to keep database and rules updated.
inbound-interface group <iface_group> inbound-interface group <iface_group>
Match based on inbound interface group. Prepending character ``!`` for Match based on inbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
@ -691,9 +691,9 @@ geoip) to keep database and rules updated.
.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999> .. cfgcmd:: set firewall ipv6 name <name> rule <1-999999>
outbound-interface name <iface> outbound-interface name <iface>
Match based on outbound interface. Wilcard ``*`` can be used. Match based on outbound interface. Wildcard ``*`` can be used.
For example: ``eth2*``. Prepending character ``!`` for inverted matching For example: ``eth2*``. Prepending character ``!`` for inverted matching
criteria is also supportd. For example ``!eth2`` criteria is also supported. For example ``!eth2``
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
outbound-interface group <iface_group> outbound-interface group <iface_group>
@ -703,7 +703,7 @@ geoip) to keep database and rules updated.
outbound-interface group <iface_group> outbound-interface group <iface_group>
Match based on outbound interface group. Prepending character ``!`` for Match based on outbound interface group. Prepending character ``!`` for
inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` inverted matching criteria is also supported. For example ``!IFACE_GROUP``
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999> .. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
ipsec [match-ipsec | match-none] ipsec [match-ipsec | match-none]

View File

@ -11,7 +11,7 @@ Overview
******** ********
.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall .. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall
structure can be found on all vyos instalations. Zone based firewall was structure can be found on all VyOS installations. Zone based firewall was
removed in that version, but re introduced in VyOS 1.4 and 1.5. All removed in that version, but re introduced in VyOS 1.4 and 1.5. All
versions built after 2023-10-22 has this feature. versions built after 2023-10-22 has this feature.
Documentation for most of the new firewall CLI can be Documentation for most of the new firewall CLI can be

View File

@ -8,7 +8,7 @@
PKI PKI
### ###
VyOS 1.4 changed the way in how encrytion keys or certificates are stored on the VyOS 1.4 changed the way in how encryption keys or certificates are stored on the
system. In the pre VyOS 1.4 era, certificates got stored under /config and every system. In the pre VyOS 1.4 era, certificates got stored under /config and every
service referenced a file. That made copying a running configuration from system service referenced a file. That made copying a running configuration from system
A to system B a bit harder, as you had to copy the files and their permissions A to system B a bit harder, as you had to copy the files and their permissions
@ -120,12 +120,12 @@ OpenVPN
.. opcmd:: generate pki openvpn shared-secret .. opcmd:: generate pki openvpn shared-secret
Genearate a new OpenVPN shared secret. The generated secret is the output to Generate a new OpenVPN shared secret. The generated secret is the output to
the console. the console.
.. opcmd:: generate pki openvpn shared-secret install <name> .. opcmd:: generate pki openvpn shared-secret install <name>
Genearate a new OpenVPN shared secret. The generated secret is the output to Generate a new OpenVPN shared secret. The generated secret is the output to
the console. the console.
.. include:: pki_cli_import_help.txt .. include:: pki_cli_import_help.txt
@ -163,7 +163,7 @@ WireGuard
the output from op-mode into configuration mode. the output from op-mode into configuration mode.
``peer`` is used for the VyOS CLI command to identify the WireGuard peer where ``peer`` is used for the VyOS CLI command to identify the WireGuard peer where
this secred is to be used. this secret is to be used.
Key usage (CLI) Key usage (CLI)
=============== ===============

View File

@ -12,7 +12,7 @@ interior gateway protocol (IGP) which is described in ISO10589,
algorithm to create a database of the networks topology, and algorithm to create a database of the networks topology, and
from that database to determine the best (that is, lowest cost) path to a from that database to determine the best (that is, lowest cost) path to a
destination. The intermediate systems (the name for routers) exchange topology destination. The intermediate systems (the name for routers) exchange topology
information with their directly conencted neighbors. IS-IS runs directly on information with their directly connected neighbors. IS-IS runs directly on
the data link layer (Layer 2). IS-IS addresses are called the data link layer (Layer 2). IS-IS addresses are called
:abbr:`NETs (Network Entity Titles)` and can be 8 to 20 bytes long, but are :abbr:`NETs (Network Entity Titles)` and can be 8 to 20 bytes long, but are
generally 10 bytes long. The tree database that is created with IS-IS is generally 10 bytes long. The tree database that is created with IS-IS is
@ -39,7 +39,7 @@ occur within IS-IS when it comes to said duplication.
.. cfgcmd:: set protocols isis net <network-entity-title> .. cfgcmd:: set protocols isis net <network-entity-title>
This commad sets network entity title (NET) provided in ISO format. This command sets network entity title (NET) provided in ISO format.
Here is an example :abbr:`NET (Network Entity Title)` value: Here is an example :abbr:`NET (Network Entity Title)` value:
@ -52,9 +52,9 @@ occur within IS-IS when it comes to said duplication.
* :abbr:`AFI (Address family authority identifier)` - ``49`` The AFI value * :abbr:`AFI (Address family authority identifier)` - ``49`` The AFI value
49 is what IS-IS uses for private addressing. 49 is what IS-IS uses for private addressing.
* Area identifier: ``0001`` IS-IS area number (numberical area ``1``) * Area identifier: ``0001`` IS-IS area number (numerical area ``1``)
* System identifier: ``1921.6800.1002`` - for system idetifiers we recommend * System identifier: ``1921.6800.1002`` - for system identifiers we recommend
to use IP address or MAC address of the router itself. The way to construct to use IP address or MAC address of the router itself. The way to construct
this is to keep all of the zeroes of the router IP address, and then change this is to keep all of the zeroes of the router IP address, and then change
the periods from being every three numbers to every four numbers. The the periods from being every three numbers to every four numbers. The

View File

@ -20,7 +20,7 @@ Configuration
.. cfgcmd:: set service broadcast-relay id <n> description <description> .. cfgcmd:: set service broadcast-relay id <n> description <description>
A description can be added for each and every unique relay ID. This is A description can be added for each and every unique relay ID. This is
useful to distinguish between multiple different ports/appliactions. useful to distinguish between multiple different ports/applications.
.. cfgcmd:: set service broadcast-relay id <n> interface <interface> .. cfgcmd:: set service broadcast-relay id <n> interface <interface>
@ -35,7 +35,7 @@ Configuration
.. cfgcmd:: set service broadcast-relay id <n> port <port> .. cfgcmd:: set service broadcast-relay id <n> port <port>
The UDP port number used by your apllication. It is mandatory for this kind The UDP port number used by your application. It is mandatory for this kind
of operation. of operation.
.. cfgcmd:: set service broadcast-relay id <n> disable .. cfgcmd:: set service broadcast-relay id <n> disable

View File

@ -29,7 +29,7 @@ will be mandatorily defragmented.
It is possible to use either Multicast or Unicast to sync conntrack traffic. It is possible to use either Multicast or Unicast to sync conntrack traffic.
Most examples below show Multicast, but unicast can be specified by using the Most examples below show Multicast, but unicast can be specified by using the
"peer" keywork after the specificed interface, as in the following example: "peer" keywork after the specified interface, as in the following example:
:cfgcmd:`set service conntrack-sync interface eth0 peer 192.168.0.250` :cfgcmd:`set service conntrack-sync interface eth0 peer 192.168.0.250`
@ -204,7 +204,7 @@ Now configure conntrack-sync service on ``router1`` **and** ``router2``
.. code-block:: none .. code-block:: none
set high-availablilty vrrp group internal virtual-address ... etc ... set high-availability vrrp group internal virtual-address ... etc ...
set high-availability vrrp sync-group syncgrp member 'internal' set high-availability vrrp sync-group syncgrp member 'internal'
set service conntrack-sync accept-protocol 'tcp' set service conntrack-sync accept-protocol 'tcp'
set service conntrack-sync accept-protocol 'udp' set service conntrack-sync accept-protocol 'udp'

View File

@ -33,7 +33,7 @@ Configuration
Configure direction for processing traffic. Configure direction for processing traffic.
.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x> .. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x>
.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x> .. cfgcmd:: set service ids ddos-protection exclude-network <h:h:h:h:h:h:h:h/x>
Specify IPv4 and/or IPv6 networks which are going to be excluded. Specify IPv4 and/or IPv6 networks which are going to be excluded.
@ -56,7 +56,7 @@ Configuration
.. cfgcmd:: set service ids ddos-protection sflow port <1-65535> .. cfgcmd:: set service ids ddos-protection sflow port <1-65535>
Configure port number to be used for sflow conection. Default port is 6343. Configure port number to be used for sflow connection. Default port is 6343.
.. cfgcmd:: set service ids ddos-protection threshold general .. cfgcmd:: set service ids ddos-protection threshold general
[fps | mbps | pps] <0-4294967294> [fps | mbps | pps] <0-4294967294>
@ -96,7 +96,7 @@ In this simplified scenario, main things to be considered are:
* Interface **eth0** used to connect to upstream. * Interface **eth0** used to connect to upstream.
Since we are analyzing attacks to and from our internal network, two types Since we are analyzing attacks to and from our internal network, two types
of attacks can be identified, and differents actions are needed: of attacks can be identified, and different actions are needed:
* External attack: an attack from the internet towards an internal IP * External attack: an attack from the internet towards an internal IP
is identify. In this case, all connections towards such IP will be is identify. In this case, all connections towards such IP will be

View File

@ -38,7 +38,7 @@ Configuration
"Cur Hop Limit", "hop-limit", "Hop count field of the outgoing RA packets" "Cur Hop Limit", "hop-limit", "Hop count field of the outgoing RA packets"
"""Managed address configuration"" flag", "managed-flag", "Tell hosts to use the administered stateful protocol (i.e. DHCP) for autoconfiguration" """Managed address configuration"" flag", "managed-flag", "Tell hosts to use the administered stateful protocol (i.e. DHCP) for autoconfiguration"
"""Other configuration"" flag", "other-config-flag", "Tell hosts to use the administered (stateful) protocol (i.e. DHCP) for autoconfiguration of other (non-address) information" """Other configuration"" flag", "other-config-flag", "Tell hosts to use the administered (stateful) protocol (i.e. DHCP) for autoconfiguration of other (non-address) information"
"MTU","link-mtu","Link MTU value placed in RAs, exluded in RAs if unset" "MTU","link-mtu","Link MTU value placed in RAs, excluded in RAs if unset"
"Router Lifetime","default-lifetime","Lifetime associated with the default router in units of seconds" "Router Lifetime","default-lifetime","Lifetime associated with the default router in units of seconds"
"Reachable Time","reachable-time","Time, in milliseconds, that a node assumes a neighbor is reachable after having received a reachability confirmation" "Reachable Time","reachable-time","Time, in milliseconds, that a node assumes a neighbor is reachable after having received a reachability confirmation"
"Retransmit Timer","retrans-timer","Time in milliseconds between retransmitted Neighbor Solicitation messages" "Retransmit Timer","retrans-timer","Time in milliseconds between retransmitted Neighbor Solicitation messages"

View File

@ -17,7 +17,7 @@ Requirements
************ ************
To use the Salt-Minion, a running Salt-Master is required. You can find more To use the Salt-Minion, a running Salt-Master is required. You can find more
in the `Salt Poject Documentaion in the `Salt Project Documentation
<https://docs.saltproject.io/en/latest/contents.html>`_ <https://docs.saltproject.io/en/latest/contents.html>`_
************* *************

View File

@ -94,7 +94,7 @@ states.
.. cfgcmd:: set system conntrack timeout udp stream <1-21474836> .. cfgcmd:: set system conntrack timeout udp stream <1-21474836>
:defaultvalue: :defaultvalue:
Set the timeout in secounds for a protocol or state. Set the timeout in seconds for a protocol or state.
You can also define custom timeout values to apply to a specific subset of You can also define custom timeout values to apply to a specific subset of
connections, based on a packet and flow selector. To do this, you need to connections, based on a packet and flow selector. To do this, you need to
@ -172,7 +172,7 @@ create a rule defining the packet and flow selector.
.. cfgcmd:: set system conntrack timeout custom [ipv4 | ipv6] rule <1-999999> .. cfgcmd:: set system conntrack timeout custom [ipv4 | ipv6] rule <1-999999>
protocol udp unreplied <1-21474836> protocol udp unreplied <1-21474836>
Set the timeout in secounds for a protocol or state in a custom rule. Set the timeout in seconds for a protocol or state in a custom rule.
Conntrack ignore rules Conntrack ignore rules
====================== ======================

View File

@ -50,7 +50,7 @@ interface, the interface must be configured for flow accounting.
Configure and enable collection of flow information for the interface Configure and enable collection of flow information for the interface
identified by `<interface>`. identified by `<interface>`.
You can configure multiple interfaces which whould participate in flow You can configure multiple interfaces which would participate in flow
accounting. accounting.
.. note:: Will be recorded only packets/flows on **incoming** direction in .. note:: Will be recorded only packets/flows on **incoming** direction in

View File

@ -30,7 +30,7 @@ System configuration commands
Zebra/Kernel route filtering Zebra/Kernel route filtering
^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Zebra supports prefix-lists and Route Mapss to match routes received from Zebra supports prefix-lists and Route Maps to match routes received from
other FRR components. The permit/deny facilities provided by these commands other FRR components. The permit/deny facilities provided by these commands
can be used to filter which routes zebra will install in the kernel. can be used to filter which routes zebra will install in the kernel.
@ -48,7 +48,7 @@ Nexthop Tracking
Nexthop tracking resolve nexthops via the default route by default. This is enabled Nexthop tracking resolve nexthops via the default route by default. This is enabled
by default for a traditional profile of FRR which we use. It and can be disabled if by default for a traditional profile of FRR which we use. It and can be disabled if
you do not wan't to e.g. allow BGP to peer across the default route. you do not want to e.g. allow BGP to peer across the default route.
.. cfgcmd:: set system ip nht no-resolve-via-default .. cfgcmd:: set system ip nht no-resolve-via-default

View File

@ -26,7 +26,7 @@ System configuration commands
Zebra/Kernel route filtering Zebra/Kernel route filtering
^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Zebra supports prefix-lists and Route Mapss to match routes received from Zebra supports prefix-lists and Route Maps to match routes received from
other FRR components. The permit/deny facilities provided by these commands other FRR components. The permit/deny facilities provided by these commands
can be used to filter which routes zebra will install in the kernel. can be used to filter which routes zebra will install in the kernel.
@ -44,7 +44,7 @@ Nexthop Tracking
Nexthop tracking resolve nexthops via the default route by default. This is enabled Nexthop tracking resolve nexthops via the default route by default. This is enabled
by default for a traditional profile of FRR which we use. It and can be disabled if by default for a traditional profile of FRR which we use. It and can be disabled if
you do not wan't to e.g. allow BGP to peer across the default route. you do not want to e.g. allow BGP to peer across the default route.
.. cfgcmd:: set system ipv6 nht no-resolve-via-default .. cfgcmd:: set system ipv6 nht no-resolve-via-default

View File

@ -88,7 +88,7 @@ Keyboard Layout
*************** ***************
When starting a VyOS live system (the installation CD) the configured keyboard When starting a VyOS live system (the installation CD) the configured keyboard
layout defaults to US. As this might not suite everyones use case you can adjust layout defaults to US. As this might not suite everyone's use case you can adjust
the used keyboard layout on the system console. the used keyboard layout on the system console.
.. cfgcmd:: set system option keyboard-layout <us | fr | de | fi | no | dk> .. cfgcmd:: set system option keyboard-layout <us | fr | de | fi | no | dk>

View File

@ -29,7 +29,7 @@ Configuration
Configure and enable collection of flow information for the interface identified by <interface>. Configure and enable collection of flow information for the interface identified by <interface>.
You can configure multiple interfaces which whould participate in sflow accounting. You can configure multiple interfaces which would participate in sflow accounting.
.. cfgcmd:: set system sflow polling <sec> .. cfgcmd:: set system sflow polling <sec>

View File

@ -45,7 +45,7 @@ Custom File
.. cfgcmd:: set system syslog file <filename> archive file <number> .. cfgcmd:: set system syslog file <filename> archive file <number>
Syslog uses logrotate to rotate logiles after a number of gives bytes. Syslog uses logrotate to rotate logfiles after a number of gives bytes.
We keep as many as `<number>` rotated file before they are deleted on the We keep as many as `<number>` rotated file before they are deleted on the
system. system.
@ -200,7 +200,7 @@ Display Logs
.. opcmd:: show log [all | authorization | cluster | conntrack-sync | ...] .. opcmd:: show log [all | authorization | cluster | conntrack-sync | ...]
Display log files of given category on the console. Use tab completion to get Display log files of given category on the console. Use tab completion to get
a list of available categories. Thos categories could be: all, authorization, a list of available categories. Those categories could be: all, authorization,
cluster, conntrack-sync, dhcp, directory, dns, file, firewall, https, image cluster, conntrack-sync, dhcp, directory, dns, file, firewall, https, image
lldp, nat, openvpn, snmp, tail, vpn, vrrp lldp, nat, openvpn, snmp, tail, vpn, vrrp

View File

@ -7,7 +7,7 @@ Task Scheduler
The task scheduler allows you to execute tasks on a given schedule. It makes The task scheduler allows you to execute tasks on a given schedule. It makes
use of UNIX cron_. use of UNIX cron_.
.. note:: All scripts excecuted this way are executed as root user - this may .. note:: All scripts executed this way are executed as root user - this may
be dangerous. Together with :ref:`command-scripting` this can be used for be dangerous. Together with :ref:`command-scripting` this can be used for
automating (re-)configuration. automating (re-)configuration.

View File

@ -368,7 +368,7 @@ are to be sent, they could get dropped when trying to get enqueued at
the tail. This can happen if the queue has still not been able to the tail. This can happen if the queue has still not been able to
release enough packets from its head. release enough packets from its head.
This is the policy that requieres the lowest resources for the same This is the policy that requires the lowest resources for the same
amount of traffic. But **very likely you do not need it as you cannot amount of traffic. But **very likely you do not need it as you cannot
get much from it. Sometimes it is used just to enable logging.** get much from it. Sometimes it is used just to enable logging.**
@ -504,7 +504,7 @@ and increase `interval` to something around 150 ms.
the number of sub-queues (default: 1024) into which packets are the number of sub-queues (default: 1024) into which packets are
classified. classified.
.. cfgcmd:: set qos policy fq-codel <policy name> interval <miliseconds> .. cfgcmd:: set qos policy fq-codel <policy name> interval <milliseconds>
Use this command to configure an fq-codel policy, set its name and Use this command to configure an fq-codel policy, set its name and
the time period used by the control loop of CoDel to detect when a the time period used by the control loop of CoDel to detect when a
@ -518,7 +518,7 @@ and increase `interval` to something around 150 ms.
define a hard limit on the real queue size. When this limit is define a hard limit on the real queue size. When this limit is
reached, new packets are dropped (default: 10240 packets). reached, new packets are dropped (default: 10240 packets).
.. cfgcmd:: set qos policy fq-codel <policy-name> target <miliseconds> .. cfgcmd:: set qos policy fq-codel <policy-name> target <milliseconds>
Use this command to configure an fq-codel policy, set its name, and Use this command to configure an fq-codel policy, set its name, and
define the acceptable minimum standing/persistent queue delay. This define the acceptable minimum standing/persistent queue delay. This
@ -710,7 +710,7 @@ continuously, packets from lower priority classes will only be
transmitted after traffic volume from higher priority classes decreases. transmitted after traffic volume from higher priority classes decreases.
.. note:: In Priority Queue we do not define clases with a meaningless .. note:: In Priority Queue we do not define classes with a meaningless
class ID number but with a class priority number (1-7). The lower the class ID number but with a class priority number (1-7). The lower the
number, the higher the priority. number, the higher the priority.
@ -912,7 +912,7 @@ In principle, values must be
Rate Control Rate Control
------------ ------------
| **Queueing discipline:** Tocken Bucket Filter. | **Queueing discipline:** Token Bucket Filter.
| **Applies to:** Outbound traffic. | **Applies to:** Outbound traffic.
Rate-Control is a classless policy that limits the packet flow to a set Rate-Control is a classless policy that limits the packet flow to a set

View File

@ -43,7 +43,7 @@ then enslaved to a VRF device.
Zebra/Kernel route filtering Zebra/Kernel route filtering
---------------------------- ----------------------------
Zebra supports prefix-lists and Route Mapss to match routes received from Zebra supports prefix-lists and Route Maps to match routes received from
other FRR components. The permit/deny facilities provided by these commands other FRR components. The permit/deny facilities provided by these commands
can be used to filter which routes zebra will install in the kernel. can be used to filter which routes zebra will install in the kernel.
@ -72,7 +72,7 @@ Nexthop Tracking
Nexthop tracking resolve nexthops via the default route by default. This is enabled Nexthop tracking resolve nexthops via the default route by default. This is enabled
by default for a traditional profile of FRR which we use. It and can be disabled if by default for a traditional profile of FRR which we use. It and can be disabled if
you do not wan't to e.g. allow BGP to peer across the default route. you do not want to e.g. allow BGP to peer across the default route.
.. cfgcmd:: set vrf name <name> ip nht no-resolve-via-default .. cfgcmd:: set vrf name <name> ip nht no-resolve-via-default

View File

@ -24,7 +24,7 @@ The VyOS implementation of RAID 1 allows the following:
* The ability to replace a failed disk and initiate re-mirroring * The ability to replace a failed disk and initiate re-mirroring
* The ability to monitor the status of remirroring * The ability to monitor the status of remirroring
.. _raid_instalation: .. _raid_installation:
Installation Implications Installation Implications
========================= =========================