mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
ipsec-interface: syntax correction
The command to set the vpn interface is changed in the rolling release which is not modified in many configuration examples, corrected syntax in all pages where it is mentioned
This commit is contained in:
parent
86f8017a80
commit
da88a7dadc
@ -81,7 +81,7 @@ Vyos configuration
|
|||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
|
|
||||||
- Configure a VTI with a dummy IP address
|
- Configure a VTI with a dummy IP address
|
||||||
|
|
||||||
|
|||||||
@ -80,7 +80,7 @@ Vyos configuration
|
|||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
|
|
||||||
- Configure two VTIs with a dummy IP address each
|
- Configure two VTIs with a dummy IP address each
|
||||||
|
|
||||||
|
|||||||
@ -141,7 +141,7 @@ IPSec:
|
|||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces <VPN-interface>
|
set vpn ipsec interface <VPN-interface>
|
||||||
set vpn ipsec esp-group test-ESP-1 compression 'disable'
|
set vpn ipsec esp-group test-ESP-1 compression 'disable'
|
||||||
set vpn ipsec esp-group test-ESP-1 lifetime '3600'
|
set vpn ipsec esp-group test-ESP-1 lifetime '3600'
|
||||||
set vpn ipsec esp-group test-ESP-1 mode 'transport'
|
set vpn ipsec esp-group test-ESP-1 mode 'transport'
|
||||||
|
|||||||
@ -13,7 +13,7 @@ the routing table and balances traffic across the configured interfaces,
|
|||||||
determined by interface health and weight.
|
determined by interface health and weight.
|
||||||
|
|
||||||
|
|
||||||
In a minimal, configuration the following must be provided:
|
In a minimal configuration, the following must be provided:
|
||||||
|
|
||||||
* an interface with a nexthop
|
* an interface with a nexthop
|
||||||
* one rule with a LAN (inbound-interface) and the WAN (interface).
|
* one rule with a LAN (inbound-interface) and the WAN (interface).
|
||||||
|
|||||||
@ -684,7 +684,7 @@ external interface in the image above)
|
|||||||
set vpn ipsec esp-group my-esp proposal 1 encryption 'aes256'
|
set vpn ipsec esp-group my-esp proposal 1 encryption 'aes256'
|
||||||
set vpn ipsec esp-group my-esp proposal 1 hash 'sha256'
|
set vpn ipsec esp-group my-esp proposal 1 hash 'sha256'
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth1'
|
set vpn ipsec interface 'eth1'
|
||||||
|
|
||||||
IPSec VPN Tunnels
|
IPSec VPN Tunnels
|
||||||
"""""""""""""""""
|
"""""""""""""""""
|
||||||
|
|||||||
@ -69,7 +69,7 @@ Side A:
|
|||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '14'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '14'
|
||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 encryption 'aes256'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 encryption 'aes256'
|
||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 hash 'sha256'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 hash 'sha256'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.1 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 10.10.10.1 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.1 authentication pre-shared-secret 'Qwerty123'
|
set vpn ipsec site-to-site peer 10.10.10.1 authentication pre-shared-secret 'Qwerty123'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.1 connection-type 'initiate'
|
set vpn ipsec site-to-site peer 10.10.10.1 connection-type 'initiate'
|
||||||
@ -88,7 +88,7 @@ Side B:
|
|||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '14'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '14'
|
||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 encryption 'aes256'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 encryption 'aes256'
|
||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 hash 'sha256'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 hash 'sha256'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.2 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 10.10.10.2 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.2 authentication pre-shared-secret 'Qwerty123'
|
set vpn ipsec site-to-site peer 10.10.10.2 authentication pre-shared-secret 'Qwerty123'
|
||||||
set vpn ipsec site-to-site peer 10.10.10.2 connection-type 'initiate'
|
set vpn ipsec site-to-site peer 10.10.10.2 connection-type 'initiate'
|
||||||
@ -143,4 +143,4 @@ increases.
|
|||||||
[ 9] 0.00-10.01 sec 925 MBytes 775 Mbits/sec receiver
|
[ 9] 0.00-10.01 sec 925 MBytes 775 Mbits/sec receiver
|
||||||
|
|
||||||
|
|
||||||
.. _`Intel® QAT`: https://www.intel.com/content/www/us/en/architecture-and-technology/intel-quick-assist-technology-overview.html
|
.. _`Intel® QAT`: https://www.intel.com/content/www/us/en/architecture-and-technology/intel-quick-assist-technology-overview.html
|
||||||
|
|||||||
@ -218,7 +218,7 @@ Hub
|
|||||||
set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128'
|
set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128'
|
||||||
set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1'
|
set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1'
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
|
|
||||||
set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
|
set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
|
set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
|
||||||
@ -328,7 +328,7 @@ VyOS can also run in DMVPN spoke mode.
|
|||||||
set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128'
|
set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128'
|
||||||
set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1'
|
set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1'
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0'
|
set vpn ipsec interface 'eth0'
|
||||||
|
|
||||||
set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
|
set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
|
set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret'
|
||||||
|
|||||||
@ -198,7 +198,7 @@ On the LEFT:
|
|||||||
set interfaces tunnel tun0 address 10.10.10.1/30
|
set interfaces tunnel tun0 address 10.10.10.1/30
|
||||||
|
|
||||||
## IPsec
|
## IPsec
|
||||||
set vpn ipsec ipsec-interfaces interface eth0
|
set vpn ipsec interface eth0
|
||||||
|
|
||||||
# IKE group
|
# IKE group
|
||||||
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '2'
|
set vpn ipsec ike-group MyIKEGroup proposal 1 dh-group '2'
|
||||||
|
|||||||
@ -14,7 +14,7 @@ with native Windows and Mac VPN clients):
|
|||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
set vpn ipsec ipsec-interfaces interface eth0
|
set vpn ipsec interface eth0
|
||||||
|
|
||||||
set vpn l2tp remote-access outside-address 192.0.2.2
|
set vpn l2tp remote-access outside-address 192.0.2.2
|
||||||
set vpn l2tp remote-access client-ip-pool start 192.168.255.2
|
set vpn l2tp remote-access client-ip-pool start 192.168.255.2
|
||||||
@ -24,7 +24,7 @@ with native Windows and Mac VPN clients):
|
|||||||
set vpn l2tp remote-access authentication mode local
|
set vpn l2tp remote-access authentication mode local
|
||||||
set vpn l2tp remote-access authentication local-users username test password 'test'
|
set vpn l2tp remote-access authentication local-users username test password 'test'
|
||||||
|
|
||||||
In the example above an external IP of 192.0.2.2 is assumed.
|
In the above example, an external IP of 192.0.2.2 is assumed.
|
||||||
|
|
||||||
If a local firewall policy is in place on your external interface you will need
|
If a local firewall policy is in place on your external interface you will need
|
||||||
to allow the ports below:
|
to allow the ports below:
|
||||||
|
|||||||
@ -181,7 +181,7 @@ Example:
|
|||||||
set vpn ipsec ike-group office-srv-ike lifetime '3600'
|
set vpn ipsec ike-group office-srv-ike lifetime '3600'
|
||||||
set vpn ipsec ike-group office-srv-ike proposal 1 encryption 'aes256'
|
set vpn ipsec ike-group office-srv-ike proposal 1 encryption 'aes256'
|
||||||
set vpn ipsec ike-group office-srv-ike proposal 1 hash 'sha1'
|
set vpn ipsec ike-group office-srv-ike proposal 1 hash 'sha1'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth1'
|
set vpn ipsec interface 'eth1'
|
||||||
set vpn ipsec site-to-site peer 203.0.113.2 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 203.0.113.2 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 203.0.113.2 authentication pre-shared-secret 'SomePreSharedKey'
|
set vpn ipsec site-to-site peer 203.0.113.2 authentication pre-shared-secret 'SomePreSharedKey'
|
||||||
set vpn ipsec site-to-site peer 203.0.113.2 ike-group 'office-srv-ike'
|
set vpn ipsec site-to-site peer 203.0.113.2 ike-group 'office-srv-ike'
|
||||||
@ -204,7 +204,7 @@ Example:
|
|||||||
set vpn ipsec ike-group office-srv-ike lifetime '3600'
|
set vpn ipsec ike-group office-srv-ike lifetime '3600'
|
||||||
set vpn ipsec ike-group office-srv-ike proposal 1 encryption 'aes256'
|
set vpn ipsec ike-group office-srv-ike proposal 1 encryption 'aes256'
|
||||||
set vpn ipsec ike-group office-srv-ike proposal 1 hash 'sha1'
|
set vpn ipsec ike-group office-srv-ike proposal 1 hash 'sha1'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth1'
|
set vpn ipsec interface 'eth1'
|
||||||
set vpn ipsec site-to-site peer 198.51.100.3 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 198.51.100.3 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 198.51.100.3 authentication pre-shared-secret 'SomePreSharedKey'
|
set vpn ipsec site-to-site peer 198.51.100.3 authentication pre-shared-secret 'SomePreSharedKey'
|
||||||
set vpn ipsec site-to-site peer 198.51.100.3 ike-group 'office-srv-ike'
|
set vpn ipsec site-to-site peer 198.51.100.3 ike-group 'office-srv-ike'
|
||||||
@ -305,7 +305,7 @@ Imagine the following topology
|
|||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 dh-group '19'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 dh-group '19'
|
||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 encryption 'aes256gcm128'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 encryption 'aes256gcm128'
|
||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 hash 'sha256'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 hash 'sha256'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0.201'
|
set vpn ipsec interface 'eth0.201'
|
||||||
set vpn ipsec site-to-site peer 172.18.202.10 authentication id '172.18.201.10'
|
set vpn ipsec site-to-site peer 172.18.202.10 authentication id '172.18.201.10'
|
||||||
set vpn ipsec site-to-site peer 172.18.202.10 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 172.18.202.10 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 172.18.202.10 authentication pre-shared-secret 'secretkey'
|
set vpn ipsec site-to-site peer 172.18.202.10 authentication pre-shared-secret 'secretkey'
|
||||||
@ -339,7 +339,7 @@ Imagine the following topology
|
|||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 dh-group '19'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 dh-group '19'
|
||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 encryption 'aes256gcm128'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 encryption 'aes256gcm128'
|
||||||
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 hash 'sha256'
|
set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 hash 'sha256'
|
||||||
set vpn ipsec ipsec-interfaces interface 'eth0.202'
|
set vpn ipsec interface 'eth0.202'
|
||||||
set vpn ipsec site-to-site peer 172.18.201.10 authentication id '172.18.202.10'
|
set vpn ipsec site-to-site peer 172.18.201.10 authentication id '172.18.202.10'
|
||||||
set vpn ipsec site-to-site peer 172.18.201.10 authentication mode 'pre-shared-secret'
|
set vpn ipsec site-to-site peer 172.18.201.10 authentication mode 'pre-shared-secret'
|
||||||
set vpn ipsec site-to-site peer 172.18.201.10 authentication pre-shared-secret 'secretkey'
|
set vpn ipsec site-to-site peer 172.18.201.10 authentication pre-shared-secret 'secretkey'
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user