autotest: Wireguard Version update

This commit is contained in:
rebortg 2022-10-09 21:46:25 +02:00
parent 4ba654fa4f
commit f2fca40158
4 changed files with 614 additions and 628 deletions

File diff suppressed because it is too large Load Diff

View File

@ -3,8 +3,8 @@ Wireguard
#########
| Testdate: 2022-07-11
| Version: 1.4-rolling-202207090632
| Testdate: 2022-10-09
| Version: 1.4-rolling-202210090955
This simple structure show how to connect two offices. One remote branch and the
@ -45,8 +45,8 @@ After this, the public key can be displayed, to save for later.
.. code-block:: none
vyos@central:~$ generate pki wireguard
Private key: EIvN662aSS0Ai9VdsgSioq2fxUXxDTsb/ObsbI8jRlY=
Public key: g2/u7oMX4l5klNDWpQvYmNiCNPoqS7qzeWs+g4KPEEc=
Private key: IAxN76wdmZ6Y0nGzuNSIdSseFELWgAyBsRK0AEyHTV0=
Public key: g9APk9Pv7EHv0METuXaAguYtoGnn5eSirjZWSKyaT3c=
After you have each public key. The wireguard interfaces can be setup.
@ -102,11 +102,11 @@ And ping the Branch PC from your central router to check the response.
vyos@central:~$ ping 10.0.2.100 count 4
PING 10.0.2.100 (10.0.2.100) 56(84) bytes of data.
64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.752 ms
64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=1.37 ms
64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=1.09 ms
64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=1.09 ms
64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.594 ms
64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=0.837 ms
64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=0.768 ms
64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=1.30 ms
--- 10.0.2.100 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3053ms
rtt min/avg/max/mdev = 0.752/1.076/1.372/0.219 ms
4 packets transmitted, 4 received, 0% packet loss, time 3102ms
rtt min/avg/max/mdev = 0.594/0.873/1.296/0.259 ms

View File

@ -1,14 +1,14 @@
set interface ethernet eth2 address 10.0.2.254/24
set interface ethernet eth1 address 198.51.100.2/24
set interfaces wireguard wg01 private-key '4FZyoJhU7aYIFlPsn1AWbgKMPVbV37+6ZnRXa3MhqUY='
set interfaces wireguard wg01 private-key 'oJGRBUe96BFrr5mw4Ke5HxOfSjLVMruGfiBq5MzPu1s='
set interfaces wireguard wg01 address 192.168.0.2/24
set interfaces wireguard wg01 description 'VPN-to-central'
set interfaces wireguard wg01 peer central allowed-ips 10.0.1.0/24
set interfaces wireguard wg01 peer central allowed-ips 192.168.0.0/24
set interfaces wireguard wg01 peer central address 198.51.100.1
set interfaces wireguard wg01 peer central port 51820
set interfaces wireguard wg01 peer central public-key 'g2/u7oMX4l5klNDWpQvYmNiCNPoqS7qzeWs+g4KPEEc='
set interfaces wireguard wg01 peer central public-key 'g9APk9Pv7EHv0METuXaAguYtoGnn5eSirjZWSKyaT3c='
set interfaces wireguard wg01 port 51820
set protocols static route 10.0.1.0/24 interface wg01

View File

@ -1,14 +1,14 @@
set interface ethernet eth2 address 10.0.1.254/24
set interface ethernet eth1 address 198.51.100.1/24
set interfaces wireguard wg01 private-key 'EIvN662aSS0Ai9VdsgSioq2fxUXxDTsb/ObsbI8jRlY='
set interfaces wireguard wg01 private-key 'IAxN76wdmZ6Y0nGzuNSIdSseFELWgAyBsRK0AEyHTV0='
set interfaces wireguard wg01 address 192.168.0.1/24
set interfaces wireguard wg01 description 'VPN-to-Branch'
set interfaces wireguard wg01 peer branch allowed-ips 10.0.2.0/24
set interfaces wireguard wg01 peer branch allowed-ips 192.168.0.0/24
set interfaces wireguard wg01 peer branch address 198.51.100.2
set interfaces wireguard wg01 peer branch port 51820
set interfaces wireguard wg01 peer branch public-key '7CQshV+BLlSvdoAkjHOcBTCgGZv67czwEIJn945j7gE='
set interfaces wireguard wg01 peer branch public-key 'Z2rX3nC88hRuqCEb7iw95RrabjZ6FtAPQsxR1vsq00s='
set interfaces wireguard wg01 port 51820
set protocols static route 10.0.2.0/24 interface wg01