mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
911 lines
28 KiB
ReStructuredText
911 lines
28 KiB
ReStructuredText
.. _network-interfaces:
|
|
|
|
Network Interfaces
|
|
==================
|
|
|
|
Configured interfaces on a VyOS system can be displayed using the `show
|
|
interfaces` command.
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show interfaces
|
|
Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down
|
|
Interface IP Address S/L Description
|
|
--------- ---------- --- -----------
|
|
eth0 172.16.51.129/24 u/u OUTSIDE
|
|
eth1 192.168.0.1/24 u/u INSIDE
|
|
lo 127.0.0.1/8 u/u
|
|
::1/128
|
|
vyos@vyos:~$
|
|
|
|
A specific interface can be shown using the `show interfaces <type> <name>`
|
|
command.
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show interfaces ethernet eth0
|
|
eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
|
|
link/ether 00:0c:29:44:3b:0f brd ff:ff:ff:ff:ff:ff
|
|
inet 172.16.51.129/24 brd 172.16.51.255 scope global eth0
|
|
inet6 fe80::20c:29ff:fe44:3b0f/64 scope link
|
|
valid_lft forever preferred_lft forever
|
|
Description: OUTSIDE
|
|
|
|
RX: bytes packets errors dropped overrun mcast
|
|
274397 3064 0 0 0 0
|
|
TX: bytes packets errors dropped carrier collisions
|
|
257276 1890 0 0 0 0
|
|
vyos@vyos:~$
|
|
|
|
Different network interfaces provide type-specific configuration. Ethernet
|
|
interfaces, for example, allow the configuration of speed and duplex.
|
|
|
|
Many services, such as network routing, firewall, and traffic policy also
|
|
maintain interface-specific configuration. These will be covered in their
|
|
respective sections.
|
|
|
|
Interface Addresses
|
|
-------------------
|
|
|
|
Each interface can be configured with a description and address. Interface
|
|
addresses might be:
|
|
|
|
* Static IPv4 `address 172.16.51.129/24`
|
|
* Static IPv6 `address 2001:db8:1::ffff/64`
|
|
* DHCP IPv4 `address dhcp`
|
|
* DHCP IPv6 `address dhcpv6`
|
|
|
|
An interface description is assigned using the following command:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 description 'OUTSIDE'
|
|
|
|
IPv4
|
|
^^^^
|
|
|
|
Static Address
|
|
**************
|
|
|
|
This method is supported on all interfaces, apart from OpenVPN that uses
|
|
different syntax and wireless modems that are always autoconfigured through
|
|
PPP.
|
|
|
|
The command is `set interfaces $type $name address $address`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 address 192.0.2.1/24
|
|
set interfaces tunnel tun0 address 10.0.0.1/30
|
|
set interfaces bridge br0 address 203.0.113.45/26
|
|
set interfaces ethernet eth0 vif 30 address 192.0.30.254/24
|
|
|
|
DHCP
|
|
****
|
|
|
|
This method is supported on all physical interfaces, and those that are
|
|
directly connected to a physical interface (ethernet, VLAN, bridge, bond,
|
|
pseudo-ethernet, wireless).
|
|
|
|
The command is `set interfaces $type $name address dhcp`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 vif 90 address dhcp
|
|
set interfaces bridge br0 address dhcp
|
|
|
|
IPv6
|
|
^^^^
|
|
|
|
Static Address
|
|
**************
|
|
|
|
This method is supported on all interfaces, apart from OpenVPN that uses
|
|
different syntax and wireless modems that are always autoconfigured through
|
|
PPP. Static IPv6 addresses are supported on all interfaces except VTI.
|
|
|
|
The command is `set interfaces $type $name address $address`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 address 2001:db8:100::ffff/64
|
|
set interfaces tunnel tun0 address 2001:db8::1/64
|
|
set interfaces bridge br0 address 2001:db8:200::1/64
|
|
set interfaces ethernet eth0 vif 30 address 2001:db8:3::ffff/64
|
|
|
|
DHCP
|
|
****
|
|
|
|
This method is supported on all physical interfaces, and those that are
|
|
directly connected to a physical interface (ethernet, VLAN, bridge, bond,
|
|
pseudo-ethernet, wireless).
|
|
|
|
The command is `set interfaces $type $name address dhcpv6`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bonding bond1 address dhcpv6
|
|
set interfaces bridge br0 vif 56 address dhcpv6
|
|
|
|
Autoconfiguration (SLAAC)
|
|
*************************
|
|
|
|
SLAAC is specified in RFC4862_. This method is supported on all physical
|
|
interfaces, and those that are directly connected to a physical interface
|
|
(ethernet, VLAN, bridge, bond, pseudo-ethernet, wireless).
|
|
|
|
The command is `set interfaces $type $name ipv6 address autoconf`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 vif 90 ipv6 address autoconf
|
|
set interfaces bridge br0 ipv6 address autoconf
|
|
|
|
.. note:: This method automatically disables IPv6 traffic forwarding on the
|
|
interface in question.
|
|
|
|
EUI-64
|
|
******
|
|
|
|
EUI-64 (64-Bit Extended Unique Identifier) as specified in RFC4291_. IPv6
|
|
addresses in /64 networks can be automatically generated from the prefix and
|
|
MAC address, if you specify the prefix.
|
|
|
|
The command is `set interfaces $type $name ipv6 address eui64 $prefix`. Examples:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bridge br0 ipv6 address eui64 2001:db8:beef::/64
|
|
set interfaces pseudo-ethernet peth0 ipv6 address eui64 2001:db8:aa::/64
|
|
|
|
Ethernet Interfaces
|
|
-------------------
|
|
|
|
Ethernet interfaces allow for the configuration of speed, duplex, and hw-id
|
|
(MAC address). Below is an example configuration:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth1 address '192.168.0.1/24'
|
|
set interfaces ethernet eth1 address '2001:db8:1::ffff/64'
|
|
set interfaces ethernet eth1 description 'INSIDE'
|
|
set interfaces ethernet eth1 duplex 'auto'
|
|
set interfaces ethernet eth1 speed 'auto'
|
|
|
|
Resulting in:
|
|
|
|
.. code-block:: sh
|
|
|
|
ethernet eth1 {
|
|
address 192.168.0.1/24
|
|
address 2001:db8:1::ffff/64
|
|
description INSIDE
|
|
duplex auto
|
|
hw-id 00:0c:29:44:3b:19
|
|
smp_affinity auto
|
|
speed auto
|
|
}
|
|
|
|
In addition, Ethernet interfaces provide the extended operational commands
|
|
`show interfaces ethernet <name> physical` and `show interfaces ethernet <name>
|
|
statistics`. Statistics available are driver dependent.
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show interfaces ethernet eth0 physical
|
|
Settings for eth0:
|
|
Supported ports: [ TP ]
|
|
Supported link modes: 10baseT/Half 10baseT/Full
|
|
100baseT/Half 100baseT/Full
|
|
1000baseT/Full
|
|
Supports auto-negotiation: Yes
|
|
Advertised link modes: 10baseT/Half 10baseT/Full
|
|
100baseT/Half 100baseT/Full
|
|
1000baseT/Full
|
|
Advertised pause frame use: No
|
|
Advertised auto-negotiation: Yes
|
|
Speed: 1000Mb/s
|
|
Duplex: Full
|
|
Port: Twisted Pair
|
|
PHYAD: 0
|
|
Transceiver: internal
|
|
Auto-negotiation: on
|
|
MDI-X: Unknown
|
|
Supports Wake-on: d
|
|
Wake-on: d
|
|
Current message level: 0x00000007 (7)
|
|
Link detected: yes
|
|
driver: e1000
|
|
version: 7.3.21-k8-NAPI
|
|
firmware-version:
|
|
bus-info: 0000:02:01.0
|
|
|
|
vyos@vyos:~$ show interfaces ethernet eth0 statistics
|
|
NIC statistics:
|
|
rx_packets: 3530
|
|
tx_packets: 2179
|
|
[...]
|
|
|
|
Wireless Interfaces
|
|
-------------------
|
|
Wireless, for example WiFi 802.11 b/g/n, interfaces allow for connection to
|
|
WiFi networks or act as an access-point.
|
|
If your device is configurable it will appear as `wlan` in `show interfaces`.
|
|
|
|
To be able to use the wireless interfaces you will first need to set a
|
|
regulatory domain with the country code of your locaion.
|
|
|
|
.. code-block:: sh
|
|
|
|
set system wifi-regulatory-domain SE
|
|
|
|
An example on how to set it up as an access point:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces wireless wlan0 address '192.168.99.1/24'
|
|
set interfaces wireless wlan0 type access-point
|
|
set interfaces wireless wlan0 channel 1
|
|
set interfaces wireless wlan0 ssid '<your ssid>'
|
|
set interfaces wireless wlan0 security wpa mode wpa2
|
|
set interfaces wireless wlan0 security wpa cipher CCMP
|
|
set interfaces wireless wlan0 security wpa passphrase '<your passphrase>'
|
|
|
|
Resulting in
|
|
|
|
.. code-block:: sh
|
|
|
|
interfaces {
|
|
[...]
|
|
wireless wlan0 {
|
|
address 192.168.99.1/24
|
|
channel 1
|
|
mode g
|
|
security {
|
|
wpa {
|
|
cipher CCMP
|
|
mode wpa2
|
|
passphrase "<your passphrase>"
|
|
}
|
|
}
|
|
ssid "<your ssid>"
|
|
type access-point
|
|
}
|
|
}
|
|
system {
|
|
[...]
|
|
wifi-regulatory-domain SE
|
|
}
|
|
|
|
To get it to work as a access point with this configuration you will need
|
|
to set up a DHCP server to work with that network.
|
|
|
|
|
|
VLAN Sub-Interfaces (802.1Q)
|
|
----------------------------
|
|
|
|
802.1Q VLAN interfaces are represented as virtual sub-interfaces in VyOS. The
|
|
term used for this is `vif`. Configuration of a tagged sub-interface is
|
|
accomplished using the configuration command `set interfaces ethernet <name>
|
|
vif <vlan-id>`.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth1 vif 100 description 'VLAN 100'
|
|
set interfaces ethernet eth1 vif 100 address '192.168.100.1/24'
|
|
set interfaces ethernet eth1 vif 100 address '2001:db8:100::1/64'
|
|
|
|
Resulting in:
|
|
|
|
.. code-block:: sh
|
|
|
|
ethernet eth1 {
|
|
address 192.168.100.1/24
|
|
address 2001:db8:100::1/64
|
|
description INSIDE
|
|
duplex auto
|
|
hw-id 00:0c:29:44:3b:19
|
|
smp_affinity auto
|
|
speed auto
|
|
vif 100 {
|
|
address 192.168.100.1/24
|
|
description "VLAN 100"
|
|
}
|
|
}
|
|
|
|
VLAN interfaces are shown as `<name>.<vlan-id>`, e.g. `eth1.100`:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show interfaces
|
|
Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down
|
|
Interface IP Address S/L Description
|
|
--------- ---------- --- -----------
|
|
eth0 172.16.51.129/24 u/u OUTSIDE
|
|
eth1 192.168.0.1/24 u/u INSIDE
|
|
eth1.100 192.168.100.1/24 u/u VLAN 100
|
|
lo 127.0.0.1/8 u/u
|
|
::1/128
|
|
|
|
Bridging
|
|
--------
|
|
|
|
Interfaces in VyOS can be bridged together to provide software switching of
|
|
Layer-2 traffic.
|
|
|
|
A bridge is created when a bridge interface is defined. In the example below
|
|
we will be creating a bridge for VLAN 100 and assigning a VIF to the bridge.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bridge 'br100'
|
|
set interfaces ethernet eth1 vif 100 bridge-group bridge br100
|
|
|
|
Interfaces assigned to a bridge-group do not have address configuration. An IP
|
|
address can be assigned to the bridge interface itself, however, like any
|
|
normal interface.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bridge br100 address '192.168.100.1/24'
|
|
set interfaces bridge br100 address '2001:db8:100::1/64'
|
|
|
|
Example Result:
|
|
|
|
.. code-block:: sh
|
|
|
|
bridge br100 {
|
|
address 192.168.100.1/24
|
|
address 2001:db8:100::1/64
|
|
}
|
|
[...]
|
|
ethernet eth1 {
|
|
[...]
|
|
vif 100 {
|
|
bridge-group {
|
|
bridge br100
|
|
}
|
|
}
|
|
}
|
|
|
|
In addition to normal IP interface configuration, bridge interfaces support
|
|
Spanning-Tree Protocol. STP is disabled by default.
|
|
|
|
.. note:: Please use caution when introducing spanning-tree protocol on a
|
|
network as it may result in topology changes.
|
|
|
|
To enable spanning-tree use the `set interfaces bridge <name> stp true` command:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bridge br100 stp true
|
|
|
|
STP `priority`, `forwarding-delay`, `hello-time`, and `max-age` can be
|
|
configured for the bridge-group. The MAC aging time can also be configured
|
|
using the `aging` directive.
|
|
|
|
For member interfaces, the bridge-group `priority` and `cost` can be configured.
|
|
|
|
The `show bridge` operational command can be used to display configured bridges:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show bridge
|
|
bridge name bridge id STP enabled interfaces
|
|
br100 0000.000c29443b19 yes eth1.100
|
|
|
|
If spanning-tree is enabled, the `show bridge <name> spanning-tree` command
|
|
can be used to show STP configuration:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show bridge br100 spanning-tree
|
|
br100
|
|
bridge id 0000.000c29443b19
|
|
designated root 0000.000c29443b19
|
|
root port 0 path cost 0
|
|
max age 20.00 bridge max age 20.00
|
|
hello time 2.00 bridge hello time 2.00
|
|
forward delay 15.00 bridge forward delay 15.00
|
|
ageing time 300.00
|
|
hello timer 0.47 tcn timer 0.00
|
|
topology change timer 0.00 gc timer 64.63
|
|
flags
|
|
|
|
eth1.100 (1)
|
|
port id 8001 state forwarding
|
|
designated root 0000.000c29443b19 path cost 4
|
|
designated bridge 0000.000c29443b19 message age timer 0.00
|
|
designated port 8001 forward delay timer 0.00
|
|
designated cost 0 hold timer 0.00
|
|
flags
|
|
|
|
The MAC address-table for a bridge can be displayed using the `show bridge
|
|
<name> macs` command:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos:~$ show bridge br100 macs
|
|
port no mac addr is local? ageing timer
|
|
1 00:0c:29:44:3b:19 yes 0.00
|
|
|
|
Bonding
|
|
-------
|
|
|
|
You can combine (aggregate) 2 or more physical interfaces into a single
|
|
logical one. It's called bonding, or LAG, or ether-channel, or port-channel.
|
|
|
|
Create interface bondX, where X is just a number:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bonding bond0 description 'my-sw1 int 23 and 24'
|
|
|
|
You are able to choose a hash policy:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos# set interfaces bonding bond0 hash-policy
|
|
Possible completions:
|
|
layer2 use MAC addresses to generate the hash (802.3ad)
|
|
layer2+3 combine MAC address and IP address to make hash
|
|
layer3+4 combine IP address and port to make hash
|
|
|
|
For example:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bonding bond0 hash-policy 'layer2'
|
|
|
|
You may want to set IEEE 802.3ad Dynamic link aggregation (802.3ad) AKA LACP
|
|
(don't forget to setup it on the other end of these links):
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bonding bond0 mode '802.3ad'
|
|
|
|
or some other modes:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos# set interfaces bonding bond0 mode
|
|
Possible completions:
|
|
802.3ad IEEE 802.3ad Dynamic link aggregation (Default)
|
|
active-backup
|
|
Fault tolerant: only one slave in the bond is active
|
|
broadcast Fault tolerant: transmits everything on all slave interfaces
|
|
round-robin Load balance: transmit packets in sequential order
|
|
transmit-load-balance
|
|
Load balance: adapts based on transmit load and speed
|
|
adaptive-load-balance
|
|
Load balance: adapts based on transmit and receive plus ARP
|
|
xor-hash Load balance: distribute based on MAC address
|
|
|
|
Now bond some physical interfaces into bond0:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 bond-group 'bond0'
|
|
set interfaces ethernet eth0 description 'member of bond0'
|
|
set interfaces ethernet eth1 bond-group 'bond0'
|
|
set interfaces ethernet eth1 description 'member of bond0'
|
|
|
|
After a commit you may treat bond0 as almost a physical interface (you can't
|
|
change its` duplex, for example) and assign IPs or VIFs on it.
|
|
|
|
You may check the result:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos# run sh interfaces bonding
|
|
Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down
|
|
Interface IP Address S/L Description
|
|
--------- ---------- --- -----------
|
|
bond0 - u/u my-sw1 int 23 and 24
|
|
bond0.10 192.168.0.1/24 u/u office-net
|
|
bond0.100 10.10.10.1/24 u/u management-net
|
|
|
|
Tunnel Interfaces
|
|
-----------------
|
|
|
|
Set Virtual Tunnel interface
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces vti vti0 address 192.168.2.249/30
|
|
set interfaces vti vti0 address 2001:db8:2::249/64
|
|
|
|
Results in:
|
|
|
|
.. code-block:: sh
|
|
|
|
vyos@vyos# show interfaces vti
|
|
vti vti0 {
|
|
address 192.168.2.249/30
|
|
address 2001:db8:2::249/64
|
|
description "Description"
|
|
}
|
|
|
|
VXLAN
|
|
-----
|
|
|
|
VXLAN is an overlaying Ethernet over IP protocol. It is described in RFC7348_.
|
|
|
|
If configuring VXLAN in a VyOS virtual machine, ensure that MAC spoofing
|
|
(Hyper-V) or Forged Transmits (ESX) are permitted, otherwise forwarded frames
|
|
may be blocked by the hypervisor.
|
|
|
|
Multicast VXLAN
|
|
^^^^^^^^^^^^^^^^
|
|
|
|
Example Topology:
|
|
|
|
PC4 - Leaf2 - Spine1 - Leaf3 - PC5
|
|
|
|
PC4 has IP 10.0.0.4/24 and PC5 has IP 10.0.0.5/24, so they believe they are in
|
|
the same broadcast domain.
|
|
|
|
Let's assume PC4 on Leaf2 wants to ping PC5 on Leaf3. Instead of setting Leaf3
|
|
as our remote end manually, Leaf2 encapsulates the packet into a UDP-packet and
|
|
sends it to its designated multicast-address via Spine1. When Spine1 receives
|
|
this packet it forwards it to all other Leafs who has joined the same
|
|
multicast-group, in this case Leaf3. When Leaf3 receives the packet it forwards
|
|
it, while at the same time learning that PC4 is reachable behind Leaf2, because
|
|
the encapsulated packet had Leaf2's IP-address set as source IP.
|
|
|
|
PC5 receives the ping echo, responds with an echo reply that Leaf3 receives and
|
|
this time forwards to Leaf2's unicast address directly because it learned the
|
|
location of PC4 above. When Leaf2 receives the echo reply from PC5 it sees that
|
|
it came from Leaf3 and so remembers that PC5 is reachable via Leaf3.
|
|
|
|
Thanks to this discovery, any subsequent traffic between PC4 and PC5 will not
|
|
be using the multicast-address between the Leafs as they both know behind which
|
|
Leaf the PCs are connected. This saves traffic as less multicast packets sent
|
|
reduces the load on the network, which improves scalability when more Leafs are
|
|
added.
|
|
|
|
For optimal scalability Multicast shouldn't be used at all, but instead use BGP
|
|
to signal all connected devices between leafs. Unfortunately, VyOS does not yet
|
|
support this.
|
|
|
|
Configuration commands
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
.. code-block:: sh
|
|
|
|
interfaces
|
|
vxlan <vxlan[0-16777215]>
|
|
address # IP address of the VXLAN interface
|
|
bridge-group # Configure a L2 bridge-group
|
|
description # Description
|
|
group <ipv4> # IPv4 Multicast group address (required)
|
|
ip # IPv4 routing options
|
|
ipv6 # IPv6 routing options
|
|
link <dev> # IP interface for underlay of this vxlan overlay (optional)
|
|
mtu # MTU
|
|
policy # Policy routing options
|
|
remote # Remote address of the VXLAN tunnel, used for PTP instead of multicast
|
|
vni <1-16777215> # Virtual Network Identifier (required)
|
|
|
|
Configuration Example
|
|
^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
The setup is this:
|
|
|
|
Leaf2 - Spine1 - Leaf3
|
|
|
|
Spine1 is a Cisco IOS router running version 15.4, Leaf2 and Leaf3 is each a
|
|
VyOS router running 1.2.
|
|
|
|
This topology was built using GNS3.
|
|
|
|
Topology:
|
|
|
|
.. code-block:: sh
|
|
|
|
Spine1:
|
|
fa0/2 towards Leaf2, IP-address: 10.1.2.1/24
|
|
fa0/3 towards Leaf3, IP-address: 10.1.3.1/24
|
|
|
|
Leaf2:
|
|
Eth0 towards Spine1, IP-address: 10.1.2.2/24
|
|
Eth1 towards a vlan-aware switch
|
|
|
|
Leaf3:
|
|
Eth0 towards Spine1, IP-address 10.1.3.3/24
|
|
Eth1 towards a vlan-aware switch
|
|
|
|
Spine1 Configuration:
|
|
|
|
.. code-block:: sh
|
|
|
|
conf t
|
|
ip multicast-routing
|
|
!
|
|
interface fastethernet0/2
|
|
ip address 10.1.2.1 255.255.255.0
|
|
ip pim sparse-dense-mode
|
|
!
|
|
interface fastethernet0/3
|
|
ip address 10.1.3.1 255.255.255.0
|
|
ip pim sparse-dense-mode
|
|
!
|
|
router ospf 1
|
|
network 10.0.0.0 0.255.255.255 area 0
|
|
|
|
Multicast-routing is required for the leafs to forward traffic between each
|
|
other in a more scalable way. This also requires PIM to be enabled towards the
|
|
Leafs so that the Spine can learn what multicast groups each Leaf expect traffic
|
|
from.
|
|
|
|
Leaf2 configuration:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 address '10.1.2.2/24'
|
|
set protocols ospf area 0 network '10.0.0.0/8'
|
|
|
|
! Our first vxlan interface
|
|
set interfaces bridge br241 address '172.16.241.1/24'
|
|
set interfaces ethernet eth1 vif 241 bridge-group bridge 'br241'
|
|
set interfaces vxlan vxlan241 bridge-group bridge 'br241'
|
|
set interfaces vxlan vxlan241 group '239.0.0.241'
|
|
set interfaces vxlan vxlan241 link 'eth0'
|
|
set interfaces vxlan vxlan241 vni '241'
|
|
|
|
! Our seconds vxlan interface
|
|
set interfaces bridge br242 address '172.16.242.1/24'
|
|
set interfaces ethernet eth1 vif 242 bridge-group bridge 'br242'
|
|
set interfaces vxlan vxlan242 bridge-group bridge 'br242'
|
|
set interfaces vxlan vxlan242 group '239.0.0.242'
|
|
set interfaces vxlan vxlan242 link 'eth0'
|
|
set interfaces vxlan vxlan242 vni '242'
|
|
|
|
Leaf3 configuration:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth0 address '10.1.3.3/24'
|
|
set protocols ospf area 0 network '10.0.0.0/8'
|
|
|
|
! Our first vxlan interface
|
|
set interfaces bridge br241 address '172.16.241.1/24'
|
|
set interfaces ethernet eth1 vif 241 bridge-group bridge 'br241'
|
|
set interfaces vxlan vxlan241 bridge-group bridge 'br241'
|
|
set interfaces vxlan vxlan241 group '239.0.0.241'
|
|
set interfaces vxlan vxlan241 link 'eth0'
|
|
set interfaces vxlan vxlan241 vni '241'
|
|
|
|
! Our seconds vxlan interface
|
|
set interfaces bridge br242 address '172.16.242.1/24'
|
|
set interfaces ethernet eth1 vif 242 bridge-group bridge 'br242'
|
|
set interfaces vxlan vxlan242 bridge-group bridge 'br242'
|
|
set interfaces vxlan vxlan242 group '239.0.0.242'
|
|
set interfaces vxlan vxlan242 link 'eth0'
|
|
set interfaces vxlan vxlan242 vni '242'
|
|
|
|
As you can see, Leaf2 and Leaf3 configuration is almost identical. There are
|
|
lots of commands above, I'll try to into more detail below, command
|
|
descriptions are placed under the command boxes:
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces bridge br241 address '172.16.241.1/24'
|
|
|
|
This commands creates a bridge that is used to bind traffic on eth1 vlan 241
|
|
with the vxlan241-interface. The IP-address is not required. It may however be
|
|
used as a default gateway for each Leaf which allows devices on the vlan to
|
|
reach other subnets. This requires that the subnets are redistributed by OSPF
|
|
so that the Spine will learn how to reach it. To do this you need to change the
|
|
OSPF network from '10.0.0.0/8' to '0.0.0.0/0' to allow 172.16/12-networks to be
|
|
advertised.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces ethernet eth1 vif 241 bridge-group bridge 'br241'
|
|
set interfaces vxlan vxlan241 bridge-group bridge 'br241'
|
|
|
|
Binds eth1 vif 241 and vxlan241 to each other by putting them in the same
|
|
bridge-group. Internal VyOS requirement.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces vxlan vxlan241 group '239.0.0.241'
|
|
|
|
The multicast-group used by all Leafs for this vlan extension. Has to be the
|
|
same on all Leafs that has this interface.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces vxlan vxlan241 link 'eth0'
|
|
|
|
Sets the interface to listen for multicast packets on. Could be a loopback, not
|
|
yet tested.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces vxlan vxlan241 vni '241'
|
|
|
|
Sets the unique id for this vxlan-interface. Not sure how it correlates with
|
|
multicast-address.
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces vxlan vxlan241 remote-port 12345
|
|
|
|
The destination port used for creating a VXLAN interface in Linux defaults to
|
|
its pre-standard value of 8472 to preserve backwards compatibility. A
|
|
configuration directive to support a user-specified destination port to override
|
|
that behavior is available using the above command.
|
|
|
|
Older Examples
|
|
^^^^^^^^^^^^^^
|
|
|
|
Example for bridging normal L2 segment and vxlan overlay network, and using a
|
|
vxlan interface as routing interface.
|
|
|
|
.. code-block:: sh
|
|
|
|
interfaces {
|
|
bridge br0 {
|
|
}
|
|
ethernet eth0 {
|
|
address dhcp
|
|
}
|
|
loopback lo {
|
|
}
|
|
vxlan vxlan0 {
|
|
bridge-group {
|
|
bridge br0
|
|
}
|
|
group 239.0.0.1
|
|
vni 0
|
|
}
|
|
vxlan vxlan1 {
|
|
address 192.168.0.1/24
|
|
link eth0
|
|
group 239.0.0.1
|
|
vni 1
|
|
}
|
|
}
|
|
|
|
Here is a working configuration that creates a VXLAN between two routers. Each
|
|
router has a VLAN interface (26) facing the client devices and a VLAN interface
|
|
(30) that connects it to the other routers. With this configuration, traffic
|
|
can flow between both routers' VLAN 26, but can't escape since there is no L3
|
|
gateway. You can add an IP to a bridge-group to create a gateway.
|
|
|
|
.. code-block:: sh
|
|
|
|
interfaces {
|
|
bridge br0 {
|
|
}
|
|
ethernet eth0 {
|
|
duplex auto
|
|
smp-affinity auto
|
|
speed auto
|
|
vif 26 {
|
|
bridge-group {
|
|
bridge br0
|
|
}
|
|
}
|
|
vif 30 {
|
|
address 10.7.50.6/24
|
|
}
|
|
}
|
|
loopback lo {
|
|
}
|
|
vxlan vxlan0 {
|
|
bridge-group {
|
|
bridge br0
|
|
}
|
|
group 239.0.0.241
|
|
vni 241
|
|
}
|
|
}
|
|
|
|
|
|
WireGuard VPN Interface
|
|
-----------------------
|
|
|
|
WireGuard_ is an extremely simple yet fast and modern VPN that utilizes
|
|
state-of-the-art cryptography. See https://www.wireguard.com for more
|
|
information.
|
|
|
|
Configuration
|
|
^^^^^^^^^^^^^
|
|
|
|
Generate the keypair, which creates a public and private part and stores it
|
|
within VyOS.
|
|
|
|
.. code-block:: sh
|
|
|
|
wg01:~$ configure
|
|
wg01# run generate wireguard keypair
|
|
|
|
The public key is being shared with your peer(s), your peer will encrypt all
|
|
traffic to your system using this public key.
|
|
|
|
.. code-block:: sh
|
|
|
|
wg01# run show wireguard pubkey
|
|
u41jO3OF73Gq1WARMMFG7tOfk7+r8o8AzPxJ1FZRhzk=
|
|
|
|
The next step is to configure your local side as well as the policy based
|
|
trusted destination addresses. If you only initiate a connection, the listen
|
|
port and endpoint is optional, if you however act as a server and endpoints
|
|
initiate the connections to your system, you need to define a port your clients
|
|
can connect to, otherwise it's randomly chosen and may make it difficult with
|
|
firewall rules, since the port may be a different one when you reboot your
|
|
system.
|
|
|
|
You will also need the public key of your peer as well as the network(s) you
|
|
want to tunnel (allowed-ips) to configure a wireguard tunnel. The public key
|
|
below is always the public key from your peer, not your local one.
|
|
|
|
**local side**
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces wireguard wg01 address '10.1.0.1/24'
|
|
set interfaces wireguard wg01 description 'VPN-to-wg02'
|
|
set interfaces wireguard wg01 peer to-wg02 allowed-ips '10.2.0.0/24'
|
|
set interfaces wireguard wg01 peer to-wg02 endpoint '192.168.0.142:12345'
|
|
set interfaces wireguard wg01 peer to-wg02 pubkey 'XMrlPykaxhdAAiSjhtPlvi30NVkvLQliQuKP7AI7CyI='
|
|
set interfaces wireguard wg01 port '12345'
|
|
set protocols static interface-route 10.2.0.0/24 next-hop-interface wg01
|
|
|
|
The last step is to define an interface route for 10.2.0.0/24 to get through
|
|
the wireguard interface `wg01`. Multiple IPs or networks can be defined and
|
|
routed, the last check is allowed-ips which either prevents or allows the
|
|
traffic.
|
|
|
|
**remote side**
|
|
|
|
.. code-block:: sh
|
|
|
|
set interfaces wireguard wg01 address '10.2.0.1/24'
|
|
set interfaces wireguard wg01 description 'VPN-to-wg01'
|
|
set interfaces wireguard wg01 peer to-wg02 allowed-ips '10.1.0.0/24'
|
|
set interfaces wireguard wg01 peer to-wg02 endpoint '192.168.0.124:12345'
|
|
set interfaces wireguard wg01 peer to-wg02 pubkey 'u41jO3OF73Gq1WARMMFG7tOfk7+r8o8AzPxJ1FZRhzk='
|
|
set interfaces wireguard wg01 port '12345'
|
|
set protocols static interface-route 10.1.0.0/24 next-hop-interface wg01
|
|
|
|
Assure that your firewall rules allow the traffic, in which case you have a
|
|
working VPN using wireguard.
|
|
|
|
.. code-block:: sh
|
|
|
|
wg01# ping 10.2.0.1
|
|
PING 10.2.0.1 (10.2.0.1) 56(84) bytes of data.
|
|
64 bytes from 10.2.0.1: icmp_seq=1 ttl=64 time=1.16 ms
|
|
64 bytes from 10.2.0.1: icmp_seq=2 ttl=64 time=1.77 ms
|
|
|
|
wg02# ping 10.1.0.1
|
|
PING 10.1.0.1 (10.1.0.1) 56(84) bytes of data.
|
|
64 bytes from 10.1.0.1: icmp_seq=1 ttl=64 time=4.40 ms
|
|
64 bytes from 10.1.0.1: icmp_seq=2 ttl=64 time=1.02 ms
|
|
|
|
An additional layer of symmetric-key crypto can be used on top of the
|
|
asymmetric crypto, which is optional.
|
|
|
|
.. code-block:: sh
|
|
|
|
wg01# run generate wireguard preshared-key
|
|
rvVDOoc2IYEnV+k5p7TNAmHBMEGTHbPU8Qqg8c/sUqc=
|
|
|
|
Copy the key, it is not stored on the local file system. Make sure you
|
|
distribute that key in a safe manner, it's a symmatric key, so only you and
|
|
your peer should have knowledge if its content.
|
|
|
|
.. code-block:: sh
|
|
|
|
wg01# set interfaces wireguard wg01 peer to-wg02 preshared-key 'rvVDOoc2IYEnV+k5p7TNAmHBMEGTHbPU8Qqg8c/sUqc='
|
|
wg02# set interfaces wireguard wg01 peer to-wg01 preshared-key 'rvVDOoc2IYEnV+k5p7TNAmHBMEGTHbPU8Qqg8c/sUqc='
|
|
|
|
.. _RFC4862: https://tools.ietf.org/html/rfc4862
|
|
.. _RFC4291: http://tools.ietf.org/html/rfc4291#section-2.5.1
|
|
.. _RFC7348: https://datatracker.ietf.org/doc/rfc7348/
|
|
.. _WireGuard: https://www.wireguard.com
|