PR for 1.3 https://github.com/vyos/vyos-1x/pull/1582
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Oct 11 2022
PR https://github.com/vyos/vyos-1x/pull/1581
vyos@r14:~$ show conntrack table ipv6 Entries not found vyos@r14:~$
In T4729#135230, @pasik wrote:Ah, yeah, that's a valid point for gretap.
Anyway, my point was, it would be good to test if the issue/bug also affects plain 'gre', as behind the scenes 'gre' and 'gretap' are handled and configured differently, even though they might seem as very similar in vyos cli/config.
The bug might affect both, but it would be good to check and verify.
Oct 10 2022
PR https://github.com/vyos/vyos-1x/pull/1579
set service dns dynamic interface eth2 ipv6-enable set service dns dynamic interface eth2 service dynv6 host-name 'xxx.dynv6.net' set service dns dynamic interface eth2 service dynv6 login 'none' set service dns dynamic interface eth2 service dynv6 password 'passWorD' set service dns dynamic interface eth2 service dynv6 protocol 'dyndns2' set service dns dynamic interface eth2 service dynv6 server 'dynv6.com'
Oct 5 2022
In T4729#135223, @pasik wrote:well, "gre" and "gretap" are different types of tunnels, with different features.. so it makes sense to test and validate with the normal "gre", as in your config I don't see a need for "gretap".
Oct 4 2022
In T4729#135221, @pasik wrote:Hmm, any specific reason for the tun0 encapsulation 'gretap' ? did you try with normal 'gre' tunnels ? Does it change anything?
Needs to check, maybe fixed with rewriting in T4678
Oct 3 2022
Sep 30 2022
Sep 29 2022
@narey83 Could you re-check it with the latest rolling (start since vyos-1.4-rolling-202209290218-amd64.iso)?
@icyfire0573 Could you re-check it?
Should be fixed in vyos-1.4-rolling-202209290218-amd64.iso
I can't reproduce it, VyOS 1.4-rolling-202209290218
Config:
vyos@r14:~$ show conf com | match openv set interfaces openvpn vtun10 hash 'sha1' set interfaces openvpn vtun10 keep-alive failure-count '60' set interfaces openvpn vtun10 keep-alive interval '10' set interfaces openvpn vtun10 local-host '203.0.113.1' set interfaces openvpn vtun10 local-port '1194' set interfaces openvpn vtun10 mode 'server' set interfaces openvpn vtun10 openvpn-option '--data-ciphers-fallback BF-CBC' set interfaces openvpn vtun10 openvpn-option '--data-ciphers AES-128-CBC:AES-128-GCM:AES-256-CBC:AES-256-GCM:BF-CBC' set interfaces openvpn vtun10 openvpn-option '--comp-lzo yes' set interfaces openvpn vtun10 openvpn-option '--allow-compression yes' set interfaces openvpn vtun10 openvpn-option '--push redirect-gateway def1' set interfaces openvpn vtun10 openvpn-option '--push remote-gateway 10.9.1.1' set interfaces openvpn vtun10 openvpn-option '--push dhcp-option DNS 8.8.8.8' set interfaces openvpn vtun10 protocol 'udp' set interfaces openvpn vtun10 server client-ip-pool start '10.9.1.10' set interfaces openvpn vtun10 server client-ip-pool stop '10.9.1.99' set interfaces openvpn vtun10 server domain-name 'vtr.example.com' set interfaces openvpn vtun10 server max-connections '1000' set interfaces openvpn vtun10 server name-server '10.8.0.1' set interfaces openvpn vtun10 server subnet '10.9.1.0/24' set interfaces openvpn vtun10 server topology 'net30' set interfaces openvpn vtun10 tls ca-certificate 'ca' set interfaces openvpn vtun10 tls certificate 'cert' set interfaces openvpn vtun10 tls dh-params 'dh' set interfaces openvpn vtun10 use-lzo-compression vyos@r14:~$
Op-mode
vyos@r14:~$ show openvpn server
Sep 28 2022
Maybe something wrong with this check https://github.com/vyos/vyos-1x/blob/f5a50135f07ac4ec8ed431a757b9c56e607d2132/src/conf_mode/dhcp_server.py#L265-L271
Maybe incorrect parsing of port ranges (comma-separated)
rule 120 {
description "Playstation - 172.16.136.96"
destination {
port 1935,3074,3478,3479,3480
}Sep 27 2022
Should be fixed in the commit https://github.com/vyos/vyos-1x/pull/1552/files#diff-9e98077e1229d7a89e26efdc517896728265a8669e8824aaf92611b113fa3516L47
T4605
Try the latest rolling
Should be fixed in the commit https://github.com/vyos/vyos-1x/pull/1552/files#diff-9e98077e1229d7a89e26efdc517896728265a8669e8824aaf92611b113fa3516L47
T4605
Try the latest rolling
Sep 26 2022
Sep 25 2022
Send steps to reproduce it or “show conf com | match nat”
Send steps to reproduce it or “show conf com | match openvpn ”
Sep 22 2022
Sep 19 2022
Sep 16 2022
PR https://github.com/vyos/vyos-1x/pull/1545
PR https://github.com/vyos/vyatta-cfg-system/pull/185
set service ids ddos-protection direction 'in' set service ids ddos-protection listen-interface 'eth1' set service ids ddos-protection mode mirror set service ids ddos-protection threshold general fps '1000' set service ids ddos-protection threshold general mbps '200' set service ids ddos-protection threshold general pps '150000' set service ids ddos-protection threshold tcp fps '25' set service ids ddos-protection threshold tcp mbps '55' set service ids ddos-protection threshold tcp pps '155' set service ids ddos-protection threshold udp fps '100' set service ids ddos-protection threshold udp mbps '100' set service ids ddos-protection threshold udp pps '100' set service ids ddos-protection threshold icmp fps '200' set service ids ddos-protection threshold icmp mbps '210' set service ids ddos-protection threshold icmp pps '2040'
Expected fastnermon config entries:
# General threshold ban_for_flows = on threshold_flows = 1000 ban_for_bandwidth = on threshold_mbps = 200 ban_for_pps = on threshold_pps = 150000
Sep 15 2022
Sep 14 2022
As I mentioned above, use it before the configuration, it described in the doc
#!/bin/vbash
There is PR https://github.com/vyos/vyos-1x/pull/1516 for T4667 but it brakes all GRE traffic