- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Aug 4 2025
Jun 23 2025
Jun 8 2025
An easy mitigation is to just update the command that is run to:
journalctl --no-hostname --boot -k | grep "ipv4-NAM-${6:0:15}"The only issue with this as the only solution, is you could lose granularity in logging if you were to have names like:
test-test-test-1 test-test-test-2
Running show log firewall ipv4 name test-test-test-1 would return log entries for both names since the string would be ipv4-NAM-test-test-test-. That's where a warning could come into play, stating it is recommended to keep names to no more than 15 characters.
May 29 2025
May 27 2025
May 21 2025
I created a task for this as well https://vyos.dev/T7469
May 20 2025
May 6 2025
May 5 2025
May 1 2025
@Viacheslav Can you assign me to this task?
Apr 25 2025
@a.apostoliuk @sarthurdev I saw this a while back and was thinking about it today. I think it'd be useful to be able to disable conntrack per chain. It could be useful for people using VyOS in an ISP environment, where the firewall is more a mechanism to secure VyOS itself, rather than filter through traffic. It'd be pretty easy to implement.
Apr 22 2025
Apr 16 2025
Since there is already a task for this, do you want me to go ahead and close this one? Or keep it up as a reminder for work that still needs to be done?
Apr 15 2025
Apr 14 2025
Apr 13 2025
Apr 12 2025
Apr 10 2025
Apr 5 2025
Apr 4 2025
Apr 3 2025
Mar 28 2025
Mar 25 2025
Will this be backported to 1.4 ahead of the 1.4.2 release?
Mar 22 2025
Mar 20 2025
Mar 17 2025
I can't assign myself to this task for whatever reason, but here is a PR to correct this behavior:
https://github.com/vyos/vyos-1x/pull/4400
Jun 13 2024
Jun 10 2024
Approaching implementation of ZeroTier from a different angle in:
https://vyos.dev/T6455
Jun 8 2024
Draft PR Added: https://github.com/vyos/vyos-1x/pull/3599
Jun 7 2024
Jun 6 2024
Jun 3 2024
In T6439#190868, @Viacheslav wrote:Should be fixed in T6373
Jun 2 2024
NFT rate-limiting is effectively a policer instead of a shaper, so I don't think it'd be a good way to accomplish this. All drops would be aggressive and not tail-drops.
May 21 2024
May 16 2024
May 15 2024
May 14 2024
May 4 2024
Adding additional PR to add bonding.py to op-mode-standardized.json: https://github.com/vyos/vyos-1x/pull/3408
May 1 2024
Apr 23 2024
In T6258#184716, @Viacheslav wrote:Most likely needs to change priority to 319 for the sysctl
vyos@r4:~$ /usr/libexec/vyos/priority.py | match "ethernet|sysctl" 300 interfaces_virtual-ethernet.py ['interfaces', 'virtual-ethernet'] 318 interfaces_ethernet.py ['interfaces', 'ethernet'] 318 system_sysctl.py ['system', 'sysctl'] 321 interfaces_pseudo-ethernet.py ['interfaces', 'pseudo-ethernet'] vyos@r4:~$
Apr 12 2024
Apr 6 2024
Mar 30 2024
Since descriptions can be very long I assume there will be a linewrap at the end?
Mar 25 2024
@jestabro Thanks, a solution definitely seems close.
In T5991#181120, @Viacheslav wrote:It is not an actual ethernet interface, but you name it as an ethernet interface.
You can check the output sudo ip link show type wireguard or sudo ip link show type tun