- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Feb 11 2022
Feb 10 2022
There is an example of a working configuration:
set interfaces openvpn vtun10 authentication password xxxxxx set interfaces openvpn vtun10 authentication username xxxxxx set interfaces openvpn vtun10 device-type 'tun' set interfaces openvpn vtun10 encryption cipher 'aes256' set interfaces openvpn vtun10 hash 'sha512' set interfaces openvpn vtun10 mode 'client' set interfaces openvpn vtun10 openvpn-option '--config /config/auth/nord/included_config.conf' set interfaces openvpn vtun10 persistent-tunnel set interfaces openvpn vtun10 protocol 'udp' set interfaces openvpn vtun10 remote-host 'xxx.xxx.218.155' set interfaces openvpn vtun10 remote-port '1194' set interfaces openvpn vtun10 tls ca-cert-file xxxxxx
Feb 9 2022
@Scoopta I can't get your configuration, how does should work without the declaration source or remote address?
There is a template that generates OpenVPN site-to-site configuration https://github.com/vyos/vyos-1x/blob/9910020ae6ef37964c97bb28b6b1d84f8227650b/data/templates/openvpn/server.conf.tmpl#L143-L147
To reproduce in 1.4
set interfaces bridge br3 member interface vtun2 set interfaces openvpn vtun2 device-type 'tap' set interfaces openvpn vtun2 mode 'site-to-site' set interfaces openvpn vtun2 persistent-tunnel set interfaces openvpn vtun2 shared-secret-key 'foo' set pki openvpn shared-secret foo key '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' set pki openvpn shared-secret foo version '1'
Commit:
Traceback (most recent call last):
File "/usr/libexec/vyos/conf_mode/interfaces-openvpn.py", line 663, in <module>
verify(c)
File "/usr/libexec/vyos/conf_mode/interfaces-openvpn.py", line 228, in verify
if len([addr for addr in openvpn['local_address'] if is_ipv4(addr)]) > 1:
KeyError: 'local_address'It can be fixed in thoses PR's:
https://github.com/vyos/vyos-1x/pull/1210
https://github.com/vyos/vyos-1x/pull/1211
T4230
Feb 8 2022
Issue not resolved, re-open
For example, I have 300 routers in different timezones and I want to reboot 50% of routers via 1441min and the other 50% via 2881min
PR for 1.3 https://github.com/vyos/vyos-1x/pull/1210
PR for 1.4 https://github.com/vyos/vyos-1x/pull/1211
Ip address for openvpn is not yet assigned as a priority for OpenVPN less than for HA
460 interfaces/openvpn 800 high-availability
Anf we have checks if address assigned:
set interfaces ethernet eth0 address '10.1.12.1/24' set high-availability vrrp group FOO interface 'eth0' set high-availability vrrp group FOO no-preempt set high-availability vrrp group FOO priority '150' set high-availability vrrp group FOO rfc3768-compatibility set high-availability vrrp group FOO virtual-address '203.0.113.1/24' set high-availability vrrp group FOO vrid '10'
PR ability to get nftables counters, telegraf input plugin https://github.com/vyos/vyos-1x/pull/1209
Feb 7 2022
Feb 5 2022
Feb 4 2022
@aohanian I got it, thanks, so it doesn't delete the previous route in one commit
it can be archived with 2 commits
configure delete protocols static route 1.1.1.1/32 dhcp-interface eth4 commit set protocols static route 1.1.1.1/32 dhcp-interface eth5 commit
@fernando What do you want to see it that case?
In the our CLI DHCP-route can be as a single value now:
set protocols static route 192.0.2.192/32 dhcp-interface 'eth0' set protocols static route 192.0.2.192/32 dhcp-interface 'eth2'
I.e. the first route will be replaced with the second route in CLI.
So if I understand correctly you expect that this route will be also replaced an in the FRR?
For 1.4 this feature was added in T2683
Fixed in 1.3
vyos@r4:~$ show interfaces counters Interface Rx Packets Rx Bytes Tx Packets Tx Bytes dum0 0 0 0 0 eth0 126 9952 76 10316 eth1 4 280 5 523 eth2 37 1924 0 0 lo 6 300 6 300 vyos@r4:~$ vyos@r4:~$ clear interfaces ethernet eth1 counters Clearing eth1 vyos@r4:~$ show interfaces counters Interface Rx Packets Rx Bytes Tx Packets Tx Bytes dum0 0 0 0 0 eth0 182 14550 108 14340 eth1 0 0 0 0 eth2 42 2184 0 0 lo 6 300 6 300 vyos@r4:~$
@jack9603301 Could you test it, also create a pr for the documentation?
Feb 3 2022
PR for op-mode https://github.com/vyos/vyos-1x/pull/1204
Feb 2 2022
PR https://github.com/vyos/vyos-1x/pull/1200
Fix for telegraf template/scripts for services.
Feb 1 2022
Is there any Linux implementation?
Jan 28 2022
Why is it 1-99?
If I want to reboot the router in 1500 min?
Jan 27 2022
Jan 26 2022
Incorrect behavior with multiple commits
Configuration:
set policy local-route rule 10 set table '101' set policy local-route rule 10 source '192.0.2.1' set policy local-route rule 10 source '192.0.2.2' commit set policy local-route rule 10 destination '203.0.113.25' commit
Expected rules:
10: from 192.0.2.1 to 203.0.113.25 lookup 101 10: from 192.0.2.2 to 203.0.113.25 lookup 101
Getting rules:
10: from 192.0.2.2 lookup 101 10: from 192.0.2.1 to 203.0.113.25 lookup 101 10: from 192.0.2.2 to 203.0.113.25 lookup 101
Jan 25 2022
Is it the same task T4138 ?
PR https://github.com/vyos/vyos-1x/pull/1190
set policy prefix-list TST_PRF_LST rule 10 action 'permit' set policy prefix-list TST_PRF_LST rule 10 prefix '10.5.5.0/24' set policy prefix-list TST_PRF_LST rule 20 action 'permit' set policy prefix-list TST_PRF_LST rule 20 prefix '10.6.6.0/24' set policy prefix-list TST_PRF_LST rule 30 action 'permit' set policy prefix-list TST_PRF_LST rule 30 prefix '10.6.6.0/24'