- Viacheslav (Viacheslav Hletenko) <phabricator@mg.vyos.io> [2024-06-24 :46:46]:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jun 24 2024
Jul 26 2023
Jul 22 2023
May 6 2023
Great, maybe we can use jool to build it!
Apr 13 2023
We can add guidelines about running vyos on LXC/LXD in the documentation
Must run in physical NIC pass-through mode
It is recommended to execute the container in privileged mode
This is currently only an initial implementation!
Apr 6 2023
@c-po How is the review and discussion on this feature going?
Feb 14 2023
Feb 6 2023
I'm not free now. I'll check it when I'm free
Jan 11 2023
Jan 10 2023
Nov 3 2022
Nov 2 2022
As a first step, we need a wrapper script to control the start, stop and restart of socat, because socat sometimes exits automatically
As a first step, we need a wrapper script to control the start, stop and restart of socat, because socat sometimes exits automatically
Oct 18 2022
Oct 17 2022
Sep 22 2022
@sdev @Netboy3 I'll test if the new implementation is done and if the bug is fixed I'll close this PR, thanks
Sep 21 2022
Sep 20 2022
@Netboy3 Let me modify the template to support
Sep 19 2022
Maybe we should add check to NAT66 to enforce the given address
Sep 17 2022
Sep 15 2022
I re-reviewed this PR and the following commit from @c-po
Sep 12 2022
Sep 11 2022
Sep 10 2022
Sep 5 2022
When the interface of the bridge registers VLANs, the bridge itself must register the same VLANs at the same time, otherwise the bridge will not forward VLANs
vyos@vyos:~$ sudo bridge -c vlan show port vlan-id eth0 10 20 eth1 10 20 br0 1 PVID Egress Untagged
Aug 31 2022
Aug 6 2022
hi, you can set this to a subtask of my task
Aug 4 2022
@hensur You haven't dealt with this for a long time
Aug 3 2022
It sounds like people prefer jool, and in my personal opinion, if there is a package that is still active up to now, like jool, then jool is probably better. But whatever it is, it's foreign to me
Aug 1 2022
@ajgnet If you have a way to limit the dynamic prefix to a known prefix, then using 1:1 NAT66 prefix translation should work (only the host segment is dynamic)
@c-po You haven't replied for a long time, please let me know if you have any other questions
Jun 3 2022
Should I make improvements to the remaining revisions in the PR?
Sorry I just saw it now, I'll test it. But because of limited conditions, I may test in the future, please forgive me
In T3435#115394, @n.fort wrote:Error still present on VyOS 1.4-rolling-202201020317
vyos@vyos:~$ show nat source rules Traceback (most recent call last): File "/usr/libexec/vyos/op_mode/show_nat_rules.py", line 114, in <module> print(format_nat_rule.format(rule, srcdests[0], tran_addr, interface)) IndexError: list index out of range Rule Source Translation Outbound Interface ---- ------ ----------- ------------------ vyos@vyos:~$ show ver Version: VyOS 1.4-rolling-202201020317 Release train: sagittaNat config in this example:
vyos@vyos:~$ show config comm | grep nat set nat source rule 10 description 'Masquerade to NAT' set nat source rule 10 outbound-interface 'eth0' set nat source rule 10 translation address 'masquerade'
Jan 29 2022
Jan 22 2022
@hensur See PR, I implemented a merge script and provided three solutions.
Jan 13 2022
@hensur I'm glad you reimplemented this feature. Come on
Sep 29 2021
Sep 19 2021
Sep 4 2021
- The problem about DHCPv6 has been solved
- The communication problem has been solved
It seems that the problem is related to IPv6 MSS. When I set IPv6 MSS to 1280 and IPv4 MSS to 1452, the problem seems to disappear
Aug 27 2021
Aug 25 2021
Aug 15 2021
Aug 14 2021
Merging this PR can fix this problem. Due to the complexity of the JSON parsing of NFT by the operation mode script, this task still needs to be tested, and the local test passes
Aug 13 2021
Aug 11 2021
@raphielscape Are there still problems after updating PR? Please provide the configuration and I'll take the time to check it