User Details
- User Since
- Feb 16 2016, 6:57 PM (407 w, 10 h)
Dec 22 2021
end of /etc/snmp/snmpd.conf
# group group usm test
Nov 12 2021
Adding set zone-policy zone SERVER interface SERVER to the presented test case should solve the issue. This is because the traffic needs to pass both eth1 and its associated VRF "master" interface, in this case TEST.
Jun 11 2021
See [1] from the previous post:
Note: If you don't want to install anything and don't care about some potential security problems, just enable the following 2 options to get native GRE keepalive support on Linux: […]
I care. Setting these sysctl parameters allows for relaying arbitrary traffic through the router.
Jan 8 2021
Dec 18 2020
@runar You're right, my bad.
Dec 17 2020
Jun 5 2020
Mar 4 2020
Feb 18 2020
I'd love for this feature to get back into VyOS. I am available for testing if needed.
Jan 28 2020
Jan 17 2020
Dec 19 2019
Dec 18 2019
Nov 13 2019
Nov 10 2019
Sep 11 2019
Aug 9 2019
I second this, I would like to be able to setup different keys for multiple wireguard interfaces too.
Feb 6 2019
I would consider adding EVPN support via FRR as soon as kernel support for the inter working between vxlan and bridge interfaces is more fleshed out. Maybe I should create a new task for that.
Dec 20 2018
Oct 9 2018
Apr 15 2018
Jan 17 2018
I am very interested in this, has any work been done?
Sep 6 2017
Tried on → 999.201706052137
Apr 26 2017
I tried doing some basic routing with ofp and it seemed to work but the shipped dpdk version does not compile for my kernel (4.10), so I can't test that.
Mar 3 2017
Feb 26 2017
Feb 12 2017
Jan 19 2017
Sep 17 2016
Just to voice my opinion, I vote strongly against implementing haproxy support. In my opinion this is feature bloat, we should be striving to do networking, not application level load balancing.
Also puppet/ansible/favourite-cf-management-system modules for haproxy exist. My guess is none of the existing users of haproxy would convert and with vyos 1.x it is difficult to support any kind of automation, so I doubt someone validating plain haproxy configuration with the help of a configuration management system would decide for vyos.
Sep 15 2016
Sep 14 2016
Someone created a duplicate of this task, T149.
Sep 4 2016
@whiskeyalpharomeo you can do that already with the existing CLI.
Aug 10 2016
Can you please post the corresponding iptables error?
Jul 24 2016
Ah, good to know. So if we add a switch like transport ipv4/ipv6 to the cli which is only valid for VRRPv3 (add a switch for that too) and then exclude either all v4 or all v6 addresses, would that work?
Does it work, if you use virtual_ipaddress_excluded? Also I don't really understand how this would solve the problem? Could you please explain it?
@jbrown This only works for you because your keepalived versions are old enough.
This got "fixed" (well, at least they're standards compliant now ;)) in 1.2.20 I believe.
See https://github.com/acassen/keepalived/issues/375#issuecomment-230148110 for more information.
Jul 23 2016
[root@test ~]# cat /etc/keepalived/keepalived.conf vrrp_instance VI_1 { state MASTER interface ens3 virtual_router_id 51 priority 200 advert_int 1 vrrp_version 3 native_ipv6 authentication { auth_type ah auth_pass 1111 } virtual_ipaddress { 3ffa::1/64 192.168.100.200/24 } }
Does only work for the v6 address with this configuration.
I tested with keepalived version 1.2.22 on Fedora and it didn't seem to work. I'll test again.
Jul 17 2016
TODO:
- check if our keepalived version supports VRRPv3, if not, upgrade to a newer version.
- implement cli support + config generation
Jun 30 2016
Your core dependecy exscript is not compatible with python3. It seems like someone started working on it but didn't finish and abandoned the port. I guess you don't want to port it, so I guess python3 support is on hold for now :/
Jun 17 2016
OpenVPN 2.2.3 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] built on Apr 2 2015 on 1.2.0-beta1.
Jun 10 2016
@mdsmds Yes, that should work, but if you do that, you force all traffic to be tracked by conntrack, which might not be what you what. Whereas if you apply it only to in on your internal NIC, you don't have to track all traffic, assuming you have multiple (internal) interfaces and you don't NAT all of them.
I guess we should add this to the user guide.
Yes, that should do the trick.
The important part is to discard any packets with conntrack state invalid on the internal interface. What you are seeing occurs because netfilter forwards instead of NATs packages it does not know about. see https://bugzilla.netfilter.org/show_bug.cgi?id=693#c11.
Jun 9 2016
This is normal behaviour. You need to add a firewall rule to only allow established and related connections and another to drop invalid packets.
Jun 3 2016
Basically create a route-map like below and apply it as the peerings export route-map.
Also please create a question instead of a task next time.
route-map EXPORT-PREPEND { rule 10 { action permit set { as-path-prepend "<your as no> <your as no> <your as no>" } }
Jun 1 2016
Related/duplicate: T33.
May 30 2016
I've tested IPsec + Ip6Ip6, everything works flawlessly for two weeks now. I suggest, we remove the check.
May 25 2016
May 23 2016
May 15 2016
First tests haven't shown obvious problems, everything seem's to work. I'll do some more testing.
May 11 2016
May 10 2016
B rocade vyatta.
I propose adding support for named extended-community-lists, see T64.
@mickvav On vRouter 5600, it would be like I posted. I vote for adding directly under policy.
Apr 11 2016
Apr 7 2016
Sorry, I just didn't see, the feature was there :O
Apr 5 2016
Mar 31 2016
I will look into it. I think it is feasible to add to 1.x, but we have to think about the cli. We have to treat the default VRF in a way, so it doesn't come in the way of users who don't want/need to use VRFs.