summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-06-07smoketest: ipsec: chmod +x testcaseChristian Poessinger
2021-06-07nhrp: T3599: adjust Jinja2 template to common style patternChristian Poessinger
2021-06-07ipsec: T2816: adjust Jinja2 template to common style patternChristian Poessinger
2021-06-07vti: T3588: remove interfaces not bound to IPSec tunnelChristian Poessinger
A VTI interface also requires an IPSec configuration - VyOS 1.2 supported having a VTI interface in the CLI but no IPSec configuration - drop VTI configuration if this is the case for VyOS 1.4.
2021-06-07ipsec: T3588: remove site-to-site tunnel CLI options only valid in OpenswanChristian Poessinger
2021-06-07Merge pull request #868 from sarthurdev/currentChristian Poessinger
nhrp: T3599: Update config path to new /run directory
2021-06-07nhrp: T3599: Update config path to new /run directorysarthurdev
2021-06-06ipsec: T3588: remove CLI options deprecated by strongSwanChristian Poessinger
- set vpn ipsec nat-traversal - set vpn ipsec nat-networks allowed-network
2021-06-06T1168: ipsec: add copyright header to migration scriptChristian Poessinger
2021-06-06Merge pull request #846 from erkin/currentChristian Poessinger
T3508, T3356: remote: Friendly download procedure for user-facing scripts
2021-06-06Debian: add missing dependency on vyatta-cfgChristian Poessinger
2021-06-06nhrp: T3599: replace vyos-opennhrp with opennhrp packageChristian Poessinger
2021-06-06Merge pull request #865 from sarthurdev/currentChristian Poessinger
nhrp: T3599: Migrate NHRP to XML/Python
2021-06-06nhrp: T3599: Remove vpn_ipsec.py from configd until bug is resolvedsarthurdev
2021-06-06nhrp: T3599: Migrate NHRP to XML/Pythonsarthurdev
2021-06-05ipsec: T3093: drop superfluous top level priorityChristian Poessinger
2021-06-05Merge pull request #866 from sarthurdev/fix-ipsecChristian Poessinger
ipsec: T2816: Fix typo from refactor
2021-06-04ipsec: T2816: Fix typo from refactorsarthurdev
2021-06-04vti: T3595: error out when adding VTI interface withouth IPSecChristian Poessinger
2021-06-04flow-accounting: T3132: fix egress iptables chainJan-Philipp Benecke
(cherry picked from commit 95cc2e4b4c11414cc71749af12abb575e96e5bd4)
2021-06-04Merge pull request #861 from sever-sever/T3592Christian Poessinger
tunnels: T3592: Set default TTL to 64
2021-06-03pppoe-server: T3593: Change called-sid position in templateEshenko Dmitriy
2021-06-02tunnels: T3592: Set default TTL to 64sever-sever
Set default TTL value for tunnels from 0 to 64 There are a lot of situation when default value 0 (inherit) not work properly when you have routing configuration for OSPF or BGP over the tunnels. To fix it you need explicit set TTL value other then 0. Or hardcode another value as default.
2021-06-01op-mode: T3384: fix default help string for bandwidth testChristian Poessinger
2021-06-01op-mode: T3384: support UDP bandwidth testingJACK
2021-06-01pppoe-server: T3593: Add extended-scripts featureEshenko Dmitriy
2021-06-01ipsec: T2816: XML in op-mode should not contain ' in the help stringChristian Poessinger
2021-05-31conntrack: T3579: add module disable optionsChristian Poessinger
Some application layer gateway (ALG) modules can be disabled during runtime if requireq.
2021-05-31ipsec: T2816: Continued refactor, added proper ipsec-interfaces handlingSimon
2021-05-30bgp: T3590: limiting maximum number of prefixes to be sent to a peerChristian Poessinger
2021-05-30ipsec: T2816: Refactor to remove global variable and tidy upSimon
2021-05-30op-mode: T3589: add "clear log" command to vacuume journaldChristian Poessinger
2021-05-30op-mode: T3589: replace short journalctl options with long namesChristian Poessinger
... this is done for easier readability of the commands
2021-05-30T3356: Add progressbars to SFTP and HTTP transferserkin
2021-05-29Debian: T1888: raise required strongSwan version to >= 5.8 for xfrm supportChristian Poessinger
2021-05-29vpn: ipsec: T3093: test for VTI interface availability the easy wayChristian Poessinger
We do not need to query the actual configuration if the VTI peer is configured or not. This can be done in a much more simples way by just checking if the desired interface exists on the running system. This is safe to do as the VTI priority is less then IPSec.
2021-05-29ipsec: vti: T2816: Update to use correct VTI mark, code cleanupSimon
2021-05-29vpn: ipsec: T3093: drop obsolete cleanup_vti_interfaces() functionChristian Poessinger
2021-05-29vti: T1579: only remove the interface when it existsChristian Poessinger
2021-05-29vti: ipsec: T2816: Fix vti-up-downsarthurdev
2021-05-29T3356: Add progressbars to FTP transferserkin
Allow ports to be specified in URL strings
2021-05-29Revert "vti: T2173: add VRF support for virtual tunnel interfaces"Christian Poessinger
This reverts commit ab398d1a063c5f897df8d63098a272cb34bcf603.
2021-05-28ipsec: T2816: drop absolute path on calls to iproute2Christian Poessinger
2021-05-28vti: ipsec: T2816: interfaces must be created using the vyos.ifconfig libraryChristian Poessinger
2021-05-28vti: T2173: add VRF support for virtual tunnel interfacesChristian Poessinger
2021-05-28ipsec: T2816: fix executable permission on vti-up-down helperChristian Poessinger
2021-05-28vti: T1579: implement Virtual Tunnel Interfaces using XML and PythonChristian Poessinger
2021-05-28dummy: T2241: minor code cleanupChristian Poessinger
No need to call .keys() on a dict when searching for a key. Also drop the unused "import os" call.
2021-05-28ipsec: T2816: IPSec python rework, includes DMVPN and VTI supportSimon
2021-05-27dhcp-server: T2669: do not allow overlapping ranges to be createdChristian Poessinger
set service dhcp-server shared-network-name NET01 authoritative set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 default-router '10.0.0.1' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 lease '86400' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG01 start '10.0.0.60' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG01 stop '10.0.0.70' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG02 start '10.0.0.55' set service dhcp-server shared-network-name NET01 subnet 10.0.0.0/24 range RNG02 stop '10.0.0.65' Will result in a dhcpd.conf: shared-network NET01 { authoritative; subnet 10.0.0.0 netmask 255.255.255.0 { option routers 10.0.0.1; default-lease-time 86400; max-lease-time 86400; range 10.0.0.60 10.0.0.70; range 10.0.0.55 10.0.0.65; } on commit { set shared-networkname = "NET01"; } } This is not allowed by ISC DHCPd: dhcpd[3307]: /run/dhcp-server/dhcpd.conf line 25: lease 10.0.0.63 is declared twice! dhcpd[3307]: range 10.0.0.55 10.0.0.65;