summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThatcher <thatcher@leaf.cloud>2021-10-30 22:58:13 +0200
committerGitHub <noreply@github.com>2021-10-30 22:58:13 +0200
commit315cd47a4c56723e2015142351a9211f7ab06983 (patch)
tree0554a14cc9933289b4876b2a987bbf5db6422ab9
parentbf50e539e7dbd9c79226b1d8acf1d8dbbb01e8a7 (diff)
downloadvyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.tar.gz
vyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.zip
changed to use 'static interface-route' instead of 'static route'
This appears to be an error in the documentation. Tested it with vyos 1.3-rc6
-rw-r--r--docs/configuration/interfaces/wireguard.rst16
1 files changed, 8 insertions, 8 deletions
diff --git a/docs/configuration/interfaces/wireguard.rst b/docs/configuration/interfaces/wireguard.rst
index 55e03b16..bd7b4899 100644
--- a/docs/configuration/interfaces/wireguard.rst
+++ b/docs/configuration/interfaces/wireguard.rst
@@ -95,20 +95,20 @@ one.
set interfaces wireguard wg01 peer to-wg02 port '51820'
set interfaces wireguard wg01 peer to-wg02 pubkey 'XMrlPykaxhdAAiSjhtPlvi30NVkvLQliQuKP7AI7CyI='
set interfaces wireguard wg01 port '51820'
- set protocols static route 192.168.2.0/24 interface wg01
+ set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01
**local side - annotated commands**
.. code-block:: none
- set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface.
+ set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface.
set interfaces wireguard wg01 description 'VPN-to-wg02'
- set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel
- set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer
- set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer
- set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer
- set interfaces wireguard wg01 port '51820' # Port of own server
- set protocols static route 192.168.2.0/24 interface wg01 # Static route to remote subnet
+ set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel
+ set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer
+ set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer
+ set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer
+ set interfaces wireguard wg01 port '51820' # Port of own server
+ set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01 # Static route to remote subnet
The last step is to define an interface route for 192.168.2.0/24 to get
through the WireGuard interface `wg01`. Multiple IPs or networks can be