diff options
author | Thatcher <thatcher@leaf.cloud> | 2021-10-30 22:58:13 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-10-30 22:58:13 +0200 |
commit | 315cd47a4c56723e2015142351a9211f7ab06983 (patch) | |
tree | 0554a14cc9933289b4876b2a987bbf5db6422ab9 | |
parent | bf50e539e7dbd9c79226b1d8acf1d8dbbb01e8a7 (diff) | |
download | vyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.tar.gz vyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.zip |
changed to use 'static interface-route' instead of 'static route'
This appears to be an error in the documentation. Tested it with vyos 1.3-rc6
-rw-r--r-- | docs/configuration/interfaces/wireguard.rst | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/docs/configuration/interfaces/wireguard.rst b/docs/configuration/interfaces/wireguard.rst index 55e03b16..bd7b4899 100644 --- a/docs/configuration/interfaces/wireguard.rst +++ b/docs/configuration/interfaces/wireguard.rst @@ -95,20 +95,20 @@ one. set interfaces wireguard wg01 peer to-wg02 port '51820' set interfaces wireguard wg01 peer to-wg02 pubkey 'XMrlPykaxhdAAiSjhtPlvi30NVkvLQliQuKP7AI7CyI=' set interfaces wireguard wg01 port '51820' - set protocols static route 192.168.2.0/24 interface wg01 + set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01 **local side - annotated commands** .. code-block:: none - set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface. + set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface. set interfaces wireguard wg01 description 'VPN-to-wg02' - set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel - set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer - set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer - set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer - set interfaces wireguard wg01 port '51820' # Port of own server - set protocols static route 192.168.2.0/24 interface wg01 # Static route to remote subnet + set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel + set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer + set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer + set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer + set interfaces wireguard wg01 port '51820' # Port of own server + set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01 # Static route to remote subnet The last step is to define an interface route for 192.168.2.0/24 to get through the WireGuard interface `wg01`. Multiple IPs or networks can be |