summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRobert Göhler <github@ghlr.de>2021-10-31 20:56:31 +0100
committerGitHub <noreply@github.com>2021-10-31 20:56:31 +0100
commitc8e6c51cb50fc48e0f90e04e945d8c1f16ef113c (patch)
tree0554a14cc9933289b4876b2a987bbf5db6422ab9
parentbf50e539e7dbd9c79226b1d8acf1d8dbbb01e8a7 (diff)
parent315cd47a4c56723e2015142351a9211f7ab06983 (diff)
downloadvyos-documentation-c8e6c51cb50fc48e0f90e04e945d8c1f16ef113c.tar.gz
vyos-documentation-c8e6c51cb50fc48e0f90e04e945d8c1f16ef113c.zip
Merge pull request #647 from dhrp/patch-1
changed to use 'static interface-route' instead of 'static route'
-rw-r--r--docs/configuration/interfaces/wireguard.rst16
1 files changed, 8 insertions, 8 deletions
diff --git a/docs/configuration/interfaces/wireguard.rst b/docs/configuration/interfaces/wireguard.rst
index 55e03b16..bd7b4899 100644
--- a/docs/configuration/interfaces/wireguard.rst
+++ b/docs/configuration/interfaces/wireguard.rst
@@ -95,20 +95,20 @@ one.
set interfaces wireguard wg01 peer to-wg02 port '51820'
set interfaces wireguard wg01 peer to-wg02 pubkey 'XMrlPykaxhdAAiSjhtPlvi30NVkvLQliQuKP7AI7CyI='
set interfaces wireguard wg01 port '51820'
- set protocols static route 192.168.2.0/24 interface wg01
+ set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01
**local side - annotated commands**
.. code-block:: none
- set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface.
+ set interfaces wireguard wg01 address '10.1.0.1/30' # Address of the wg01 tunnel interface.
set interfaces wireguard wg01 description 'VPN-to-wg02'
- set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel
- set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer
- set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer
- set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer
- set interfaces wireguard wg01 port '51820' # Port of own server
- set protocols static route 192.168.2.0/24 interface wg01 # Static route to remote subnet
+ set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel
+ set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>' # Public IP of the peer
+ set interfaces wireguard wg01 peer to-wg02 port '58120' # Port of the Peer
+ set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>' # Public Key of the Peer
+ set interfaces wireguard wg01 port '51820' # Port of own server
+ set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01 # Static route to remote subnet
The last step is to define an interface route for 192.168.2.0/24 to get
through the WireGuard interface `wg01`. Multiple IPs or networks can be