diff options
author | rebortg <github@ghlr.de> | 2021-11-23 15:15:46 +0100 |
---|---|---|
committer | rebortg <github@ghlr.de> | 2021-11-23 15:20:55 +0100 |
commit | f7b3955074cbd86078f3f71084b7f8a3277417e0 (patch) | |
tree | 745b6b53e0894c01c40799f2d60dd6c4323eab5f /docs/configexamples/autotest/Wireguard/Wireguard.rst | |
parent | e00983b1949ee27c90c0bd08d813d397497c6356 (diff) | |
download | vyos-documentation-f7b3955074cbd86078f3f71084b7f8a3277417e0.tar.gz vyos-documentation-f7b3955074cbd86078f3f71084b7f8a3277417e0.zip |
blueprint: add autotest section
Diffstat (limited to 'docs/configexamples/autotest/Wireguard/Wireguard.rst')
-rw-r--r-- | docs/configexamples/autotest/Wireguard/Wireguard.rst | 98 |
1 files changed, 98 insertions, 0 deletions
diff --git a/docs/configexamples/autotest/Wireguard/Wireguard.rst b/docs/configexamples/autotest/Wireguard/Wireguard.rst new file mode 100644 index 00000000..ce5a493f --- /dev/null +++ b/docs/configexamples/autotest/Wireguard/Wireguard.rst @@ -0,0 +1,98 @@ +######### +Wireguard +######### + + +| Testdate: 2021-11-23 +| Version: 1.4-rolling-202106170808 + + +This simple structure show how to connect two offices. One remote branch and the +central office. + +******** +Topology +******** + +The topology have a central and a branch VyOS router and one client, to +test, in each site. + +.. image:: _include/topology.png + :alt: Ansible Example topology image + +************* +Configuration +************* + +Set the local subnet on eth2 and the public ip address eth1 on each site. + +Central + +.. literalinclude:: _include/central.conf + :language: none + :lines: 1-2 + +Branch + +.. literalinclude:: _include/branch.conf + :language: none + :lines: 1-2 + + +Next thing to do, is to create a wireguard keypair on each side. +After this, the public key can be displayed, to save for later. + +.. code-block:: none + + vyos@central:~$ generate wireguard default-keypair + vyos@central:~$ show wireguard keypairs pubkey default + +mLLOGxR37k3EsWba7+G7vIDq6yW4t0s549rNVShWy4= + + +After you have each public key. The wireguard interfaces can be setup. + + +Central + +.. literalinclude:: _include/central.conf + :language: none + :lines: 4-11 + +Branch + +.. literalinclude:: _include/branch.conf + :language: none + :lines: 4-11 + + + +********************* +Testing and debugging +********************* + +After all is done and commit, let's take a look if the Wireguard interface is +up and running. + +.. code-block:: none + + vyos@central:~$ show interfaces wireguard + Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down + Interface IP Address S/L Description + --------- ---------- --- ----------- + wg01 192.168.0.1/24 u/u VPN-to-Branch + + +And ping the Branch PC from your central router to check the response. + +.. code-block:: none + + vyos@central:~$ ping 10.0.2.100 count 4 + PING 10.0.2.100 (10.0.2.100) 56(84) bytes of data. + 64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.609 ms + 64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=0.871 ms + 64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=0.937 ms + 64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=0.746 ms + + --- 10.0.2.100 ping statistics --- + 4 packets transmitted, 4 received, 0% packet loss, time 4ms + rtt min/avg/max/mdev = 0.609/0.790/0.937/0.130 ms |