summaryrefslogtreecommitdiff
path: root/docs/configexamples/autotest/Wireguard/Wireguard.rst
diff options
context:
space:
mode:
authorrebortg <github@ghlr.de>2021-11-23 15:15:46 +0100
committerrebortg <github@ghlr.de>2021-11-23 15:20:55 +0100
commitf7b3955074cbd86078f3f71084b7f8a3277417e0 (patch)
tree745b6b53e0894c01c40799f2d60dd6c4323eab5f /docs/configexamples/autotest/Wireguard/Wireguard.rst
parente00983b1949ee27c90c0bd08d813d397497c6356 (diff)
downloadvyos-documentation-f7b3955074cbd86078f3f71084b7f8a3277417e0.tar.gz
vyos-documentation-f7b3955074cbd86078f3f71084b7f8a3277417e0.zip
blueprint: add autotest section
Diffstat (limited to 'docs/configexamples/autotest/Wireguard/Wireguard.rst')
-rw-r--r--docs/configexamples/autotest/Wireguard/Wireguard.rst98
1 files changed, 98 insertions, 0 deletions
diff --git a/docs/configexamples/autotest/Wireguard/Wireguard.rst b/docs/configexamples/autotest/Wireguard/Wireguard.rst
new file mode 100644
index 00000000..ce5a493f
--- /dev/null
+++ b/docs/configexamples/autotest/Wireguard/Wireguard.rst
@@ -0,0 +1,98 @@
+#########
+Wireguard
+#########
+
+
+| Testdate: 2021-11-23
+| Version: 1.4-rolling-202106170808
+
+
+This simple structure show how to connect two offices. One remote branch and the
+central office.
+
+********
+Topology
+********
+
+The topology have a central and a branch VyOS router and one client, to
+test, in each site.
+
+.. image:: _include/topology.png
+ :alt: Ansible Example topology image
+
+*************
+Configuration
+*************
+
+Set the local subnet on eth2 and the public ip address eth1 on each site.
+
+Central
+
+.. literalinclude:: _include/central.conf
+ :language: none
+ :lines: 1-2
+
+Branch
+
+.. literalinclude:: _include/branch.conf
+ :language: none
+ :lines: 1-2
+
+
+Next thing to do, is to create a wireguard keypair on each side.
+After this, the public key can be displayed, to save for later.
+
+.. code-block:: none
+
+ vyos@central:~$ generate wireguard default-keypair
+ vyos@central:~$ show wireguard keypairs pubkey default
+ +mLLOGxR37k3EsWba7+G7vIDq6yW4t0s549rNVShWy4=
+
+
+After you have each public key. The wireguard interfaces can be setup.
+
+
+Central
+
+.. literalinclude:: _include/central.conf
+ :language: none
+ :lines: 4-11
+
+Branch
+
+.. literalinclude:: _include/branch.conf
+ :language: none
+ :lines: 4-11
+
+
+
+*********************
+Testing and debugging
+*********************
+
+After all is done and commit, let's take a look if the Wireguard interface is
+up and running.
+
+.. code-block:: none
+
+ vyos@central:~$ show interfaces wireguard
+ Codes: S - State, L - Link, u - Up, D - Down, A - Admin Down
+ Interface IP Address S/L Description
+ --------- ---------- --- -----------
+ wg01 192.168.0.1/24 u/u VPN-to-Branch
+
+
+And ping the Branch PC from your central router to check the response.
+
+.. code-block:: none
+
+ vyos@central:~$ ping 10.0.2.100 count 4
+ PING 10.0.2.100 (10.0.2.100) 56(84) bytes of data.
+ 64 bytes from 10.0.2.100: icmp_seq=1 ttl=63 time=0.609 ms
+ 64 bytes from 10.0.2.100: icmp_seq=2 ttl=63 time=0.871 ms
+ 64 bytes from 10.0.2.100: icmp_seq=3 ttl=63 time=0.937 ms
+ 64 bytes from 10.0.2.100: icmp_seq=4 ttl=63 time=0.746 ms
+
+ --- 10.0.2.100 ping statistics ---
+ 4 packets transmitted, 4 received, 0% packet loss, time 4ms
+ rtt min/avg/max/mdev = 0.609/0.790/0.937/0.130 ms