summaryrefslogtreecommitdiff
path: root/docs/configexamples
diff options
context:
space:
mode:
authorrebortg <github@ghlr.de>2020-12-11 22:40:51 +0100
committerrebortg <github@ghlr.de>2020-12-11 22:40:51 +0100
commit71c8077efb486f3d13c610bfe038f206f932e48c (patch)
tree9d3f37289aa6eb47031b6e11e80f566154fb86a0 /docs/configexamples
parent2d11378b6a03462319276033b11d4ba51d6f0ded (diff)
downloadvyos-documentation-71c8077efb486f3d13c610bfe038f206f932e48c.tar.gz
vyos-documentation-71c8077efb486f3d13c610bfe038f206f932e48c.zip
configexamples: fix lint errors
Diffstat (limited to 'docs/configexamples')
-rw-r--r--docs/configexamples/azure-vpn-bgp.rst4
-rw-r--r--docs/configexamples/dhcp-relay-through-gre-bridge.rst20
-rw-r--r--docs/configexamples/tunnelbroker-ipv6.rst13
-rw-r--r--docs/configexamples/wan-load-balancing.rst4
4 files changed, 28 insertions, 13 deletions
diff --git a/docs/configexamples/azure-vpn-bgp.rst b/docs/configexamples/azure-vpn-bgp.rst
index 176e0ae0..6f2622b2 100644
--- a/docs/configexamples/azure-vpn-bgp.rst
+++ b/docs/configexamples/azure-vpn-bgp.rst
@@ -6,7 +6,9 @@ Route-Based Site-to-Site VPN to Azure (BGP over IKEv2/IPsec)
This guide shows an example of a route-based IKEv2 site-to-site VPN to
Azure using VTI and BGP for dynamic routing updates.
-For redundant / active-active configurations see `Route-Based Redundant Site-to-Site VPN to Azure (BGP over IKEv2/IPsec) <https://docs.vyos.io/en/crux/appendix/examples/azure-vpn-dual-bgp.html>`_
+For redundant / active-active configurations see
+`Route-Based Redundant Site-to-Site VPN to Azure (BGP over IKEv2/IPsec)
+<https://docs.vyos.io/en/crux/appendix/examples/azure-vpn-dual-bgp.html>`_
Prerequisites
^^^^^^^^^^^^^
diff --git a/docs/configexamples/dhcp-relay-through-gre-bridge.rst b/docs/configexamples/dhcp-relay-through-gre-bridge.rst
index f94eb67f..0db5fa0a 100644
--- a/docs/configexamples/dhcp-relay-through-gre-bridge.rst
+++ b/docs/configexamples/dhcp-relay-through-gre-bridge.rst
@@ -21,18 +21,18 @@ DHCP Server
.. code-block:: none
set interfaces ethernet eth0 address '10.0.2.1/24'
- set interfaces loopback lo address '3.3.3.3/24'
+ set interfaces loopback lo address '192.168.3.3/24'
set interfaces tunnel tun100 address '172.16.0.2/30'
set interfaces tunnel tun100 encapsulation 'gre-bridge'
set interfaces tunnel tun100 local-ip '10.0.2.1'
set interfaces tunnel tun100 remote-ip '192.168.0.1'
- set protocols ospf area 0 network '3.3.3.0/24'
+ set protocols ospf area 0 network '192.168.3.0/24'
set protocols ospf area 0 network '10.0.2.0/24'
- set protocols ospf parameters router-id '3.3.3.3'
+ set protocols ospf parameters router-id '192.168.3.3'
set protocols static interface-route 10.0.1.2/32 next-hop-interface tun100
set service dhcp-server shared-network-name asdf authoritative
- set service dhcp-server shared-network-name asdf subnet 3.3.3.0/24 range 0 start '3.3.3.30'
- set service dhcp-server shared-network-name asdf subnet 3.3.3.0/24 range 0 stop '3.3.3.40'
+ set service dhcp-server shared-network-name asdf subnet 192.168.3.0/24 range 0 start '192.168.3.30'
+ set service dhcp-server shared-network-name asdf subnet 192.168.3.0/24 range 0 stop '192.168.3.40'
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 default-router '10.0.1.2'
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 range 0 start '10.0.1.200'
set service dhcp-server shared-network-name asdf subnet 10.0.1.0/24 range 0 stop '10.0.1.210'
@@ -61,17 +61,17 @@ DHCP Relay
set interfaces ethernet eth0 address '10.0.1.2/24'
set interfaces ethernet eth1 address '192.168.0.1/24'
- set interfaces loopback lo address '1.1.1.1'
+ set interfaces loopback lo address '10.100.100.1'
set interfaces tunnel tun100 address '172.16.0.1/30'
set interfaces tunnel tun100 encapsulation 'gre-bridge'
set interfaces tunnel tun100 local-ip '192.168.0.1'
set interfaces tunnel tun100 remote-ip '10.0.2.1'
set protocols ospf area 0 network '10.0.1.0/24'
set protocols ospf area 0 network '192.168.0.0/24'
- set protocols ospf area 0 network '1.1.1.0/24'
- set protocols ospf parameters router-id '1.1.1.1'
- set protocols static interface-route 3.3.3.3/32 next-hop-interface tun100
+ set protocols ospf area 0 network '10.100.100.0/24'
+ set protocols ospf parameters router-id '10.100.100.1'
+ set protocols static interface-route 192.168.3.3/32 next-hop-interface tun100
set service dhcp-relay interface 'eth0'
set service dhcp-relay interface 'tun100'
- set service dhcp-relay server '3.3.3.3'
+ set service dhcp-relay server '192.168.3.3'
diff --git a/docs/configexamples/tunnelbroker-ipv6.rst b/docs/configexamples/tunnelbroker-ipv6.rst
index 868b225f..b6f1cc07 100644
--- a/docs/configexamples/tunnelbroker-ipv6.rst
+++ b/docs/configexamples/tunnelbroker-ipv6.rst
@@ -1,5 +1,7 @@
.. _examples-tunnelbroker-ipv6:
+.. stop_vyoslinter
+
#######################
Tunnelbroker.net (IPv6)
#######################
@@ -110,7 +112,9 @@ should be replaced with the information from your `Routed /64` tunnel):
set service router-advert interface eth1 name-server '2001:4860:4860::8844'
set service router-advert interface eth1 prefix 2001:470:xxxx:xxxx::/64
-Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default, 'valid-lifetime' and 'preferred-lifetime' are set to default values of 30 days and 4 hours respectively.
+Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
+'valid-lifetime' and 'preferred-lifetime' are set to default values of
+30 days and 4 hours respectively.
This accomplishes a few things:
@@ -155,7 +159,9 @@ So, when your LAN is eth1, your DMZ is eth2, your cameras live on eth3, etc:
set service router-advert interface eth3 name-server '2001:4860:4860::8844'
set service router-advert interface eth3 prefix 2001:470:xxxx:3::/64
-Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default, 'valid-lifetime' and 'preferred-lifetime' are set to default values of 30 days and 4 hours respectively.
+Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
+'valid-lifetime' and 'preferred-lifetime' are set to default values of
+30 days and 4 hours respectively.
Firewall
========
@@ -167,3 +173,6 @@ NAME`.
Similarly, to attach the firewall, you would use `set interfaces ethernet eth0
firewall in ipv6-name` or `set zone-policy zone LOCAL from WAN firewall
ipv6-name`.
+
+
+.. start_vyoslinter
diff --git a/docs/configexamples/wan-load-balancing.rst b/docs/configexamples/wan-load-balancing.rst
index 7093defe..07974166 100644
--- a/docs/configexamples/wan-load-balancing.rst
+++ b/docs/configexamples/wan-load-balancing.rst
@@ -1,5 +1,7 @@
.. _wan-load-balancing:
+.. stop_vyoslinter # pictures and text have to change
+
WAN Load Balancer examples
==========================
@@ -168,3 +170,5 @@ eth+ is used as an alias that refers to all ethernet interfaces:
set load-balancing wan rule 5 exclude
set load-balancing wan rule 5 inbound-interface eth+
set load-balancing wan rule 5 destination address 10.0.0.0/8
+
+.. start_vyoslinter \ No newline at end of file