summaryrefslogtreecommitdiff
path: root/docs/configuration
diff options
context:
space:
mode:
authorrebortg <github@ghlr.de>2021-10-07 22:36:57 +0200
committerrebortg <github@ghlr.de>2021-10-07 22:36:57 +0200
commit6bf77c37f10147daf076f8abfc7cf1923a92a67b (patch)
treeeb4d055227780e6cc53da0673531a11dcac494db /docs/configuration
parentb811d1553df87b591d2bf6e46fd94d71744f79b9 (diff)
downloadvyos-documentation-6bf77c37f10147daf076f8abfc7cf1923a92a67b.tar.gz
vyos-documentation-6bf77c37f10147daf076f8abfc7cf1923a92a67b.zip
openvpn: correct build warning and correct :ref:
Diffstat (limited to 'docs/configuration')
-rw-r--r--docs/configuration/interfaces/openvpn.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/configuration/interfaces/openvpn.rst b/docs/configuration/interfaces/openvpn.rst
index 6bfc0b9d..e249af25 100644
--- a/docs/configuration/interfaces/openvpn.rst
+++ b/docs/configuration/interfaces/openvpn.rst
@@ -48,7 +48,7 @@ Site-to-site mode supports x.509 but doesn't require it and can also work with
static keys, which is simpler in many cases. In this example, we'll configure
a simple site-to-site OpenVPN tunnel using a 2048-bit pre-shared key.
-First, one of the systems generate the key using the :ref:`generate pki openvpn shared-secret<configuration/pki:pki>`
+First, one of the systems generate the key using the :ref:`generate pki openvpn shared-secret<configuration/pki/index:pki>`
command. Once generated, you will need to install this key on the local system,
then copy and install this key to the remote router.
@@ -274,7 +274,7 @@ Server
Multi-client server is the most popular OpenVPN mode on routers. It always uses
x.509 authentication and therefore requires a PKI setup. Refer this topic
-:ref:`configuration/pki:pki` to generate a CA certificate,
+:ref:`configuration/pki/index:pki` to generate a CA certificate,
a server certificate and key, a certificate revocation list, a Diffie-Hellman
key exchange parameters file. You do not need client certificates and keys for
the server setup.