diff options
author | rebortg <github@ghlr.de> | 2021-10-07 22:36:57 +0200 |
---|---|---|
committer | rebortg <github@ghlr.de> | 2021-10-07 22:36:57 +0200 |
commit | 6bf77c37f10147daf076f8abfc7cf1923a92a67b (patch) | |
tree | eb4d055227780e6cc53da0673531a11dcac494db /docs/configuration | |
parent | b811d1553df87b591d2bf6e46fd94d71744f79b9 (diff) | |
download | vyos-documentation-6bf77c37f10147daf076f8abfc7cf1923a92a67b.tar.gz vyos-documentation-6bf77c37f10147daf076f8abfc7cf1923a92a67b.zip |
openvpn: correct build warning and correct :ref:
Diffstat (limited to 'docs/configuration')
-rw-r--r-- | docs/configuration/interfaces/openvpn.rst | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/configuration/interfaces/openvpn.rst b/docs/configuration/interfaces/openvpn.rst index 6bfc0b9d..e249af25 100644 --- a/docs/configuration/interfaces/openvpn.rst +++ b/docs/configuration/interfaces/openvpn.rst @@ -48,7 +48,7 @@ Site-to-site mode supports x.509 but doesn't require it and can also work with static keys, which is simpler in many cases. In this example, we'll configure a simple site-to-site OpenVPN tunnel using a 2048-bit pre-shared key. -First, one of the systems generate the key using the :ref:`generate pki openvpn shared-secret<configuration/pki:pki>` +First, one of the systems generate the key using the :ref:`generate pki openvpn shared-secret<configuration/pki/index:pki>` command. Once generated, you will need to install this key on the local system, then copy and install this key to the remote router. @@ -274,7 +274,7 @@ Server Multi-client server is the most popular OpenVPN mode on routers. It always uses x.509 authentication and therefore requires a PKI setup. Refer this topic -:ref:`configuration/pki:pki` to generate a CA certificate, +:ref:`configuration/pki/index:pki` to generate a CA certificate, a server certificate and key, a certificate revocation list, a Diffie-Hellman key exchange parameters file. You do not need client certificates and keys for the server setup. |