diff options
-rw-r--r-- | docs/configexamples/ansible.rst | 4 | ||||
-rw-r--r-- | docs/configuration/interfaces/openvpn.rst | 6 | ||||
-rw-r--r-- | docs/configuration/protocols/ospf.rst | 4 | ||||
-rw-r--r-- | docs/configuration/protocols/pim.rst | 4 | ||||
-rw-r--r-- | docs/configuration/service/dhcp-relay.rst | 2 | ||||
-rw-r--r-- | docs/configuration/system/login.rst | 2 | ||||
-rw-r--r-- | docs/configuration/vrf/index.rst | 2 | ||||
-rw-r--r-- | docs/quick-start.rst | 6 |
8 files changed, 17 insertions, 13 deletions
diff --git a/docs/configexamples/ansible.rst b/docs/configexamples/ansible.rst index 431ad8c3..fc243c44 100644 --- a/docs/configexamples/ansible.rst +++ b/docs/configexamples/ansible.rst @@ -119,7 +119,7 @@ Add the simple playbook with the tasks for each router: true Start the playbook: -================== +=================== .. code-block:: none @@ -158,7 +158,7 @@ Check the result on the vyos10 router: set system name-server '8.8.8.8' The simple way without configuration of the hostname (one task for all routers): -============================================================================ +================================================================================ .. code-block:: none diff --git a/docs/configuration/interfaces/openvpn.rst b/docs/configuration/interfaces/openvpn.rst index 70161e1e..d92ac080 100644 --- a/docs/configuration/interfaces/openvpn.rst +++ b/docs/configuration/interfaces/openvpn.rst @@ -71,7 +71,7 @@ In both cases, we will use the following settings: dynamic IP for our remote router. Setting up certificates ------------------------ +======================= Setting up a full-blown PKI with a CA certificate would arguably defeat the purpose of site-to-site OpenVPN, since its main goal is supposed to be configuration simplicity, @@ -129,7 +129,7 @@ Note: certificate names don't matter, we use 'openvpn-local' and 'openvpn-remote Repeat the procedure on the other router. Setting up OpenVPN ------------------- +================== Local Configuration: @@ -166,7 +166,7 @@ Remote Configuration: on the local router Pre-shared keys ---------------- +=============== Until VyOS 1.4, the only option for site-to-site OpenVPN without PKI was to use pre-shared keys. That option is still available but it is deprecated and will be removed in the future. diff --git a/docs/configuration/protocols/ospf.rst b/docs/configuration/protocols/ospf.rst index e360d86a..9891c77d 100644 --- a/docs/configuration/protocols/ospf.rst +++ b/docs/configuration/protocols/ospf.rst @@ -1204,7 +1204,7 @@ Interface Configuration synchronizing process of the router's database with all neighbors. The default value is 1 seconds. The interval range is 3 to 65535. -.. _ospf:v3_redistribution_config: +.. _ospf:v3_graceful_restart: Graceful Restart ---------------- @@ -1245,6 +1245,8 @@ Graceful Restart By default, it supports both planned and unplanned outages. +.. _ospf:v3_redistribution_config: + Redistribution Configuration ---------------------------- diff --git a/docs/configuration/protocols/pim.rst b/docs/configuration/protocols/pim.rst index 1b97697d..2e881943 100644 --- a/docs/configuration/protocols/pim.rst +++ b/docs/configuration/protocols/pim.rst @@ -180,6 +180,8 @@ IGMP - Internet Group Management Protocol) Configure watermark warning generation for an IGMP group limit. Generates warning once the configured group limit is reached while adding new groups. +.. _pim:igmp_interface_commands: + Interface specific commands =========================== @@ -202,7 +204,7 @@ Interface specific commands Use this command to configure in the selected interface the IGMP query response timeout value (10-250) in deciseconds. If a report is not returned in the specified time, it will be assumed the (S,G) or - (*,G) state :rfc:`7761#section-4.1` has timed out. + (\*,G) state :rfc:`7761#section-4.1` has timed out. .. cfgcmd:: set protocols pim interface <interface> igmp version <version-number> diff --git a/docs/configuration/service/dhcp-relay.rst b/docs/configuration/service/dhcp-relay.rst index e1fbe1d2..dc45d071 100644 --- a/docs/configuration/service/dhcp-relay.rst +++ b/docs/configuration/service/dhcp-relay.rst @@ -154,6 +154,8 @@ Configuration Disable dhcpv6-relay service. +.. _dhcp_relay:v6_options: + Options ------- diff --git a/docs/configuration/system/login.rst b/docs/configuration/system/login.rst index 0cbcecde..98e05cdd 100644 --- a/docs/configuration/system/login.rst +++ b/docs/configuration/system/login.rst @@ -344,6 +344,8 @@ Configuration Source all connections to the TACACS servers from given VRF `<name>`. +.. _login:tacacs_example: + Configuration Example --------------------- diff --git a/docs/configuration/vrf/index.rst b/docs/configuration/vrf/index.rst index 7a50bfb2..bd482cd9 100644 --- a/docs/configuration/vrf/index.rst +++ b/docs/configuration/vrf/index.rst @@ -282,6 +282,8 @@ Configuration VRF and NAT ----------- +.. _vrf:nat_configuration: + Configuration ^^^^^^^^^^^^^ diff --git a/docs/quick-start.rst b/docs/quick-start.rst index d20a39f9..c8bb3f04 100644 --- a/docs/quick-start.rst +++ b/docs/quick-start.rst @@ -128,12 +128,6 @@ interlinked chains for each `Netfilter hook <https://wiki.nftables.org/wiki-nftables/index.php/Netfilter_hooks>`_ and allows for more granular control over the packet filtering process. -.. note:: Documentation for most of the new firewall CLI can be found in - the :ref:`firewall` chapter.The legacy firewall is still available - for versions before ``1.4-rolling-202308040557`` and can be found in the - :ref:`firewall-legacy` chapter. The examples in this section use the - new configuration. - The firewall begins with the base ``filter`` tables you define for each of the ``forward``, ``input``, and ``output`` Netfiter hooks. Each of these tables is populated with rules that are processed in order and can jump to other chains |