From 176acce28daaed81f86fd444b6ac0d8e4de40e8f Mon Sep 17 00:00:00 2001 From: srividya0208 Date: Thu, 15 Jul 2021 09:39:02 -0400 Subject: l2tp/pptp : configuration and grammar check pptp - The cfg-mode 'set vpn pptp remote-access gateway-address' and op-mode 'show pptp-server sessions' commands are not available, so replaced with correct one l2tp - corrected the grammar --- docs/configuration/vpn/l2tp.rst | 10 ++++++---- docs/configuration/vpn/pptp.rst | 15 +++++++++------ 2 files changed, 15 insertions(+), 10 deletions(-) (limited to 'docs/configuration') diff --git a/docs/configuration/vpn/l2tp.rst b/docs/configuration/vpn/l2tp.rst index 64223475..8c8cc1dd 100644 --- a/docs/configuration/vpn/l2tp.rst +++ b/docs/configuration/vpn/l2tp.rst @@ -1,3 +1,5 @@ +:lastproofread:2021-07-15 + .. _l2tp: L2TP over IPsec @@ -85,7 +87,7 @@ operational command. RADIUS authentication ^^^^^^^^^^^^^^^^^^^^^ -The above configuration made use of local accounts on the VyOS router for +The above configuration uses local accounts on the VyOS router for authenticating L2TP/IPSec clients. In bigger environments usually something like RADIUS_ (FreeRADIUS_ or Microsoft `Network Policy Server`_, NPS) is used. @@ -104,9 +106,9 @@ nodes: set vpn l2tp remote-access authentication radius server 1.1.1.1 key 'foo' set vpn l2tp remote-access authentication radius server 2.2.2.2 key 'foo' -.. note:: Some RADIUS_ severs make use of an access control list who is allowed - to query the server. Please configure your VyOS router in the allowed client - list. +.. note:: Some RADIUS_ severs make use of an access control list which is + allowed to query the server. Please configure your VyOS router in the + allowed client list. RADIUS source address ********************* diff --git a/docs/configuration/vpn/pptp.rst b/docs/configuration/vpn/pptp.rst index 72b3feb0..076a95b8 100644 --- a/docs/configuration/vpn/pptp.rst +++ b/docs/configuration/vpn/pptp.rst @@ -1,3 +1,5 @@ +:lastproofread:2021-07-15 + .. _pptp: PPTP-Server @@ -17,8 +19,7 @@ server example set vpn pptp remote-access authentication local-users username test password 'test' set vpn pptp remote-access authentication mode 'local' set vpn pptp remote-access client-ip-pool start '192.168.0.10' - set vpn pptp remote-access client-ip-pool stop '192.168.0.15' - set vpn pptp remote-access gateway-address '10.100.100.1' + set vpn pptp remote-access client-ip-pool stop '192.168.0.15' set vpn pptp remote-access outside-address '10.1.1.120' @@ -41,7 +42,9 @@ All tunnel sessions can be checked via: .. code-block:: none - run sh pptp-server sessions - ifname | username | calling-sid | ip | type | comp | state | uptime - --------+----------+-------------+--------------+------+------+--------+---------- - ppp0 | test | 10.1.1.99 | 192.168.0.10 | pptp | mppe | active | 00:00:58 + run show vpn remote-access + Active remote access VPN sessions: + + User Proto Iface Tunnel IP TX byte RX byte Time + ---- ----- ----- --------- ------- ------- ---- + test PPTP pptp0 192.168.0.10 288 66 00h00m07s -- cgit v1.2.3