Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-08-17 | bgp: T3759: add l3vpn "import vrf" commands | Christian Poessinger | |
2021-08-17 | xml: cleanup - replace format "text" with "txt" as required by the BASH helpers | Christian Poessinger | |
2021-08-17 | bgp: T3759: add l3vpn import/export vpn command for IPv4/IPv6 AFI | Christian Poessinger | |
2021-08-17 | bgp: T2174: create building block for path-limit which is used in IPv4/IPv6 AFI | Christian Poessinger | |
2021-08-17 | policy: T2425: bgp large-community-list name also supports - and _ | Christian Poessinger | |
2021-08-17 | policy: T2425: bgp ext-community-list name also supports - and _ | Christian Poessinger | |
2021-08-17 | policy: T2425: add missing validator for large-community-lists | Christian Poessinger | |
without the validators FRR commit errors would happen. | |||
2021-08-17 | policy: T2425: add missing constraints for extended and large community lists | Christian Poessinger | |
2021-08-17 | policy: T2425: update help test for BGP communities | Christian Poessinger | |
2021-08-17 | xml: proxy: use port-number building block for system proxy | Christian Poessinger | |
2021-08-17 | xml: webproxy: use port-number building block for LDAP connection | Christian Poessinger | |
2021-08-17 | xml: wireguard: use port-number building block | Christian Poessinger | |
2021-08-17 | xml: syslog: use port-number building block | Christian Poessinger | |
2021-08-17 | xml: tftp: use port-number building block | Christian Poessinger | |
2021-08-17 | xml: bcast-relay: use port-number building block | Christian Poessinger | |
2021-08-17 | xml: vxlan: use port-number building block | Christian Poessinger | |
2021-08-17 | xml: include: add error message to port-number | Christian Poessinger | |
2021-08-17 | isis: T1316: use common redistribute XML building block for IPv4 and IPv6 | Christian Poessinger | |
2021-08-16 | openvpn: T690: Add metric for pushed routes | Viacheslav | |
2021-08-15 | ospf: T3757: support to configure area at an interface level | Christian Poessinger | |
FRR supports configuring either network prefixes per area, or assign an interface to an area to participate in the routing process. This is already well known from other venders and supported by FRR. A valid VyOS OSPF configuration would then look like: vyos@vyos# show protocols ospf { interface dum0 { area 0 } interface eth0.201 { area 0 authentication { md5 { key-id 10 { md5-key vyos } } } dead-interval 40 hello-interval 10 priority 1 retransmit-interval 5 transmit-delay 1 } log-adjacency-changes { detail } parameters { abr-type cisco router-id 172.18.254.201 } passive-interface default passive-interface-exclude eth0.201 } | |||
2021-08-15 | conntrack: T3275: bugfix XML generation | Christian Poessinger | |
This commit fixes an error introduced by 43fcc0db0 ("conntrack: T3275: migrate 'disable' syntax to 'enable' syntax for the new default behavior") as the <valueless/> option can only be used on leafNodes. THis triggered the following build error: ValueError: <valueless/> is only allowed in <leafNode> | |||
2021-08-15 | Merge pull request #944 from sever-sever/T3702 | Christian Poessinger | |
pbr: T3702: Add rules match fwmark | |||
2021-08-15 | conntrack: T3275: migrate 'disable' syntax to 'enable' syntax for the new ↵ | Lulu Cathrinus Grimalkin | |
default behavior | |||
2021-08-13 | vrf: T3734: T3728: vni must be configured with a higher priority then bgpd | Christian Poessinger | |
When removing bgp (vrf) instances the assigned VRF vni must be deleted from FRR prior the removal of the bgp settings (T3734). This is now done by moving the CLI command "set vrf name red vni 1000" to a dedicated Python script with a priority higher then bgp. | |||
2021-08-13 | Merge pull request #914 from sever-sever/T3673 | Christian Poessinger | |
policy: T3673: Add set large-comm-list for route-map | |||
2021-08-13 | policy: T3673: Add set large-comm-list-delete for route-map | Viacheslav | |
2021-08-11 | bgp: T3739: add common route-distinguisher XML building block | Christian Poessinger | |
2021-08-10 | snmp: T3709: Allow enable oid ipCidrRouteTable | Viacheslav | |
2021-08-04 | ipsec: T3718: fix default processing of ike dh-group proposals | Christian Poessinger | |
IKE dh-group defaults to 2 (modp1024). | |||
2021-08-02 | pbr: T3702: Add rules match fwmark | Viacheslav | |
2021-08-01 | Merge pull request #943 from Cheeze-It/current | Christian Poessinger | |
isis: T3693: Adding IPv6 redistribution to ISIS | |||
2021-07-31 | isis: T3693: Adding IPv6 redistribution to ISIS | Cheeze_It | |
In this commit we add the ability to redistribute into ISIS for IPv6 address family. | |||
2021-07-30 | bgp: T1176: Add solo option for neighbor | Viacheslav | |
2021-07-25 | xml: tunnel: use source-interface building block | Christian Poessinger | |
2021-07-25 | ipsec: T1210: add RADIUS authentication for remote-access IKEv2 VPN | Christian Poessinger | |
set vpn ipsec remote-access connection rw authentication client-mode 'eap-radius' set vpn ipsec remote-access connection rw authentication id '192.0.2.1' set vpn ipsec remote-access connection rw authentication server-mode 'x509' set vpn ipsec remote-access connection rw authentication x509 ca-certificate 'CAcert_Class_3_Root' set vpn ipsec remote-access connection rw authentication x509 certificate 'vyos' set vpn ipsec remote-access connection rw esp-group 'ESP-RW' set vpn ipsec remote-access connection rw ike-group 'IKE-RW' set vpn ipsec remote-access connection rw local-address '192.0.2.1' set vpn ipsec remote-access connection rw pool 'ra-rw-ipv4' set vpn ipsec remote-access connection rw unique 'never' set vpn ipsec remote-access pool ra-rw-ipv4 name-server '192.0.2.2' set vpn ipsec remote-access pool ra-rw-ipv4 prefix '192.168.22.0/24' set vpn ipsec remote-access radius nas-identifier 'fooo' set vpn ipsec remote-access radius server 172.16.100.10 key 'secret' | |||
2021-07-25 | xml: add building block for RADIUS nas-identifier | Christian Poessinger | |
2021-07-25 | ipsec: T1210: move DHCP server configuration unter remote-access node | Christian Poessinger | |
As this is only related to remote-access, keeping it under "options" simply feels wrong. | |||
2021-07-22 | ipsec: T2816: remove "auto-update" CLI option | Christian Poessinger | |
Update/refresh of DNS records is now handled internally by Strongswan. | |||
2021-07-22 | xml: add building block for "local-users" | Christian Poessinger | |
2021-07-22 | pki: https: T3642: Migrate HTTPS to use PKI configuration | sarthurdev | |
2021-07-21 | pki: openvpn: T3642: Migrate OpenVPN to PKI and refactor | sarthurdev | |
2021-07-20 | pki: eapol: T3642: Migrate EAPoL to use PKI configuration | sarthurdev | |
2021-07-20 | pki: sstp: T3642: Migrate SSTP to PKI configuration | sarthurdev | |
2021-07-20 | pki: openconnect: T3642: Migrate OpenConnect SSL to PKI configuration | sarthurdev | |
2021-07-19 | Merge pull request #929 from sarthurdev/pki_wg | Christian Poessinger | |
pki: wireguard: T3642: Migrate Wireguard private key directly into CLI | |||
2021-07-19 | pki: wireguard: T3642: Migrate Wireguard private key directly into CLI | sarthurdev | |
Also renames peer pubkey to public-key for consistency | |||
2021-07-19 | ipsec: T1210: add "unique" option to specify how to handle multiple connections | Christian Poessinger | |
Connection uniqueness policy to enforce. To avoid multiple connections from the same user, a uniqueness policy can be enforced. * never: never enforce such a policy, even if a peer included INITIAL_CONTACT notification * keep: reject new connection attempts if the same user already has an active connection * replace: delete any existing connection if a new one for the same user gets established To compare connections for uniqueness, the remote IKE identity is used. If EAP or XAuth authentication is involved, the EAP-Identity or XAuth username is used to enforce the uniqueness policy instead. | |||
2021-07-19 | ipsec: T1210: split out pool from remote-access configuration | Christian Poessinger | |
Remote access IP pools can now be defined at a global level and referenced in IPSec remote-access connections. To defined a pool use: set vpn ipsec remote-access pool global-ipv4 name-server '172.16.1.1' set vpn ipsec remote-access pool global-ipv4 prefix '192.168.0.0/24' set vpn ipsec remote-access pool global-ipv6 name-server '2001:db8::1' set vpn ipsec remote-access pool global-ipv6 prefix '2001:db8:1000::/64' A connection can then reference the pool: set vpn ipsec remote-access connection foo pool 'global-ipv4' set vpn ipsec remote-access connection foo pool 'global-ipv6' | |||
2021-07-18 | ipsec: T1210: remote-access pools can not hold both IPv4 and IPv6 prefixes | Christian Poessinger | |
... this enables a dual-stack IKEv2 VPN deployment. | |||
2021-07-17 | Merge pull request #927 from zdc/T3655-sagitta | Christian Poessinger | |
VRF: T3655: proper connection tracking for VRFs |