Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-06-29 | router-advert: T4477: support RDNSS lifetime option | Christian Poessinger | |
set service router-advert interface eth0 name-server-lifetime <value> | |||
2022-06-22 | Policy: T4475: add support for matching ipv6 addresses on peer option in ↵ | Nicolas Fort | |
route-map | |||
2022-06-16 | smoketest: policy: T4467: validate relative route-map metric | Christian Poessinger | |
2022-06-14 | firewall: T970: Use set prefix to domain groups | sarthurdev | |
2022-06-14 | firewall: T4147: Use named sets for firewall groups | sarthurdev | |
* Refactor nftables clean-up code * Adds policy route test for using firewall groups | |||
2022-06-10 | Merge pull request #1356 from sarthurdev/nested_groups | Christian Poessinger | |
firewall: T478: Add support for nesting groups | |||
2022-06-10 | firewall: T478: Add support for nesting groups | sarthurdev | |
2022-06-10 | Firewall:T4458: Add ttl match option in firewall | Nicolas Fort | |
2022-06-10 | Merge pull request #1322 from nicolas-fort/T3907-fwall-log | Daniil Baturin | |
Firewall: T3907: add log-level options in firewall | |||
2022-06-10 | smoketest: T970: Add commit after static-host-mapping | Viacheslav Hletenko | |
Staic-host-mapping 'example.com' should be exists before we configure firewall domain-group FOO address example.com | |||
2022-06-09 | smoketest: sstp: T4444: verify port can be changed | Christian Poessinger | |
2022-06-09 | Merge pull request #1327 from sever-sever/T970 | Christian Poessinger | |
firewall: T970: Add firewall group domain-group | |||
2022-06-05 | T4387: add more firewall checks for WLB smoketests. | Nicolas Fort | |
2022-06-05 | Merge pull request #1346 from sever-sever/T4387-curr | Viacheslav Hletenko | |
smoketest: T4387: Add test for load-balancing wan | |||
2022-06-04 | Policy: T3976-T4449-nexthop: add - match ipv6 nexthop type - as available ↵ | Nicolas Fort | |
for ipv4 | |||
2022-06-02 | smoketest: T4387: Add test for load-balancing wan | Viacheslav Hletenko | |
Create 2 network namespaces which allow us to emulate 2 ISP with different static addresses Check routing table 201 for the first ISP and table 202 for the second ISP. Each table must contain default route (cherry picked from commit 6b75cbb0575ca95806e969f5d7f219c0cbeea334) | |||
2022-05-31 | pki: T3642: Update conf scripts using changed PKI objects | sarthurdev | |
2022-05-31 | IPv6: T3976: add prefix-list and access-list option from ipv6 route-map | fett0 | |
2022-05-29 | Policy: T4450: Expand options for ip|ipv6 address match. Now support ↵ | Nicolas Fort | |
prefix-len on both matches. Also change help properties of route-source node. | |||
2022-05-29 | rip: T4448: remove default version for RIP | Christian Poessinger | |
Commit f9e38622 ("rip: T4448: add support to set protocol version on an interface level") also added the versionspecified on a per interface level. the RIp version carried a default value of 2 which makes RIPv1 and RIPv2 no longer working which is dthe default for FRR. Remove the default "2" from the RIP version specifier to make this behavior work again. | |||
2022-05-29 | Merge branch 'T4449' of https://github.com/nicolas-fort/vyos-1x into current | Christian Poessinger | |
* 'T4449' of https://github.com/nicolas-fort/vyos-1x: Policy: T4449: Extend matching options for route-map ip nexthop | |||
2022-05-28 | rip: T4448: add support to set protocol version on an interface level | Christian Poessinger | |
2022-05-28 | firewall: T970: Add firewall group domain-group | Viacheslav Hletenko | |
Domain group allows to filter addresses by domain main Resolved addresses as elements are stored to named "nft set" that used in the nftables rules Also added a dynamic "resolver" systemd daemon vyos-domain-group-resolve.service which starts python script for the domain-group addresses resolving by timeout 300 sec set firewall group domain-group DOMAINS address 'example.com' set firewall group domain-group DOMAINS address 'example.org' set firewall name FOO rule 10 action 'drop' set firewall name FOO rule 10 source group domain-group 'DOMAINS' set interfaces ethernet eth0 firewall local name 'FOO' nft list table ip filter table ip filter { set DOMAINS { type ipv4_addr flags interval elements = { 192.0.2.1, 192.0.2.85, 203.0.113.55, 203.0.113.58 } } chain NAME_FOO { ip saddr @DOMAINS counter packets 0 bytes 0 drop comment "FOO-10" counter packets 0 bytes 0 return comment "FOO default-action accept" } } | |||
2022-05-28 | Policy: T4449: Extend matching options for route-map ip nexthop | Nicolas Fort | |
2022-05-28 | smoketest: rip: T4448: improve class startup time | Christian Poessinger | |
2022-05-28 | rip: T4448: add support for explicit version selection | Christian Poessinger | |
2022-05-27 | Firewall: T3907: Revert migration script 6-to-7 and add new 7-to-8 | Nicolas Fort | |
2022-05-25 | Merge pull request #1088 from zdc/T4020-sagitta | Daniil Baturin | |
FRR: T4020: Added CLI options for FRR daemons | |||
2022-05-21 | smoketest: flow-accounting: T4437: adjust smoketest to new generated config ↵ | Christian Poessinger | |
syntax | |||
2022-05-13 | smoketest: add sshguard allow-from case | Christian Poessinger | |
2022-05-12 | sshguard: T4408: Add service ssh dynamic-protection | Viacheslav Hletenko | |
Sshguard protects hosts from brute-force attacks Can inspect logs and block "bad" addresses by threshold Auto-generate rules for nftables When service stopped all generated rules are deleted nft "type filter hook input priority filter - 10" set service ssh dynamic-protection set service ssh dynamic-protection block-time 120 set service ssh dynamic-protection detect-time 1800 set service ssh dynamic-protection threshold 30 set service ssh dynamic-protection whitelist-address 192.0.2.1 | |||
2022-05-11 | Firewall: T3907: add log-level options in firewall | Nicolas Fort | |
2022-05-09 | Merge pull request #1279 from nicolas-fort/T990 | Christian Poessinger | |
Firewall: T990: Add snat and dnat connection status on firewall | |||
2022-05-08 | smoketest: policy-route: use setUpClass() | Christian Poessinger | |
2022-05-08 | policy: evpn: T3739: support "set evpn gateway-ip" | Christian Poessinger | |
2022-05-07 | vrf: T4419: support to disable IP forwarding within a given VRF | Christian Poessinger | |
2022-05-06 | bgp: T4385: verify() peer-group in interface based neighbors | Christian Poessinger | |
2022-05-05 | policy: T4414: add support for route-map "as-path prepend last-as x" | Christian Poessinger | |
2022-04-28 | arp: T4397: change CLI syntax to support interface and VRF bound ARP entries | Christian Poessinger | |
* set protocols static arp interface eth0 address 192.0.2.1 mac 01:23:45:67:89:01 | |||
2022-04-26 | smoketest: http: add decorator to suppress warnings locally | John Estabrook | |
2022-04-26 | smoketest: ethernet: bugfix - NameError: name 'af' is not defined | Christian Poessinger | |
2022-04-25 | smoketest: arp: add initial testcase for static ARP entries | Christian Poessinger | |
2022-04-25 | smoketest: ethernet: verify addresses are deleted from interface after test | Christian Poessinger | |
2022-04-25 | smoketest: openconnect: use setUpClass() over setUp() | Christian Poessinger | |
2022-04-25 | smoketest: dhcpv6-server: use setUpClass() over setUp() | Christian Poessinger | |
2022-04-25 | smoketest: pki: use setUpClass() over setUp() | Christian Poessinger | |
2022-04-25 | smoketest: migrate pppoe, and wireguard to setUpClass() scheme | Christian Poessinger | |
2022-04-25 | smoketest: bugfix on proper inheritance levels for classmethod | Christian Poessinger | |
2022-04-23 | Firewall: T990: Modifications for new connection-status cli | Nicolas Fort | |
2022-04-21 | pppoe: T4384: replace default-route CLI option with common CLI nodes already ↵ | Christian Poessinger | |
present for DHCP VyOS 1.4 still leverages PPPd internals on the CLI. pppd supports three options for a default route, none, auto, force. * none: No default route is installed on interface up * auto: Default route is only installed if there is yet no default route * force: overwrite any default route There are several drawbacks in this design for VyOS and the users. If auto is specified, this only counted for static default routes - but what about dynamic ones? Same for force, only a static default route got replaced but dynamic ones did not got taken into account. The CLI is changed and we now re-use already existing nodes from the DHCP interface configuration: * no-default-route: On link up no default route is installed, same as the previous default-route none * default-route-distance: We can now specify the distance of this route for the routing table on the system. This defaults to 210 as we have for DHCP interfaces. All this will be migrated using a CLI migration script. |