diff options
| author | Thatcher <thatcher@leaf.cloud> | 2021-10-30 22:58:13 +0200 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2021-10-30 22:58:13 +0200 | 
| commit | 315cd47a4c56723e2015142351a9211f7ab06983 (patch) | |
| tree | 0554a14cc9933289b4876b2a987bbf5db6422ab9 | |
| parent | bf50e539e7dbd9c79226b1d8acf1d8dbbb01e8a7 (diff) | |
| download | vyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.tar.gz vyos-documentation-315cd47a4c56723e2015142351a9211f7ab06983.zip | |
changed to use 'static interface-route' instead of 'static route'
This appears to be an error in the documentation. Tested it with vyos 1.3-rc6
| -rw-r--r-- | docs/configuration/interfaces/wireguard.rst | 16 | 
1 files changed, 8 insertions, 8 deletions
| diff --git a/docs/configuration/interfaces/wireguard.rst b/docs/configuration/interfaces/wireguard.rst index 55e03b16..bd7b4899 100644 --- a/docs/configuration/interfaces/wireguard.rst +++ b/docs/configuration/interfaces/wireguard.rst @@ -95,20 +95,20 @@ one.    set interfaces wireguard wg01 peer to-wg02 port '51820'    set interfaces wireguard wg01 peer to-wg02 pubkey 'XMrlPykaxhdAAiSjhtPlvi30NVkvLQliQuKP7AI7CyI='    set interfaces wireguard wg01 port '51820' -  set protocols static route 192.168.2.0/24 interface wg01 +  set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01  **local side - annotated commands**  .. code-block:: none -  set interfaces wireguard wg01 address '10.1.0.1/30'                     # Address of the wg01 tunnel interface.           +  set interfaces wireguard wg01 address '10.1.0.1/30'                          # Address of the wg01 tunnel interface.              set interfaces wireguard wg01 description 'VPN-to-wg02' -  set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24' # Subnets that are allowed to travel over the tunnel -  set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>'     # Public IP of the peer -  set interfaces wireguard wg01 peer to-wg02 port '58120'                 # Port of the Peer -  set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>'            # Public Key of the Peer -  set interfaces wireguard wg01 port '51820'                              # Port of own server -  set protocols static route 192.168.2.0/24 interface wg01                # Static route to remote subnet +  set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24'      # Subnets that are allowed to travel over the tunnel +  set interfaces wireguard wg01 peer to-wg02 address '<Site2 Pub IP>'          # Public IP of the peer +  set interfaces wireguard wg01 peer to-wg02 port '58120'                      # Port of the Peer +  set interfaces wireguard wg01 peer to-wg02 pubkey '<pubkey>'                 # Public Key of the Peer +  set interfaces wireguard wg01 port '51820'                                   # Port of own server +  set protocols static interface-route 192.168.2.0/24 next-hop-interface wg01  # Static route to remote subnet  The last step is to define an interface route for 192.168.2.0/24 to get  through the WireGuard interface `wg01`. Multiple IPs or networks can be | 
