diff options
author | Robert Göhler <github@ghlr.de> | 2024-08-10 22:18:42 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-08-10 22:18:42 +0200 |
commit | 61bcbfed3607bd1589ab096a919777030bdc2ccf (patch) | |
tree | 27a7059c712a0ceb9792bd6e5143d4d4608de120 | |
parent | 1a65b0806ebe71c65e7516587961bb1ff955d61f (diff) | |
parent | 71050ef7f329003421c02d9a3eacd589b3785e3e (diff) | |
download | vyos-documentation-61bcbfed3607bd1589ab096a919777030bdc2ccf.tar.gz vyos-documentation-61bcbfed3607bd1589ab096a919777030bdc2ccf.zip |
Merge pull request #1521 from fett0/add-openvpn-br
OPENVPN: T6555: add documentation bridge feature
-rw-r--r-- | docs/configuration/interfaces/openvpn.rst | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/docs/configuration/interfaces/openvpn.rst b/docs/configuration/interfaces/openvpn.rst index 1dfe1fc5..dcfd9307 100644 --- a/docs/configuration/interfaces/openvpn.rst +++ b/docs/configuration/interfaces/openvpn.rst @@ -660,6 +660,51 @@ config file. The path and arguments need to be single- or double-quoted. quotes. This is done through a hack on our config generator. You can pass quotes using the ``"`` statement. +Server bridge +============= + +In Ethernet bridging configurations, OpenVPN's server mode can be set as a +'bridge' where the VPN tunnel encapsulates entire Ethernet frames +(up to 1514 bytes) instead of just IP packets (up to 1500 bytes). This setup +allows clients to transmit Layer 2 frames through the OpenVPN tunnel. Below, +we outline a basic configuration to achieve this: + + +Server Side: + +.. code-block:: none + + set interfaces bridge br10 member interface eth1.10 + set interfaces bridge br10 member interface vtun10 + set interfaces openvpn vtun10 device-type 'tap' + set interfaces openvpn vtun10 encryption data-ciphers 'aes192' + set interfaces openvpn vtun10 hash 'sha256'' + set interfaces openvpn vtun10 local-host '172.18.201.10' + set interfaces openvpn vtun10 local-port '1194' + set interfaces openvpn vtun10 mode 'server' + set interfaces openvpn vtun10 server bridge gateway '10.10.0.1' + set interfaces openvpn vtun10 server bridge start '10.10.0.100' + set interfaces openvpn vtun10 server bridge stop '10.10.0.200' + set interfaces openvpn vtun10 server bridge subnet-mask '255.255.255.0' + set interfaces openvpn vtun10 server topology 'subnet' + set interfaces openvpn vtun10 tls ca-certificate 'ca-1' + set interfaces openvpn vtun10 tls certificate 'srv-1' + set interfaces openvpn vtun10 tls dh-params 'srv-1' + +Client Side : + +.. code-block:: none + + set interfaces openvpn vtun10 device-type 'tap' + set interfaces openvpn vtun10 encryption data-ciphers 'aes192' + set interfaces openvpn vtun10 hash 'sha256'' + set interfaces openvpn vtun10 mode 'client' + set interfaces openvpn vtun10 protocol 'udp' + set interfaces openvpn vtun10 remote-host '172.18.201.10' + set interfaces openvpn vtun10 remote-port '1194' + set interfaces openvpn vtun10 tls ca-certificate 'ca-1' + set interfaces openvpn vtun10 tls certificate 'client-1' + *************************** Multi-factor Authentication *************************** |