summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRobert Göhler <github@ghlr.de>2021-10-11 11:15:45 +0200
committerGitHub <noreply@github.com>2021-10-11 11:15:45 +0200
commit175911b7d435454bed806bc0c51ede8ee77e2fa1 (patch)
tree67a2795ef368951b55e7309ccb283acf0ac9dd90
parentb34fb791251b3c79cc15ed59b26b77411a929661 (diff)
parentd6da7e765e851473a25b534e702b675b72402359 (diff)
downloadvyos-documentation-175911b7d435454bed806bc0c51ede8ee77e2fa1.tar.gz
vyos-documentation-175911b7d435454bed806bc0c51ede8ee77e2fa1.zip
Merge pull request #629 from goodNETnick/goodNETnick
Warning about IPsec and VTI interfaces
-rw-r--r--docs/configuration/interfaces/vti.rst19
-rw-r--r--docs/configuration/interfaces/wireguard.rst1
2 files changed, 19 insertions, 1 deletions
diff --git a/docs/configuration/interfaces/vti.rst b/docs/configuration/interfaces/vti.rst
index 34842866..1704b9d1 100644
--- a/docs/configuration/interfaces/vti.rst
+++ b/docs/configuration/interfaces/vti.rst
@@ -20,4 +20,21 @@ Results in:
address 192.168.2.249/30
address 2001:db8:2::249/64
description "Description"
- } \ No newline at end of file
+ }
+
+.. warning:: When using site-to-site IPsec with VTI interfaces,
+ be sure to disable route autoinstall
+
+.. code-block:: none
+
+ set vpn ipsec options disable-route-autoinstall
+
+More details about the IPsec and VTI issue and option disable-route-autoinstall
+https://blog.vyos.io/vyos-1-dot-2-0-development-news-in-july
+
+The root cause of the problem is that for VTI tunnels to work, their traffic
+selectors have to be set to 0.0.0.0/0 for traffic to match the tunnel, even
+though actual routing decision is made according to netfilter marks. Unless
+route insertion is disabled entirely, StrongSWAN thus mistakenly inserts a
+default route through the VTI peer address, which makes all traffic routed
+to nowhere. \ No newline at end of file
diff --git a/docs/configuration/interfaces/wireguard.rst b/docs/configuration/interfaces/wireguard.rst
index df6433c6..1c4b734c 100644
--- a/docs/configuration/interfaces/wireguard.rst
+++ b/docs/configuration/interfaces/wireguard.rst
@@ -151,6 +151,7 @@ below is always the public key from your peer, not your local one.
.. code-block:: none
set interfaces wireguard wg01 address '10.1.0.1/30'
+ set interfaces wireguard wg01 description 'VPN-to-wg02'
set interfaces wireguard wg01 peer to-wg02 allowed-ips '192.168.2.0/24'
set interfaces wireguard wg01 peer to-wg02 address '192.0.2.1'
set interfaces wireguard wg01 peer to-wg02 port '51820'