diff options
Diffstat (limited to 'docs/configuration')
| -rw-r--r-- | docs/configuration/interfaces/openvpn.rst | 42 | 
1 files changed, 25 insertions, 17 deletions
| diff --git a/docs/configuration/interfaces/openvpn.rst b/docs/configuration/interfaces/openvpn.rst index 778f26c6..19645853 100644 --- a/docs/configuration/interfaces/openvpn.rst +++ b/docs/configuration/interfaces/openvpn.rst @@ -37,6 +37,8 @@ interface using `set interfaces openvpn`.  Site-To-Site  ============ +.. figure:: /_static/images/openvpn_site2site_diagram.jpg +  While many are aware of OpenVPN as a Client VPN solution, it is often  overlooked as a site-to-site VPN solution due to lack of support for this mode  in many router platforms. @@ -53,9 +55,12 @@ copy this key to the remote router.  In our example, we used the filename ``openvpn-1.key`` which we will reference  in our configuration. -* The public IP address of the local side of the VPN will be 198.51.100.10 -* The remote will be 203.0.113.11 +* The public IP address of the local side of the VPN will be 198.51.100.10. +* The public IP address of the remote side of the VPN will be 203.0.113.11.  * The tunnel will use 10.255.1.1 for the local IP and 10.255.1.2 for the remote. +* The local site will have a subnet of 10.0.0.0/16. +* The remote site will have a subnet of 10.1.0.0/16. +* Static Routing or other dynamic routing protocols can be used over the vtun interface  * OpenVPN allows for either TCP or UDP. UDP will provide the lowest latency,    while TCP will work better for lossy connections; generally UDP is preferred    when possible. @@ -96,6 +101,24 @@ Remote Configuration:    set interfaces openvpn vtun1 local-address '10.255.1.2'    set interfaces openvpn vtun1 remote-address '10.255.1.1' +Static Routing: + +Static routes can be configured referencing the tunnel interface; for example, +the local router will use a network of 10.0.0.0/16, while the remote has a +network of 10.1.0.0/16: + +Local Configuration: + +.. code-block:: none + +  set protocols static interface-route 10.1.0.0/16 next-hop-interface vtun1 + +Remote Configuration: + +.. code-block:: none + +  set protocols static interface-route 10.0.0.0/16 next-hop-interface vtun1 +  The configurations above will default to using 256-bit AES in GCM mode  for encryption (if both sides support NCP) and SHA-1 for HMAC authentication.  SHA-1 is considered weak, but other hashing algorithms are available, as are @@ -153,21 +176,6 @@ If you change the default encryption and hashing algorithms, be sure that the  local and remote ends have matching configurations, otherwise the tunnel will  not come up. -Static routes can be configured referencing the tunnel interface; for example, -the local router will use a network of 10.0.0.0/16, while the remote has a -network of 10.1.0.0/16: - -Local Configuration: - -.. code-block:: none - -  set protocols static interface-route 10.1.0.0/16 next-hop-interface vtun1 - -Remote Configuration: - -.. code-block:: none - -  set protocols static interface-route 10.0.0.0/16 next-hop-interface vtun1  Firewall policy can also be applied to the tunnel interface for `local`, `in`,  and `out` directions and functions identically to ethernet interfaces. | 
