summaryrefslogtreecommitdiff
path: root/docs/configuration
diff options
context:
space:
mode:
Diffstat (limited to 'docs/configuration')
-rw-r--r--docs/configuration/highavailability/index.rst2
-rw-r--r--docs/configuration/nat/nat44.rst2
-rw-r--r--docs/configuration/pki/index.rst4
-rw-r--r--docs/configuration/service/https.rst13
-rw-r--r--docs/configuration/vpn/l2tp.rst2
-rw-r--r--docs/configuration/vpn/site2site_ipsec.rst4
-rw-r--r--docs/configuration/vrf/index.rst4
7 files changed, 11 insertions, 20 deletions
diff --git a/docs/configuration/highavailability/index.rst b/docs/configuration/highavailability/index.rst
index 2f20e783..7f06faa8 100644
--- a/docs/configuration/highavailability/index.rst
+++ b/docs/configuration/highavailability/index.rst
@@ -450,7 +450,7 @@ Port "0" is required if multiple ports are used.
set high-availability virtual-server vyos real-server 192.0.2.12 health-check script '/config/scripts/check-real-server-second.sh'
set high-availability virtual-server vyos real-server 192.0.2.12 port '0'
- set nat source rule 100 outbound-interface 'eth0'
+ set nat source rule 100 outbound-interface name 'eth0'
set nat source rule 100 source address '192.0.2.0/24'
set nat source rule 100 translation address 'masquerade'
diff --git a/docs/configuration/nat/nat44.rst b/docs/configuration/nat/nat44.rst
index b42c6cfe..98b230a9 100644
--- a/docs/configuration/nat/nat44.rst
+++ b/docs/configuration/nat/nat44.rst
@@ -663,7 +663,7 @@ We will use source and destination address for hash generation.
.. code-block:: none
- set nat destination rule 10 inbound-interface inbound-interface eth0
+ set nat destination rule 10 inbound-interface name eth0
set nat destination rule 10 protocol tcp
set nat destination rule 10 destination port 80
set nat destination rule 10 load-balance hash source-address
diff --git a/docs/configuration/pki/index.rst b/docs/configuration/pki/index.rst
index e83272f5..66ad84a3 100644
--- a/docs/configuration/pki/index.rst
+++ b/docs/configuration/pki/index.rst
@@ -148,11 +148,11 @@ WireGuard
``interface`` is used for the VyOS CLI command to identify the WireGuard
interface where this private key is to be used.
-.. opcmd:: generate pki wireguard pre-shared-key
+.. opcmd:: generate pki wireguard preshared-key
Generate a WireGuard pre-shared secret used for peers to communicate.
-.. opcmd:: generate pki wireguard pre-shared-key install <peer>
+.. opcmd:: generate pki wireguard preshared-key install <peer>
Generate a WireGuard pre-shared secret used for peers to communicate.
diff --git a/docs/configuration/service/https.rst b/docs/configuration/service/https.rst
index 08b16575..b767cb77 100644
--- a/docs/configuration/service/https.rst
+++ b/docs/configuration/service/https.rst
@@ -20,23 +20,14 @@ Configuration
.. cfgcmd:: set service https api debug
- To enable debug messages. Available via :opcmd:`show log` or
+ To enable debug messages. Available via :opcmd:`show log` or
:opcmd:`monitor log`
-.. cfgcmd:: set service https api port
-
- Set the listen port of the local API, this has no effect on the
- webserver. The default is port 8080
-
-.. cfgcmd:: set service https api socket
-
- Use local socket for API
-
.. cfgcmd:: set service https api strict
Enforce strict path checking
-.. cfgcmd:: set service https virtual-host <vhost> listen-address
+.. cfgcmd:: set service https virtual-host <vhost> listen-address
<ipv4 or ipv6 address>
Address to listen for HTTPS requests
diff --git a/docs/configuration/vpn/l2tp.rst b/docs/configuration/vpn/l2tp.rst
index 6ea1cc7d..26de47b3 100644
--- a/docs/configuration/vpn/l2tp.rst
+++ b/docs/configuration/vpn/l2tp.rst
@@ -60,7 +60,7 @@ To allow VPN-clients access via your external address, a NAT rule is required:
.. code-block:: none
- set nat source rule 110 outbound-interface 'eth0'
+ set nat source rule 110 outbound-interface name 'eth0'
set nat source rule 110 source address '192.168.255.0/24'
set nat source rule 110 translation address masquerade
diff --git a/docs/configuration/vpn/site2site_ipsec.rst b/docs/configuration/vpn/site2site_ipsec.rst
index 2b3403f5..8c0af774 100644
--- a/docs/configuration/vpn/site2site_ipsec.rst
+++ b/docs/configuration/vpn/site2site_ipsec.rst
@@ -245,13 +245,13 @@ If there is SNAT rules on eth1, need to add exclude rule
# server side
set nat source rule 10 destination address '10.0.0.0/24'
set nat source rule 10 'exclude'
- set nat source rule 10 outbound-interface 'eth1'
+ set nat source rule 10 outbound-interface name 'eth1'
set nat source rule 10 source address '192.168.0.0/24'
# remote office side
set nat source rule 10 destination address '192.168.0.0/24'
set nat source rule 10 'exclude'
- set nat source rule 10 outbound-interface 'eth1'
+ set nat source rule 10 outbound-interface name 'eth1'
set nat source rule 10 source address '10.0.0.0/24'
To allow traffic to pass through to clients, you need to add the following
diff --git a/docs/configuration/vrf/index.rst b/docs/configuration/vrf/index.rst
index dea53321..7a50bfb2 100644
--- a/docs/configuration/vrf/index.rst
+++ b/docs/configuration/vrf/index.rst
@@ -295,11 +295,11 @@ Configuration
set nat destination rule 110 description 'NAT ssh- INSIDE'
set nat destination rule 110 destination port '2022'
- set nat destination rule 110 inbound-interface 'eth0'
+ set nat destination rule 110 inbound-interface name 'eth0'
set nat destination rule 110 protocol 'tcp'
set nat destination rule 110 translation address '192.168.130.40'
- set nat source rule 100 outbound-interface 'eth0'
+ set nat source rule 100 outbound-interface name 'eth0'
set nat source rule 100 protocol 'all'
set nat source rule 100 source address '192.168.130.0/24'
set nat source rule 100 translation address 'masquerade'