diff options
Diffstat (limited to 'docs/configuration')
-rw-r--r-- | docs/configuration/container/index.rst | 9 | ||||
-rw-r--r-- | docs/configuration/firewall/ipv4.rst | 8 | ||||
-rw-r--r-- | docs/configuration/firewall/ipv6.rst | 8 | ||||
-rw-r--r-- | docs/configuration/interfaces/geneve.rst | 5 | ||||
-rw-r--r-- | docs/configuration/loadbalancing/haproxy.rst | 46 | ||||
-rw-r--r-- | docs/configuration/policy/community-list.rst | 2 | ||||
-rw-r--r-- | docs/configuration/policy/route-map.rst | 1 | ||||
-rw-r--r-- | docs/configuration/policy/route.rst | 5 | ||||
-rw-r--r-- | docs/configuration/service/lldp.rst | 12 | ||||
-rw-r--r-- | docs/configuration/system/login.rst | 12 | ||||
-rw-r--r-- | docs/configuration/system/syslog.rst | 4 |
11 files changed, 93 insertions, 19 deletions
diff --git a/docs/configuration/container/index.rst b/docs/configuration/container/index.rst index 8327f169..5882f6db 100644 --- a/docs/configuration/container/index.rst +++ b/docs/configuration/container/index.rst @@ -124,6 +124,15 @@ Configuration Volume is either mounted as rw (read-write - default) or ro (read-only) +.. cfgcmd:: set container name <name> tmpfs <tmpfsname> destination <path> + + Mount a tmpfs *(ramdisk)* filesystem to the given path within the container. + +.. cfgcmd:: set container name <name> tmpfs <tmpfsname> size <MB> + + Size in MB for tmpfs filesystem, maximum size is 64GB or 50% of the + systems total available memory. + .. cfgcmd:: set container name <name> uid <number> .. cfgcmd:: set container name <name> gid <number> diff --git a/docs/configuration/firewall/ipv4.rst b/docs/configuration/firewall/ipv4.rst index 5fc9bd4c..a9435fa8 100644 --- a/docs/configuration/firewall/ipv4.rst +++ b/docs/configuration/firewall/ipv4.rst @@ -1,4 +1,4 @@ -:lastproofread: 2024-07-03 +:lastproofread: 2025-02-14 .. _firewall-ipv4-configuration: @@ -188,7 +188,7 @@ The action can be : distribute packets between several queues. Also, **default-action** is an action that takes place whenever a packet does -not match any rule in it's chain. For base chains, possible options for +not match any rule in its chain. For base chains, possible options for **default-action** are **accept** or **drop**. .. cfgcmd:: set firewall ipv4 forward filter default-action @@ -219,7 +219,7 @@ not match any rule in it's chain. For base chains, possible options for Firewall Logs ============= -Logging can be enable for every single firewall rule. If enabled, other +Logging can be enabled for every single firewall rule. If enabled, other log options can be defined. .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> log @@ -1236,7 +1236,7 @@ Rule-set overview .. opcmd:: show firewall statistics - This will show you a statistic of all rule-sets since the last boot. + This will show you statistics of all rule-sets since the last boot. Show Firewall log ================= diff --git a/docs/configuration/firewall/ipv6.rst b/docs/configuration/firewall/ipv6.rst index c579b6d1..95502f4a 100644 --- a/docs/configuration/firewall/ipv6.rst +++ b/docs/configuration/firewall/ipv6.rst @@ -1,4 +1,4 @@ -:lastproofread: 2024-07-03 +:lastproofread: 2025-02-14 .. _firewall-ipv6-configuration: @@ -188,7 +188,7 @@ The action can be : distribute packets between several queues. Also, **default-action** is an action that takes place whenever a packet does -not match any rule in it's chain. For base chains, possible options for +not match any rule in its chain. For base chains, possible options for **default-action** are **accept** or **drop**. .. cfgcmd:: set firewall ipv6 forward filter default-action @@ -219,7 +219,7 @@ not match any rule in it's chain. For base chains, possible options for Firewall Logs ============= -Logging can be enable for every single firewall rule. If enabled, other +Logging can be enabled for every single firewall rule. If enabled, other log options can be defined. .. cfgcmd:: set firewall ipv6 forward filter rule <1-999999> log @@ -1242,7 +1242,7 @@ Rule-set overview .. opcmd:: show firewall statistics - This will show you a statistic of all rule-sets since the last boot. + This will show you statistics of all rule-sets since the last boot. Show Firewall log ================= diff --git a/docs/configuration/interfaces/geneve.rst b/docs/configuration/interfaces/geneve.rst index a0a46a95..e9d2d52b 100644 --- a/docs/configuration/interfaces/geneve.rst +++ b/docs/configuration/interfaces/geneve.rst @@ -85,3 +85,8 @@ GENEVE options decisions or MAY be used as a mechanism to distinguish between overlapping address spaces contained in the encapsulated packet when load balancing across CPUs. + +.. cfgcmd:: set interfaces gnv0 <interface> port <port> + + Configure port number of remote GENEVE endpoint. + diff --git a/docs/configuration/loadbalancing/haproxy.rst b/docs/configuration/loadbalancing/haproxy.rst index c7c25783..e62740ce 100644 --- a/docs/configuration/loadbalancing/haproxy.rst +++ b/docs/configuration/loadbalancing/haproxy.rst @@ -57,6 +57,12 @@ Service For an explanation on :ref:`syslog_facilities` and :ref:`syslog_severity_level` see tables in syslog configuration section. +.. cfgcmd:: set load-balancing haproxy service <name> timeout client + <seconds> + + Set the maximum inactivity time on the client side for this service. + Value range 1-3600 seconds. + .. cfgcmd:: set load-balancing haproxy service <name> http-compression algorithm <gzip | deflate | identity | raw-deflate> @@ -184,6 +190,26 @@ Backend For an explanation on :ref:`syslog_facilities` and :ref:`syslog_severity_level` see tables in syslog configuration section. +.. cfgcmd:: set load-balancing haproxy backend <name> timeout check + <seconds> + + Set the timeout in seconds for established connections. + Value range 1-3600 seconds. + + +.. cfgcmd:: set load-balancing haproxy backend <name> timeout connect + <seconds> + + Set the maximum time to wait for a connection attempt to a server to succeed. + Value range 1-3600 seconds. + +.. cfgcmd:: set load-balancing haproxy backend <name> timeout server + <seconds> + + Set the maximum inactivity time on the server side. + Value range 1-3600 seconds. + + Global ------- @@ -212,6 +238,26 @@ Global parameters For an explanation on :ref:`syslog_facilities` and :ref:`syslog_severity_level` see tables in syslog configuration section. +.. cfgcmd:: set load-balancing haproxy timeout check <seconds> + + Set the timeout in seconds for established connections. + Value range 1-3600 seconds. Default is 5 seconds. + +.. cfgcmd:: set load-balancing haproxy timeout client <seconds> + + Set the maximum inactivity time on the client side. + Value range 1-3600 seconds. Default is 50 seconds. + +.. cfgcmd:: set load-balancing haproxy timeout connect <seconds> + + Set the maximum time to wait for a connection attempt to a server to succeed. + Value range 1-3600 seconds. Default is 10 seconds. + +.. cfgcmd:: set load-balancing haproxy timeout server <seconds> + + Set the maximum inactivity time on the server side. + Value range 1-3600 seconds. Default is 50 seconds. + Health checks ============= diff --git a/docs/configuration/policy/community-list.rst b/docs/configuration/policy/community-list.rst index e53abeb3..ee2da03c 100644 --- a/docs/configuration/policy/community-list.rst +++ b/docs/configuration/policy/community-list.rst @@ -30,6 +30,6 @@ policy community-list Set description for rule. .. cfgcmd:: set policy community-list <text> rule <1-65535> regex - <aa:nn|local-AS|no-advertise|no-export|internet|additive> + <aa:nn|local-AS|no-advertise|no-export|additive> Regular expression to match against a community-list.
\ No newline at end of file diff --git a/docs/configuration/policy/route-map.rst b/docs/configuration/policy/route-map.rst index ccc4cef0..03cdb99b 100644 --- a/docs/configuration/policy/route-map.rst +++ b/docs/configuration/policy/route-map.rst @@ -366,7 +366,6 @@ List of well-known communities * ``local-as`` - Well-known communities value NO_EXPORT_SUBCONFED 0xFFFFFF03 * ``no-advertise`` - Well-known communities value NO_ADVERTISE 0xFFFFFF02 * ``no-export`` - Well-known communities value NO_EXPORT 0xFFFFFF01 - * ``internet`` - Well-known communities value 0 * ``graceful-shutdown`` - Well-known communities value GRACEFUL_SHUTDOWN 0xFFFF0000 * ``accept-own`` - Well-known communities value ACCEPT_OWN 0xFFFF0001 * ``route-filter-translated-v4`` - Well-known communities value ROUTE_FILTER_TRANSLATED_v4 0xFFFF0002 diff --git a/docs/configuration/policy/route.rst b/docs/configuration/policy/route.rst index 45975774..b818d238 100644 --- a/docs/configuration/policy/route.rst +++ b/docs/configuration/policy/route.rst @@ -24,6 +24,11 @@ from 1 - 999999, at the first match the action of the rule will be executed. Option to log packets hitting default-action. +.. cfgcmd:: set policy route <name> interface <interface> +.. cfgcmd:: set policy route6 <name> interface <interface> + + Apply routing policy to interface + .. cfgcmd:: set policy route <name> rule <n> description <text> .. cfgcmd:: set policy route6 <name> rule <n> description <text> diff --git a/docs/configuration/service/lldp.rst b/docs/configuration/service/lldp.rst index 12a9e0b6..8aee6183 100644 --- a/docs/configuration/service/lldp.rst +++ b/docs/configuration/service/lldp.rst @@ -49,10 +49,16 @@ Configuration Enable transmission of LLDP information on given `<interface>`. You can also say ``all`` here so LLDP is turned on on every interface. -.. cfgcmd:: set service lldp interface <interface> disable +.. cfgcmd:: set service lldp interface <interface> mode [disable|rx-tx|rx|tx] - Disable transmit of LLDP frames on given `<interface>`. Useful to exclude - certain interfaces from LLDP when ``all`` have been enabled. + Configure the administrative status of the given port. + + By default, all ports are configured to be in rx-tx mode. This means they + can receive and transmit LLDP frames. + + In rx mode, they won't emit any frames. In tx mode, they won't receive + any frames. In disabled mode, no frame will be sent and any incoming frame + will be discarded. .. cfgcmd:: set service lldp snmp diff --git a/docs/configuration/system/login.rst b/docs/configuration/system/login.rst index 452981a9..3a7481eb 100644 --- a/docs/configuration/system/login.rst +++ b/docs/configuration/system/login.rst @@ -319,28 +319,28 @@ TACACS is defined in :rfc:`8907`. Configuration ------------- -.. cfgcmd:: set system login tacas server <address> key <secret> +.. cfgcmd:: set system login tacacs server <address> key <secret> Specify the IP `<address>` of the TACACS server user with the pre-shared-secret given in `<secret>`. Multiple servers can be specified. -.. cfgcmd:: set system login tacas server <address> port <port> +.. cfgcmd:: set system login tacacs server <address> port <port> Configure the discrete port under which the TACACS server can be reached. This defaults to 49. -.. cfgcmd:: set system login tacas server <address> disable +.. cfgcmd:: set system login tacacs server <address> disable Temporary disable this TACACS server. It won't be queried. -.. cfgcmd:: set system login tacas server <address> timeout <timeout> +.. cfgcmd:: set system login tacacs server <address> timeout <timeout> Setup the `<timeout>` in seconds when querying the TACACS server. -.. cfgcmd:: set system login tacas source-address <address> +.. cfgcmd:: set system login tacacs source-address <address> TACACS servers could be hardened by only allowing certain IP addresses to connect. As of this the source address of each TACACS query can be @@ -350,7 +350,7 @@ Configuration interface address pointing towards the server - making it error prone on e.g. OSPF networks when a link fails and a backup route is taken. -.. cfgcmd:: set system login tacas vrf <name> +.. cfgcmd:: set system login tacacs vrf <name> Source all connections to the TACACS servers from given VRF `<name>`. diff --git a/docs/configuration/system/syslog.rst b/docs/configuration/system/syslog.rst index 73baaa5e..41a65934 100644 --- a/docs/configuration/system/syslog.rst +++ b/docs/configuration/system/syslog.rst @@ -27,6 +27,10 @@ Global Settings This defaults to 1200 seconds. +.. cfgcmd:: system syslog marker disable + + Disable periodic injection of mark messages. + .. cfgcmd:: system syslog preserve-fqdn If set, the domain part of the hostname is always sent, even within the same |