summaryrefslogtreecommitdiff
path: root/docs/vpn/site2site_ipsec.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/vpn/site2site_ipsec.rst')
-rw-r--r--docs/vpn/site2site_ipsec.rst12
1 files changed, 6 insertions, 6 deletions
diff --git a/docs/vpn/site2site_ipsec.rst b/docs/vpn/site2site_ipsec.rst
index 8414e3bc..3f00d91a 100644
--- a/docs/vpn/site2site_ipsec.rst
+++ b/docs/vpn/site2site_ipsec.rst
@@ -116,7 +116,7 @@ Example:
* right subnet: `10.0.0.0/24` site2,remote office side
* right local_ip: `203.0.113.2` # remote office side WAN IP
-.. code-block:: console
+.. code-block:: none
# server config
set vpn ipsec esp-group office-srv-esp compression 'disable'
@@ -166,7 +166,7 @@ Example:
Show status of new setup:
-.. code-block:: console
+.. code-block:: none
vyos@srv-gw0:~$ show vpn ike sa
Peer ID / IP Local ID / IP
@@ -186,7 +186,7 @@ Show status of new setup:
If there is SNAT rules on eth1, need to add exclude rule
-.. code-block:: console
+.. code-block:: none
# server side
set nat source rule 10 destination address '10.0.0.0/24'
@@ -203,7 +203,7 @@ If there is SNAT rules on eth1, need to add exclude rule
To allow traffic to pass through to clients, you need to add the following
rules. (if you used the default configuration at the top of this page)
-.. code-block:: console
+.. code-block:: none
# server side
set firewall name OUTSIDE-LOCAL rule 32 action 'accept'
@@ -231,7 +231,7 @@ Imagine the following topology
**left**
-.. code-block:: console
+.. code-block:: none
set interfaces vti vti10 address '10.0.0.2/31'
@@ -265,7 +265,7 @@ Imagine the following topology
**right**
-.. code-block:: console
+.. code-block:: none
set interfaces vti vti10 address '10.0.0.3/31'