Page MenuHomeVyOS Platform
Feed All Stories

Oct 8 2022

Cheeze_It updated subscribers of T4707: Enable OSPF segment routing.

I closed the other PR, and put in https://github.com/vyos/vyos-1x/pull/1572.

Oct 8 2022, 3:28 AM · VyOS 1.4 Sagitta
Rain added a comment to T4612: Support arbitrary netmasks in firewall rules.

I'd like to see this feature added so I went ahead and implemented it: https://github.com/Rain/vyos-1x/commit/975f4fc358f0073f1ad825ea209169766dc2fa51

Oct 8 2022, 2:57 AM · VyOS 1.4 Sagitta

Oct 7 2022

jestabro added a comment to T4738: Extend automatic generation of schema definition files to native configsession functions; use single resolver/directive.

Working directory here; PR pending:
https://github.com/vyos/vyos-1x/compare/current...jestabro:gql-simplify

Oct 7 2022, 7:50 PM · VyOS 1.4 Sagitta
jestabro triaged T4738: Extend automatic generation of schema definition files to native configsession functions; use single resolver/directive as Normal priority.
Oct 7 2022, 7:47 PM · VyOS 1.4 Sagitta
zsdc changed the status of T4737: FRRouting/zebra 7.5.1 does not redistribute routes to other protocols from Open to Confirmed.
Oct 7 2022, 6:39 PM · VyOS 1.3 Equuleus (1.3.3)
zsdc created T4737: FRRouting/zebra 7.5.1 does not redistribute routes to other protocols.
Oct 7 2022, 6:13 PM · VyOS 1.3 Equuleus (1.3.3)
jestabro closed T4736: Error on JSON output of API query ShowConfig as Resolved.
Oct 7 2022, 3:01 PM · VyOS 1.4 Sagitta
jestabro created T4736: Error on JSON output of API query ShowConfig.
Oct 7 2022, 2:55 PM · VyOS 1.4 Sagitta
dmbaturin renamed T4630: Prevent attempts to use the same interface as a source interface for pseudo-ethernet and MACsec at the same time from Pseudo Ethernet can not use identical source-interface as MACsec to Prevent attempts to use the same interface as a source interface for pseudo-ethernet and MACsec at the same time.
Oct 7 2022, 2:46 PM · VyOS 1.4 Sagitta, VyOS 1.3 Equuleus (1.3.3)
dmbaturin changed Issue type from unspecified to improvement on T538: Support for network mapping in NAT.
Oct 7 2022, 2:14 PM · VyOS 1.4 Sagitta
dmbaturin renamed T538: Support for network mapping in NAT from Possible to implement Static NAT? to Support for network mapping in NAT.
Oct 7 2022, 2:14 PM · VyOS 1.4 Sagitta
Unknown Object (User) created T4734: Feature Request: openvpn: add OTP 2FA support.
Oct 7 2022, 2:08 AM · VyOS 1.4 Sagitta
Unknown Object (User) created T4733: Feature Request: dhcp server: add VRF support.
Oct 7 2022, 1:55 AM · VyOS 1.4 Sagitta

Oct 6 2022

aserkin created T4732: need an option for VRF name when you specify location for commit-archive.
Oct 6 2022, 6:02 PM · VyOS 1.5 Circinus
aserkin added a comment to T4731: excessive FRR logs about non-existent VRFs.
Oct 6 2022, 4:59 PM · VyOS 1.4 Sagitta
aserkin added a comment to T4731: excessive FRR logs about non-existent VRFs.

This a project for mobile access to enterprise networks. VyOS plays as an MPLS-PE router as well as L2TP Network Server. Every subscriber coming via l2tp is directed to the customer's VRF other than default (with RADIUS attribute)

Oct 6 2022, 4:24 PM · VyOS 1.4 Sagitta
v.huti claimed T4731: excessive FRR logs about non-existent VRFs.
Oct 6 2022, 2:29 PM · VyOS 1.4 Sagitta
v.huti added a comment to T4731: excessive FRR logs about non-existent VRFs.

Hi @aserkin! It looks like you have some frr server misbehavior. It sends up/down events with an unexisting vrf id.
Could you make/describe the setup that causes the issue to appear? Thanks

Oct 6 2022, 12:48 PM · VyOS 1.4 Sagitta
zsdc added a member for Maintainers: a.apostoliuk.
Oct 6 2022, 12:40 PM
zsdc assigned T4492: Incorrect list of neighbors in help for "show bgp vrf VRF neighbors" to a.apostoliuk.
Oct 6 2022, 11:14 AM · VyOS 1.4 Sagitta
aserkin created T4731: excessive FRR logs about non-existent VRFs.
Oct 6 2022, 10:44 AM · VyOS 1.4 Sagitta
Unknown Object (User) triaged T4730: Conntrack-sync error - listen-address is not the correct type in config as it should be as High priority.
Oct 6 2022, 1:35 AM · VyOS 1.4 Sagitta, VyOS 1.3 Equuleus (1.3.3)

Oct 5 2022

pasik added a comment to T4729: VxLAN does not work and deleted after tun changed.

Ah, yeah, that's a valid point for gretap.

Oct 5 2022, 3:07 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
Viacheslav added a comment to T4729: VxLAN does not work and deleted after tun changed.
In T4729#135223, @pasik wrote:

well, "gre" and "gretap" are different types of tunnels, with different features.. so it makes sense to test and validate with the normal "gre", as in your config I don't see a need for "gretap".

Oct 5 2022, 2:42 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
lferrarotti added a comment to T4676: IPoE server with mac authentication generates a wrong dictionary.

I just checked based on your comment and I can also confirm that with 1.4-rolling-202210050218 (using also different syntax) is working perfectly with the authentication.

Oct 5 2022, 11:35 AM · VyOS 1.4 Sagitta
Unknown Object (User) added a comment to T4676: IPoE server with mac authentication generates a wrong dictionary.

Update: latest rolling has a bit different syntax. I think users just not migrated properly on update. After adding

set service ipoe-server authentication interface eth1.50 mac 00:50:79:66:68:03
set service ipoe-server authentication interface eth1.51 mac 00:50:79:66:68:04

I see that chap-secrets file generated properly and users getsIPs

vyos@vyos# sudo cat /run/accel-pppd/ipoe.chap-secrets 
# username  server  password  acceptable local IP addresses   shaper
eth1.50     * 00:50:79:66:68:03 * 
eth1.51     * 00:50:79:66:68:04
vyos@vyos# run show ipoe-server sessions 
ifname | username |    calling-sid    |     ip      | rate-limit | type | comp | state  |  uptime  
--------+----------+-------------------+-------------+------------+------+------+--------+----------
 ipoe0  | eth1.50  | 00:50:79:66:68:03 | 172.16.50.2 |            | ipoe |      | active | 00:05:21 
 ipoe1  | eth1.51  | 00:50:79:66:68:04 | 172.16.98.2 |            | ipoe |      | active | 00:03:43
Oct 5 2022, 11:05 AM · VyOS 1.4 Sagitta
Unknown Object (User) claimed T4676: IPoE server with mac authentication generates a wrong dictionary.
Oct 5 2022, 8:55 AM · VyOS 1.4 Sagitta
Unknown Object (User) added a comment to T4676: IPoE server with mac authentication generates a wrong dictionary.

This issue also present in 1.3.0-1.3.2. Latest rolling 1.4-rolling-202210040218 also affected, it has empty user list in chap-secrets

vyos@vyos:~$ sudo cat /run/accel-pppd/ipoe.chap-secrets 
# username  server  password  acceptable local IP addresses   shaper
vyos@vyos:~$
Oct 5 2022, 8:55 AM · VyOS 1.4 Sagitta
pasik added a comment to T4729: VxLAN does not work and deleted after tun changed.

well, "gre" and "gretap" are different types of tunnels, with different features.. so it makes sense to test and validate with the normal "gre", as in your config I don't see a need for "gretap".

Oct 5 2022, 7:33 AM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project

Oct 4 2022

Viacheslav added a comment to T4729: VxLAN does not work and deleted after tun changed.
In T4729#135221, @pasik wrote:

Hmm, any specific reason for the tun0 encapsulation 'gretap' ? did you try with normal 'gre' tunnels ? Does it change anything?

Oct 4 2022, 11:36 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
pasik added a comment to T4729: VxLAN does not work and deleted after tun changed.

Hmm, any specific reason for the tun0 encapsulation 'gretap' ? did you try with normal 'gre' tunnels ? Does it change anything?

Oct 4 2022, 6:29 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
n.fort changed the status of T4706: NAT and NAT66 issues from Confirmed to Needs testing.
Oct 4 2022, 5:53 PM · VyOS 1.4 Sagitta
n.fort closed T4700: Firewall - Add interface match criteria as Resolved.
Oct 4 2022, 5:52 PM · VyOS 1.4 Sagitta
initramfs closed T4685: Interface does not exist on boot when used as inbound-interface for local policy route as Resolved.
Oct 4 2022, 4:59 PM · VyOS 1.4 Sagitta
initramfs closed T4582: Router-advert: Preferred lifetime cannot equal valid lifetime in PIOs as Resolved.
Oct 4 2022, 4:58 PM · VyOS 1.3 Equuleus (1.3.3), VyOS 1.4 Sagitta
initramfs closed T4648: PPPoE: Ignore default router from RA when PPPoE default-route is set to none as Resolved.
Oct 4 2022, 4:57 PM · VyOS 1.3 Equuleus (1.3.3)
Viacheslav added a comment to T4676: IPoE server with mac authentication generates a wrong dictionary.

Needs to check, maybe fixed with rewriting in T4678

Oct 4 2022, 3:48 PM · VyOS 1.4 Sagitta
Unknown Object (User) updated the task description for T4676: IPoE server with mac authentication generates a wrong dictionary.
Oct 4 2022, 2:15 PM · VyOS 1.4 Sagitta
n.fort closed T4699: Firewall - Add jump action - Add return action as Resolved.
Oct 4 2022, 12:05 PM · VyOS 1.4 Sagitta
n.fort closed T4651: Firewall - Add options to match packet size as Resolved.
Oct 4 2022, 12:05 PM · VyOS 1.4 Sagitta
Viacheslav updated the task description for T4729: VxLAN does not work and deleted after tun changed.
Oct 4 2022, 8:54 AM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
Viacheslav renamed T4729: VxLAN does not work and deleted after tun changed from VxLAN does not work after tun changed to VxLAN does not work and deleted after tun changed.
Oct 4 2022, 8:49 AM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
Viacheslav updated the task description for T4729: VxLAN does not work and deleted after tun changed.
Oct 4 2022, 8:45 AM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
Viacheslav created T4729: VxLAN does not work and deleted after tun changed.
Oct 4 2022, 8:44 AM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
Viacheslav closed T4708: 'show nat destination rules' throwing an error as Resolved.
Oct 4 2022, 8:13 AM · VyOS 1.4 Sagitta
c-po closed T4652: Upgrade PowerDNS recursor to 4.7 series, a subtask of T3882: Upgrade PowerDNs recursor to 4.5 series, as Resolved.
Oct 4 2022, 6:23 AM · VyOS 1.3 Equuleus (1.3.0-epa2), VyOS 1.4 Sagitta
c-po closed T4652: Upgrade PowerDNS recursor to 4.7 series as Resolved.
Oct 4 2022, 6:23 AM · VyOS 1.3 Equuleus (1.3.3), VyOS 1.4 Sagitta
c-po closed T4702: Wireguard peers configuration is not synchronized with CLI as Resolved.
Oct 4 2022, 6:23 AM · VyOS 1.3 Equuleus (1.3.3), VyOS 1.4 Sagitta

Oct 3 2022

bmhughes added a comment to T4728: Crontab file for vyos-wwan is ignored due to missing newline at EOF.

PR: https://github.com/vyos/vyos-1x/pull/1571

Oct 3 2022, 4:37 PM
bmhughes created T4728: Crontab file for vyos-wwan is ignored due to missing newline at EOF.
Oct 3 2022, 4:35 PM
dmbaturin added projects to T4726: Add completion and validation for the accel-ppp RADIUS vendor option: VyOS 1.4 Sagitta, VyOS 1.3 Equuleus (1.3.3).
Oct 3 2022, 4:27 PM · VyOS 1.5 Circinus, VyOS 1.4 Sagitta
dmbaturin created T4727: Add RADIUS rate limit support to PPTP server.
Oct 3 2022, 4:26 PM · VyOS 1.3 Equuleus (1.3.3), VyOS 1.4 Sagitta
dmbaturin created T4726: Add completion and validation for the accel-ppp RADIUS vendor option.
Oct 3 2022, 4:15 PM · VyOS 1.5 Circinus, VyOS 1.4 Sagitta
n.fort added a comment to T3655: NAT Problem with VRF.

At least on my lab, with one of the latest 1.4, this is working for me:

Oct 3 2022, 2:21 PM · VyOS 1.5 Circinus, Known issue, VyOS 1.4 Sagitta
narey83 added a comment to T4708: 'show nat destination rules' throwing an error.

@narey83 Could you re-check it with the latest rolling (start since vyos-1.4-rolling-202209290218-amd64.iso)?

Oct 3 2022, 12:25 PM · VyOS 1.4 Sagitta
Viacheslav created T4725: Unable to reset vpn IPsec peer.
Oct 3 2022, 11:39 AM · VyOS 1.4 Sagitta
insertjokehere created T4724: Support for configuring Telegraf "exec" input plugin.
Oct 3 2022, 8:11 AM · VyOS 1.5 Circinus

Oct 1 2022

narey83 created T4723: Error when issuing 'show flow-accounting interface pppoe0'.
Oct 1 2022, 6:25 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project
aohanian added a comment to T3655: NAT Problem with VRF.

Is there a way to isolate a NAT rule to operate within a VRF?

Oct 1 2022, 2:31 PM · VyOS 1.5 Circinus, Known issue, VyOS 1.4 Sagitta
dmbaturin created T4722: Improve abbreviation/acronym consistency.
Oct 1 2022, 9:57 AM · VyOS 1.4 Sagitta

Sep 30 2022

Viacheslav edited projects for T4721: Static IPv6 Route Tags Missing, added: VyOS 1.3 Equuleus (1.3.3); removed VyOS 1.3 Equuleus.
Sep 30 2022, 11:37 AM · VyOS 1.3 Equuleus (1.3.6)
Viacheslav changed the subtype of T4721: Static IPv6 Route Tags Missing from "Bug" to "Feature Request".
Sep 30 2022, 11:37 AM · VyOS 1.3 Equuleus (1.3.6)
RyVolodya added a comment to T4718: Listen-address is not commit if the ip address is on the interface with vrf.

If you document this check then everything commits.
https://github.com/vyos/vyos-1x/blob/f5a50135f07ac4ec8ed431a757b9c56e607d2132/src/conf_mode/dhcp_server.py#L265-L271

Sep 30 2022, 7:43 AM · VyOS 1.4 Sagitta (1.4.0-epa3), VyOS 1.5 Circinus
trae32566 created T4721: Static IPv6 Route Tags Missing.
Sep 30 2022, 3:34 AM · VyOS 1.3 Equuleus (1.3.6)
icyfire0573 added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

I installed the latest release and its not working for me. Whenever I boot I lose eth0 and eth2 interfaces.
I end up with an eth1 (previously eth2) interface and startup errors that seem to indicate that migrate failed.
I would reconfigure everything to help test this, but I do need two network interfaces.

Sep 30 2022, 12:41 AM · VyOS 1.4 Sagitta

Sep 29 2022

Viacheslav closed T4715: Auto logout user after a period of inactivity, a subtask of T4712: Collaborative Protection Profile cPP for Network Devices root task, as Resolved.
Sep 29 2022, 5:00 PM · VyOS 1.5 Circinus
Viacheslav closed T4715: Auto logout user after a period of inactivity as Resolved.
Sep 29 2022, 5:00 PM · VyOS 1.4 Sagitta
florin added a comment to T4466: intel i225-v nic does not detect link after boot.

@pasik you can build your own image: https://github.com/vyos/vyos-build/compare/equuleus...fvlaicu:vyos-build:equuleus-1.3.2

Sep 29 2022, 3:45 PM · VyOS 1.3 Equuleus
pasik added a comment to T4466: intel i225-v nic does not detect link after boot.

It'd be nice to get a newer igc driver version in 1.3 branch though, as there are now multiple good 2.5 GbE based platforms out there..

Sep 29 2022, 3:32 PM · VyOS 1.3 Equuleus
pasik added a comment to T4466: intel i225-v nic does not detect link after boot.

Yes, and no updates for the driver in 1.3.2. Ok, thanks!

Sep 29 2022, 3:03 PM · VyOS 1.3 Equuleus
florin added a comment to T4466: intel i225-v nic does not detect link after boot.

@pasik the problem is with the igc driver in the 5.4 kernel, not with vyos.

Sep 29 2022, 1:11 PM · VyOS 1.3 Equuleus
narey83 added a comment to T3626: Configuring and disabling DHCP Server.

Sorted out the WARNING: terminal is not fully functional message with adding the following export command: -

Sep 29 2022, 12:58 PM · VyOS 1.3 Equuleus (1.3.0-epa3), VyOS 1.2 Crux (VyOS 1.2.9), VyOS 1.4 Sagitta
narey83 added a comment to T3626: Configuring and disabling DHCP Server.

Yeah, that new nightly release has fixed the issue, thanks. Strangely now getting some weird message in my show commands (WARNING: terminal is not fully functional). This message wasn't there on the previous nightly.

Sep 29 2022, 12:46 PM · VyOS 1.3 Equuleus (1.3.0-epa3), VyOS 1.2 Crux (VyOS 1.2.9), VyOS 1.4 Sagitta
pasik added a comment to T4466: intel i225-v nic does not detect link after boot.

So hmm, is it still the same issue in stock vyos 1.3.2 with i225 nics?

Sep 29 2022, 11:40 AM · VyOS 1.3 Equuleus
Viacheslav closed T4697: policy route: Generating ConfigError failes when tcp flag is missing on set tcp-mss rule commit as Resolved.
Sep 29 2022, 10:40 AM · VyOS 1.4 Sagitta
Viacheslav added a comment to T4708: 'show nat destination rules' throwing an error.

@narey83 Could you re-check it with the latest rolling (start since vyos-1.4-rolling-202209290218-amd64.iso)?

Sep 29 2022, 10:21 AM · VyOS 1.4 Sagitta
Viacheslav added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

@icyfire0573 Could you re-check it?
Should be fixed in vyos-1.4-rolling-202209290218-amd64.iso

Sep 29 2022, 10:17 AM · VyOS 1.4 Sagitta
Viacheslav updated subscribers of T2196: Dynamic ipv4 interface list hairpin.
Sep 29 2022, 10:02 AM · VyOS 1.3 Equuleus (1.3.7), VyOS 1.4 Sagitta
Viacheslav added a comment to T4710: show openvpn server occasionally returns IndexError: list index out of range.

I can't reproduce it, VyOS 1.4-rolling-202209290218
Config:

vyos@r14:~$ show conf com | match openv
set interfaces openvpn vtun10 hash 'sha1'
set interfaces openvpn vtun10 keep-alive failure-count '60'
set interfaces openvpn vtun10 keep-alive interval '10'
set interfaces openvpn vtun10 local-host '203.0.113.1'
set interfaces openvpn vtun10 local-port '1194'
set interfaces openvpn vtun10 mode 'server'
set interfaces openvpn vtun10 openvpn-option '--data-ciphers-fallback BF-CBC'
set interfaces openvpn vtun10 openvpn-option '--data-ciphers AES-128-CBC:AES-128-GCM:AES-256-CBC:AES-256-GCM:BF-CBC'
set interfaces openvpn vtun10 openvpn-option '--comp-lzo yes'
set interfaces openvpn vtun10 openvpn-option '--allow-compression yes'
set interfaces openvpn vtun10 openvpn-option '--push redirect-gateway def1'
set interfaces openvpn vtun10 openvpn-option '--push remote-gateway 10.9.1.1'
set interfaces openvpn vtun10 openvpn-option '--push dhcp-option DNS 8.8.8.8'
set interfaces openvpn vtun10 protocol 'udp'
set interfaces openvpn vtun10 server client-ip-pool start '10.9.1.10'
set interfaces openvpn vtun10 server client-ip-pool stop '10.9.1.99'
set interfaces openvpn vtun10 server domain-name 'vtr.example.com'
set interfaces openvpn vtun10 server max-connections '1000'
set interfaces openvpn vtun10 server name-server '10.8.0.1'
set interfaces openvpn vtun10 server subnet '10.9.1.0/24'
set interfaces openvpn vtun10 server topology 'net30'
set interfaces openvpn vtun10 tls ca-certificate 'ca'
set interfaces openvpn vtun10 tls certificate 'cert'
set interfaces openvpn vtun10 tls dh-params 'dh'
set interfaces openvpn vtun10 use-lzo-compression
vyos@r14:~$

Op-mode

vyos@r14:~$ show openvpn server
Sep 29 2022, 9:54 AM · VyOS 1.4 Sagitta
rherold added a comment to T3509: No BCP38 for IPv6 on VyOS.

After digging a step deeper we could also move the function into:

Sep 29 2022, 7:41 AM · VyOS 1.4 Sagitta
rherold added a comment to T3509: No BCP38 for IPv6 on VyOS.

Stumbled again about it and would ask if it is not possible to switch to the iptables extension so that rp filter will also work for IPv6.
From my point of view we must create in firewall setup a new chain RPFILTER in IPv4 and IPv6.

Sep 29 2022, 7:32 AM · VyOS 1.4 Sagitta

Sep 28 2022

c-po closed T4719: iOS Profile has a bug when generating IKEv2 config that doesn't allow to connect as Resolved.
Sep 28 2022, 5:34 PM
Viacheslav created T4720: Ability to configure SSH HostKeyAlgorithms.
Sep 28 2022, 5:26 PM · VyOS 1.4 Sagitta
aalmenar renamed T4719: iOS Profile has a bug when generating IKEv2 config that doesn't allow to connect from iOS Profile has a bug when generating IKEv2 config to iOS Profile has a bug when generating IKEv2 config that doesn't allow to connect.
Sep 28 2022, 5:24 PM
aalmenar updated the task description for T4719: iOS Profile has a bug when generating IKEv2 config that doesn't allow to connect.
Sep 28 2022, 5:22 PM
aalmenar created T4719: iOS Profile has a bug when generating IKEv2 config that doesn't allow to connect.
Sep 28 2022, 5:20 PM
Viacheslav added a comment to T4557: fastnetmon: allow configure limits per protocol (tcp, udp, icmp).

PR https://github.com/vyos/vyos-1x/pull/1565

Sep 28 2022, 3:09 PM · VyOS 1.4 Sagitta
Viacheslav added a comment to T4718: Listen-address is not commit if the ip address is on the interface with vrf.

Maybe something wrong with this check https://github.com/vyos/vyos-1x/blob/f5a50135f07ac4ec8ed431a757b9c56e607d2132/src/conf_mode/dhcp_server.py#L265-L271

Sep 28 2022, 2:21 PM · VyOS 1.4 Sagitta (1.4.0-epa3), VyOS 1.5 Circinus
RyVolodya created T4718: Listen-address is not commit if the ip address is on the interface with vrf.
Sep 28 2022, 12:41 PM · VyOS 1.4 Sagitta (1.4.0-epa3), VyOS 1.5 Circinus
syncer changed the status of T4712: Collaborative Protection Profile cPP for Network Devices root task from Open to In progress.
Sep 28 2022, 11:57 AM · VyOS 1.5 Circinus
sarthurdev changed the status of T4713: vyos@vyos:~$ show nat destination rules | doesn't work from Confirmed to Needs testing.

PR: https://github.com/vyos/vyos-1x/pull/1564

Sep 28 2022, 11:13 AM · VyOS 1.4 Sagitta
Viacheslav added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

Maybe incorrect parsing of port ranges (comma-separated)

rule 120 {
    description "Playstation - 172.16.136.96"
    destination {
        port 1935,3074,3478,3479,3480
    }
Sep 28 2022, 10:54 AM · VyOS 1.4 Sagitta
sarthurdev changed the status of T4713: vyos@vyos:~$ show nat destination rules | doesn't work from Open to Confirmed.
Sep 28 2022, 9:57 AM · VyOS 1.4 Sagitta
insertjokehere added a comment to T4717: Connect to console server by name.

PRs open to implement this:

Sep 28 2022, 4:38 AM · VyOS 1.4 Sagitta
insertjokehere changed the status of T4717: Connect to console server by name from Open to In progress.
Sep 28 2022, 1:20 AM · VyOS 1.4 Sagitta
insertjokehere created T4717: Connect to console server by name.
Sep 28 2022, 1:20 AM · VyOS 1.4 Sagitta

Sep 27 2022

icyfire0573 added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

vyos@vyos:~$ show configuration
firewall {

interface eth2 {
    in {
        name OUTSIDE-IN
    }
    local {
        name OUTSIDE-LOCAL
    }
}
name OUTSIDE-IN {
    default-action drop
    rule 10 {
        action accept
        state {
            established enable
            related enable
        }
    }
    rule 20 {
        action accept
        destination {
            address 172.16.135.35
            port 8123
        }
        protocol tcp
        source {
        }
        state {
            new enable
        }
    }
    rule 21 {
        action accept
        destination {
            address 172.16.135.35
            port 443
        }
        protocol tcp
        state {
            new enable
        }
    }
    rule 30 {
        action accept
        destination {
            address 172.16.136.16
            port 22
        }
        protocol tcp
        source {
            address 13.90.97.251
        }
        state {
            new enable
        }
    }
    rule 40 {
        action accept
        destination {
            address 172.16.136.96
            port 1935,3478,3479,3480
        }
        protocol tcp
        state {
            new enable
        }
    }
    rule 41 {
        action accept
        destination {
            address 172.16.136.96
            port 3074,3478,3479
        }
        protocol udp
        state {
            new enable
        }
    }
}
name OUTSIDE-LOCAL {
    default-action drop
    rule 10 {
        action accept
        state {
            established enable
            related enable
        }
    }
    rule 20 {
        action accept
        icmp {
            type-name echo-request
        }
        protocol icmp
        state {
            new enable
        }
    }
    rule 30 {
        action drop
        destination {
            port 22
        }
        protocol tcp
        recent {
            count 4
            time minute
        }
        state {
            new enable
        }
    }
    rule 31 {
        action accept
        destination {
            port 22
        }
        protocol tcp
        state {
            new enable
        }
    }
    rule 40 {
        action accept
        destination {
            address 172.16.136.35
            port 8123
        }
        protocol tcp
        state {
            new enable
        }
    }
}

}
interfaces {

ethernet eth0 {
    address 172.16.136.1/24
    description INSIDE
    hw-id 6c:4b:90:52:32:75
}
ethernet eth2 {
    address dhcp
    description OUTSIDE
    hw-id 7c:c2:c6:42:43:e1
}
loopback lo {
}
wireless wlan0 {
    hw-id 50:5b:c2:ca:e1:03
    physical-device phy0
}

}
nat {

destination {
    rule 10 {
        description "Port Forward: SSH to 172.16.136.16"
        destination {
            port 22
        }
        inbound-interface eth2
        protocol tcp
        source {
            address 13.90.97.251
        }
        translation {
            address 172.16.136.16
        }
    }
    rule 100 {
        description "HomeAssistant WAN"
        destination {
            port 8123
        }
        inbound-interface eth2
        protocol tcp
        translation {
            address 172.16.136.35
        }
    }
    rule 110 {
        description "HomeAssistant Reflection To"
        destination {
            port 8123
        }
        inbound-interface eth0
        protocol tcp
        translation {
            address 172.16.136.35
        }
    }
    rule 120 {
        description "Playstation - 172.16.136.96"
        destination {
            port 1935,3074,3478,3479,3480
        }
        inbound-interface eth2
        protocol tcp
        translation {
            address 172.16.136.96
        }
    }
}
source {
    rule 100 {
        outbound-interface eth2
        source {
            address 172.16.136.0/24
        }
        translation {
            address masquerade
        }
    }
    rule 110 {
        description "HomeAssistant Reflection From"
        destination {
            address 172.16.136.0/24
        }
        outbound-interface eth0
        protocol tcp
        source {
            address 172.16.136.0/24
        }
        translation {
            address masquerade
        }
    }
}

}
service {

dhcp-server {
    shared-network-name LAN {
        domain-search drutherford.com
        subnet 172.16.136.0/24 {
            default-router 172.16.136.1
            domain-name drutherford.com
            lease 86400
            name-server 8.8.8.8
            name-server 1.1.1.1
            name-server 9.9.9.9
            range 0 {
                start 172.16.136.50
                stop 172.16.136.90
            }
            static-mapping Backyard-Camera-Wireless {
                ip-address 172.16.136.101
                mac-address 78:66:9D:7F:D7:73
            }
            static-mapping Garage-Camera-Wireless {
                ip-address 172.16.136.99
                mac-address 5C:C3:36:4C:D3:20
            }
            static-mapping Green {
                ip-address 172.16.136.16
                mac-address DC:A6:32:6D:20:54
            }
            static-mapping HomeAssistant {
                ip-address 172.16.136.35
                mac-address B8:27:EB:81:ED:01
            }
            static-mapping Playstation4 {
                ip-address 172.16.136.96
                mac-address 00:D9:D1:FD:E3:C8
            }
            static-mapping Pool-Camera-Wireless {
                ip-address 172.16.136.100
                mac-address 78:66:9D:5B:F8:9C
            }
            static-mapping RasPBX {
                ip-address 172.16.136.102
                mac-address B8:27:EB:BA:9C:BD
            }
            static-mapping Roku-3 {
                ip-address 172.16.136.98
                mac-address B8:3E:59:B3:DF:DB
            }
            static-mapping Roku-Ultra {
                ip-address 172.16.136.97
                mac-address 88:DE:A9:C1:C0:41
            }
            static-mapping client1 {
                ip-address 172.16.136.102
                mac-address B8:27:EB:BA:9C:BD
            }
        }
    }
}
ssh {
    port 22
}

}
system {

config-management {
    commit-revisions 100
}
conntrack {
    modules {
        ftp
        h323
        nfs
        pptp
        sip
        sqlnet
        tftp
    }
}
console {
    device ttyS0 {
        speed 115200
    }
}
host-name vyos
login {
    user vyos {
        authentication {
            encrypted-password ****************
        }
    }
}
ntp {
    server time1.vyos.net {
    }
    server time2.vyos.net {
    }
    server time3.vyos.net {
    }
}
syslog {
    global {
        facility all {
            level info
        }
        facility protocols {
            level debug
        }
    }
}

}

Sep 27 2022, 10:46 PM · VyOS 1.4 Sagitta
sarthurdev added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

Can we see example destination NAT config with the issue?

Sep 27 2022, 8:56 PM · VyOS 1.4 Sagitta
icyfire0573 added a comment to T4713: vyos@vyos:~$ show nat destination rules | doesn't work.

still no good
vyos@vyos:~$ show nat destination rules
Traceback (most recent call last):

File "/usr/libexec/vyos/op_mode/nat.py", line 302, in <module>
  res = vyos.opmode.run(sys.modules[__name__])
File "/usr/lib/python3/dist-packages/vyos/opmode.py", line 147, in run
  res = func(**args)
File "/usr/libexec/vyos/op_mode/nat.py", line 280, in show_rules
  return _get_formatted_output_rules(nat_rules, direction, family)
File "/usr/libexec/vyos/op_mode/nat.py", line 112, in _get_formatted_output_rules
  if 'prefix' in match['right'] or 'set' in match['right']:

TypeError: argument of type 'int' is not iterable
vyos@vyos:~$ show version
Version: VyOS 1.4-rolling-202209260217
Release train: sagitta

Sep 27 2022, 8:52 PM · VyOS 1.4 Sagitta
v.huti added a comment to T4180: Support for QoS Policy Propagation via BGP (QPPB).


DEMO Notes:
=====================

1) You need to load the XDP program before starting frr so that
   it can find the LPM map on plugin initialization.
   To keep it simple, the VTY interface was not implemented for now.
   XDP side is accessible via `bpftool`
3) I`m monitoring packets for TOS/DSCP changes to see if marking happens
   But in another approach tag is associated with the packet and then
   read by the TC classifier
4) These are two traffic shaping examples.
   The point is that you have two options for marking:
4.1) Modifying the TOS byte and installing the u32 tc filter to match the value.
   This has a limited range of possible values (8 bits) + needs to modify the packet.
4.2) Using a custom BPF classifier.
    The XDP side extends the packet context and saves the value.
    Afterward, the classifier may read the context and control the shaping behavior
    by setting the `skb->tc_classid` or one of the fields mentioned below.
Therefore, BPF programs attached to the tc BPF hook can, for instance,
read or write the skb’s mark, pkt_type, protocol, priority, queue_mapping,
napi_id, cb[] array, hash, tc_classid or tc_index, vlan metadata, the XDP
transferred custom metadata and various other information. All members of
the struct __sk_buff BPF context used in tc BPF are defined in the
linux/bpf.h system header.

https://docs.cilium.io/en/stable/bpf/#tc-traffic-control
Sep 27 2022, 8:05 PM · VyOS 1.5 Circinus