@@ -285,14 +285,32 @@ Global Peer Configuration Commands
285285 after configuring and after boot. In this mode the connection will
286286 not be restarted in case of disconnection, therefore should be used
287287 only together with DPD or another session tracking methods.
288- * **respond ** - does not try to initiate a connection to a remote
289- peer. In this mode, the IPsec session will be established only
290- after initiation from a remote peer. Could be useful when there
291- is no direct connectivity to the peer due to firewall or NAT in
292- the middle of the local and remote side.
288+
289+ * **trap ** - does not try to initiate a connection to a remote
290+ peer immediately. Instead, it installs a trap policy that will
291+ trigger IKE negotiation and establish the IPsec session when
292+ matching traffic is sent from the local side. This can be useful
293+ when there is no direct connectivity to the peer due to firewall
294+ or NAT in the middle of the local and remote side.
295+
296+ .. warning :: The ``trap`` mode is not needed in most environments
297+ and can lead to connection confusion or unintended tunnel uptime
298+ behavior if used incorrectly. Using this mode requires careful
299+ coordination with parameters such as ``close-action `` and DPD.
300+ For most deployments, use ``initiate `` and ``none `` as described below.
301+
293302 * **none ** - loads the connection only, which then can be manually
294303 initiated or used as a responder configuration.
295304
305+ .. note :: For most site-to-site VPNs, configure one peer
306+ with ``connection-type initiate `` (active side) and the other peer
307+ with ``connection-type none `` (passive side) to
308+ ensure stable and predictable tunnel behavior.
309+ When using ``connection-type initiate ``, you must also configure
310+ DPD or another session tracking method (such as ``close-action ``)
311+ to automatically re-establish the tunnel after a disconnection.
312+ Otherwise, the tunnel will not reconnect automatically if it goes down.
313+
296314.. cfgcmd :: set vpn ipsec site-to-site peer <name> default-esp-group <name>
297315
298316 Name of ESP group to use by default for traffic encryption.
@@ -566,7 +584,7 @@ Policy-Based VPN Example
566584 set vpn ipsec site-to-site peer PEER1 authentication local-id '10.0.2.2'
567585 set vpn ipsec site-to-site peer PEER1 authentication mode 'pre-shared-secret'
568586 set vpn ipsec site-to-site peer PEER1 authentication remote-id '10.0.1.2'
569- set vpn ipsec site-to-site peer PEER1 connection-type 'respond '
587+ set vpn ipsec site-to-site peer PEER1 connection-type 'none '
570588 set vpn ipsec site-to-site peer PEER1 default-esp-group 'ESP-GRPOUP'
571589 set vpn ipsec site-to-site peer PEER1 ike-group 'IKE-GROUP'
572590 set vpn ipsec site-to-site peer PEER1 local-address '10.0.2.2'
@@ -696,7 +714,7 @@ Route-Based VPN Example
696714 set vpn ipsec site-to-site peer PEER1 authentication local-id '10.0.2.2'
697715 set vpn ipsec site-to-site peer PEER1 authentication mode 'pre-shared-secret'
698716 set vpn ipsec site-to-site peer PEER1 authentication remote-id '10.0.1.2'
699- set vpn ipsec site-to-site peer PEER1 connection-type 'respond '
717+ set vpn ipsec site-to-site peer PEER1 connection-type 'none '
700718 set vpn ipsec site-to-site peer PEER1 default-esp-group 'ESP-GRPOUP'
701719 set vpn ipsec site-to-site peer PEER1 ike-group 'IKE-GROUP'
702720 set vpn ipsec site-to-site peer PEER1 local-address '10.0.2.2'
0 commit comments