Skip to content

Commit a8544e3

Browse files
authored
Update Shelby Permissioned Connection.md (#138)
cleanup of environment section
1 parent 1d867cd commit a8544e3

1 file changed

Lines changed: 5 additions & 34 deletions

File tree

docs/Shelby Permissioned Connection.md

Lines changed: 5 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -23,43 +23,14 @@ Please follow the [setup](setup.md) instructions before proceeding.
2323

2424
The last step in setup was to disconnect from the network. This is to ensure that only one tunnel is open on your machine to DoubleZero, and that tunnel is on the correct network.
2525

26-
To configure the DoubleZero Client CLI (`doublezero`) and daemon (`doublezerod`) to connect to **DoubleZero testnet**:
26+
To configure the DoubleZero Client CLI (`doublezero`) to connect to the Shelby tenant on DoubleZero :
2727
```bash
28-
DESIRED_DOUBLEZERO_ENV=testnet \
29-
DESIRED_TENANT=shelby \
30-
&& doublezero config set --env $DESIRED_DOUBLEZERO_ENV --tenant $DESIRED_TENANT > /dev/null \
31-
&& echo "✅ doublezerod configured for environment $DESIRED_DOUBLEZERO_ENV and tenant $DESIRED_TENANT"
28+
doublezero config set --tenant shelby
3229
```
33-
You should see the following output:
34-
`
35-
✅ doublezerod configured for environment testnet
36-
`
3730

38-
After about 30 seconds you will see the DoubleZero devices available:
31+
Apply additional Firewall rules specific to Shelby:
3932

40-
```bash
41-
doublezero latency
42-
```
43-
Example output (Testnet)
44-
```bash
45-
pubkey | code | ip | min | max | avg | reachable
46-
2hPMFJHh5BPX42ygBvuYYJfCv9q7g3rRR3ZRsUgtaqUi | dz-ny7-sw01 | 137.239.213.162 | 1.74ms | 1.92ms | 1.84ms | true
47-
ETdwWpdQ7fXDHH5ea8feMmWxnZZvSKi4xDvuEGcpEvq3 | dz-ny5-sw01 | 137.239.213.170 | 1.88ms | 4.39ms | 2.72ms | true
48-
8J691gPwzy9FzUZQ4SmC6jJcY7By8kZXfbJwRfQ8ns31 | nyc002-dz002 | 38.122.35.137 | 2.45ms | 3.30ms | 2.74ms | true
49-
8gisbwJnNhMNEWz587cAJMtSSFuWeNFtiufPuBTVqF2Z | dz-ny7-sw02 | 142.215.184.122 | 1.88ms | 5.13ms | 3.02ms | true
50-
uzyg9iYw2FEbtdTHaDb5HoeEWYAPRPQgvsgyd873qPS | nyc001-dz002 | 4.42.212.122 | 3.17ms | 3.63ms | 3.33ms | true
51-
FEML4XsDPN3WfmyFAXzE2xzyYqSB9kFCRrMik8JqN6kT | nyc001-dz001 | 38.104.167.29 | 2.33ms | 5.46ms | 3.39ms | true
52-
9oKLaL6Hwno5TyAFutTbbkNrzxm1fw9fhzkiUHgsxgGx | dz-dc10-sw01 | 137.239.200.186 | 6.84ms | 7.01ms | 6.91ms | true
53-
DESzDP8GkSTpQLkrUegLkt4S2ynGfZX5bTDzZf3sEE58 | was001-dz002 | 38.88.214.133 | 7.39ms | 7.44ms | 7.41ms | true
54-
HHNCpqB7CwHVLxAiB1S86ko6gJRzLCtw78K1tc7ZpT5P | was001-dz001 | 66.198.11.74 | 7.67ms | 7.85ms | 7.76ms | true
55-
9LFtjDzohKvCBzSquQD4YtL3HwuvkKBDE7KSzb8ztV2b | dz-mtl11-sw01 | 134.195.161.10 | 9.88ms | 10.01ms | 9.95ms | true
56-
9M7FfYYyjM4wGinKPofZRNmQFcCjCKRbXscGBUiXvXnG | dz-tor1-sw01 | 209.42.165.10 | 14.52ms | 14.53ms | 14.52ms | true
57-
```
58-
</details>
59-
60-
Set up Firewall
61-
62-
IP tables:
33+
iptables:
6334
```
6435
sudo iptables -A INPUT -i doublezero0 -p tcp --dport 39431 -j ACCEPT
6536
sudo iptables -A INPUT -p tcp --dport 39431 -j DROP
@@ -130,4 +101,4 @@ default via 149.28.38.1 dev enp1s0 proto dhcp src 149.28.38.64 metric 100
130101
```
131102

132103

133-
</div>
104+
</div>

0 commit comments

Comments
 (0)