All Pages > howto > Routing daemons and dn42 > EdgeOS > Example config for EdgeOS
EdgeRouter Lite DN42 config example
This is the config I (Felicitus) am running on an Ubiquiti EdgeRouter Lite (AS76197).
Features
- dn42 DNS
- "classic" OpenVPN P2P (including the common "comp-lzo" option)
- BGP
- Some traffic-shaping rules for my very slow 3mbit DSL uplink
- 2 internal: One DN42 network (172.22.117.128/25 for me and my servers as well as a NAT 192.168.42.10/24 for my parents, so that they're save from dn42 - that network is NOT announced to dn42).
- Firewall to protect my NAS server and monitoring
Upcoming
- AICCU integration (SIXXS), probably not possible with the config, so
apt-get install aiccu
should do the trick - dn42 IPv6 routing (probably)
Ask me if you want to know if I have implemented those items already.
Configuration
firewall {
enable
disable
4096
4096
32768
enable
ROUTER_V6 {
drop
1 {
drop
destination {
22
}
tcp
}
}
WAN_IN_V6 {
drop
3 {
drop
destination {
22
}
tcp
}
}
disable
disable
disable
enable
DN42 {
drop
100 {
drop
destination {
}
source {
!
}
}
101 {
drop
destination {
}
source {
!
}
}
102 {
drop
destination {
}
source {
!
}
}
}
ROUTER_V4 {
accept
2 {
accept
icmp
}
10 {
drop
destination {
22
}
tcp
}
}
WAN_IN_V4 {
drop
1 {
accept
"allow established connections"
all
state {
enable
enable
}
}
2 {
drop
state {
enable
}
}
3 {
drop
destination {
22
}
tcp
}
}
disable
enable
disable
enable
}
interfaces {
eth0 {
auto
firewall {
in {
WAN_IN_V4
}
}
0 {
auto
firewall {
local {
ROUTER_V6
ROUTER_V4
}
}
1492
auto
12345678
{
}
some-t-online-crap@t-online.de
}
auto
}
eth1 {
auto
auto
{
}
}
eth2 {
auto
auto
}
lo {
}
vtun0 {
{
}
33121
site-to-site
--comp-lzo
udp
33121
/config/auth/felihome.key
}
}
policy {
vpn-in {
10 {
permit
22
28
}
}
}
protocols {
76197 {
{
feli-server
dn42
64717
}
{
}
dn42 {
{
inbound
}
}
}
}
service {
{
false
{
true
}
int {
disable
{
feli-home.felicitus.org
86400
start {
stop
}
monitoring {
52:54:00:20:df:46
}
nas {
e8:39:35:ee:22:7b
}
}
}
nat {
disable
{
86400
start {
stop
}
}
}
}
dns {
forwarding {
150
eth1
eth2
server=/dn42/
server=/22.172.in-addr.arpa/172.23.0.53
server=/23.172.in-addr.arpa/172.23.0.53
rebind-domain-ok=/dn42/
}
}
nat {
6000 {
pppoe0
masquerade
}
7000 {
eth2
masquerade
}
}
ssh {
22
v2
}
upnp {
eth1 {
pppoe0
}
eth2 {
pppoe0
}
}
}
system {
ubnt
login {
felicitus {
authentication {
errnope
""
felicitus@felicitus.org {
AAAAB3NzaC1yc2EAAAADAQABAAABAQDPTSLjSY/Be1XJ/klAwLiM1pKSvmbdcOgtgDB6nPcHkgX6JZu7g/Kejfuk4qIKL8GYYUQt7DlGY6n2u5rChWE/6KZJzXcUwS3pXk4LZ5KydWp7ihfvyRtUOBgKkRa1zQv+6KCH9WyR++ArwVTP8KSkrmDe6k7NWAjZqOuIJHG/AbEyTBapTJYjObZ0AM7wlwcB+oRM1BfZCP0Y+PIP2eGJS7Pyb32pITNKk3JuFXgAvbj5OeRrwtpZ9S+/7wIpaUVODPzrVmbC7vOXu/2KJ9aY2BmxUsxRbrvWMmWNiuE0YPt/7lUroK4pH3md3lWRcGUS/uYvhug7yG1yB81nyI15
ssh-rsa
}
}
admin
}
}
ntp {
0.ubnt.pool.ntp.org {
}
1.ubnt.pool.ntp.org {
}
2.ubnt.pool.ntp.org {
}
3.ubnt.pool.ntp.org {
}
}
syslog {
global {
all {
notice
}
protocols {
debug
}
}
}
UTC
}
{
client-up-s {
30kbit
20 {
100%
6k
TCPACK {
ip {
tcp
}
225
}
5
65
fair-queue
}
30 {
5%
15k
20%
ssh {
ip {
destination {
22
}
lowdelay
tcp
}
}
ssh-ipv6 {
ipv6 {
destination {
22
}
tcp
}
}
6
10
fair-queue
}
default {
95%
15k
100%
2
13
fair-queue
}
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:dhcp-relay@1:dhcp-server@4:firewall@4:ipsec@3:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.3.0.4605130.131011.1754 */