OpenZen Packages

node-networks

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

OpenSource

cloud-tunnels

© Copyright 2024 All rights reserved.

OpenZen Packages

node-networks

node-networks

Handles the networks config object and configures corresponding UCI sections in /etc/config/dhcp and /etc/config/network.

{
	"1": {
		"type": "bridge",
		"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
		"uplink_prio": 3,
		"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
		"internal": true,
		"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
		"l3_access": {
			"dhcp": true
		},
		"ports": [
			{
				"# num": "all available ethernet ports are numbered, starting at 1",
				"num": 1
			},
			{
				"num": 1,
				"vlan": 12
			},
			{
				"num": 2
			},
			{
				"num": 2,
				"vlan": 10
			}
		]
	},

	"2": {
		"type": "wwan",
		"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
		"uplink_prio": 4,
		"wwan": {
			"pin": 1111,
			"apn": "apn.provider.net"
		}
	},

	"3": {
		"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
		"type": "wireguard",
		"private_key": "..",
		"port": 3233,
		"mtu": 1280,
		"uplink_network_id": 2,
		"peers": [
			{
				"public_key": "..",
				"route_allowed_ips": true,
				"allowed_ips": ["100.64.2.38"],
				"persistent_keepalive": true,
				"endpoint_host": "wireguard-gateway.com",
				"endpoint_port": 10
			}
		]
	},

	"4": {
		"type": "bridge",
		"internal": false,
		"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
		"isolate": true,
		"stp": false,
		"l3_access": {
			"ipv4_addr": [
				"100.65.0.1/16"
			]
		},
		"dhcp_server": {
			"lease_minutes": 600,
			"start": 2,
			"limit": 65533
		},
		"gateway": {
			"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
			"guest_safe_rules": false,
			"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
			"block_internal_dst": false,
			"uplinks": [
				{
					"prio": 1,
					"network_id": 3
				},
				{
					"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
					"prio": 2,
					"network_id": 1
				}
			]
		},
		"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
		"ports": [
			{
				"num"

OpenSource

cloud-tunnels

© Copyright 2024 All rights reserved.