Quick search…
Router Firmware Services
OpenZen Packages
node-networks
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"
OpenZen Packages
node-networks
node-networks
Handles the networks
config object and configures corresponding UCI sections in /etc/config/dhcp
and /etc/config/network
.
{
"1": {
"type": "bridge",
"# uplink_prio": "this network should be used to access internet. used a metric for routes.",
"uplink_prio": 3,
"# internal": "nodes can use this network to communicate. they also broadcast their presence on UDP/1337.",
"internal": true,
"# l3_access": "use DHCP for addressing. without this option, a bridge is only for forwarding layer 2 traffic.",
"l3_access": {
"dhcp": true
},
"ports": [
{
"# num": "all available ethernet ports are numbered, starting at 1",
"num": 1
},
{
"num": 1,
"vlan": 12
},
{
"num": 2
},
{
"num": 2,
"vlan": 10
}
]
},
"2": {
"type": "wwan",
"# uplink_prio": "this network will be used for internet access if there is no route from network 1",
"uplink_prio": 4,
"wwan": {
"pin": 1111,
"apn": "apn.provider.net"
}
},
"3": {
"# type wireguard": "manually configure a wireguard interface. the configuration backend needs to generate this configuration per router. a more practical approach is using a wireguard dispenser - more on that in the future.",
"type": "wireguard",
"private_key": "..",
"port": 3233,
"mtu": 1280,
"uplink_network_id": 2,
"peers": [
{
"public_key": "..",
"route_allowed_ips": true,
"allowed_ips": ["100.64.2.38"],
"persistent_keepalive": true,
"endpoint_host": "wireguard-gateway.com",
"endpoint_port": 10
}
]
},
"4": {
"type": "bridge",
"internal": false,
"# isolate": "prevent clients from talking to each other through the device (doesn't automatically propagate to wifi).",
"isolate": true,
"stp": false,
"l3_access": {
"ipv4_addr": [
"100.65.0.1/16"
]
},
"dhcp_server": {
"lease_minutes": 600,
"start": 2,
"limit": 65533
},
"gateway": {
"# guest_safe_rules": "block a few ports, like unencrypted email sending, netbios, etc.",
"guest_safe_rules": false,
"# block_internal_dst": "dont forward packets to destinations on private networks. they would otherwise be forwarded to the gateway of the uplink networks.",
"block_internal_dst": false,
"uplinks": [
{
"prio": 1,
"network_id": 3
},
{
"# uplink prio": "in this example, it is more important to maintain connectivity. connect users on this network through the gateway on the LAN if the VPN isn't up.",
"prio": 2,
"network_id": 1
}
]
},
"# ports": "this network is intended to be used for wireless but there no reason against serving the network on an ethernet port as well.",
"ports": [
{
"num"