1
0
nixfiles/hosts/carbon/configuration.nix

79 lines
1.6 KiB
Nix
Raw Permalink Normal View History

2020-12-16 12:30:38 +01:00
{ config, pkgs, lib, ... }:
2020-12-06 16:40:47 +01:00
{
imports =
[
./hardware-configuration.nix
2020-12-07 15:14:33 +01:00
../../configuration/router
2024-07-14 00:06:41 +02:00
./dns.nix
./net-dsl.nix
./net-gastnetz.nix
./net-heimnetz.nix
2024-08-08 20:02:57 +02:00
./net-iot.nix
./net-lte.nix
2024-08-20 15:38:43 +02:00
./net-mgmt.nix
./net-voip.nix
./ntp.nix
2024-07-14 00:06:41 +02:00
./ppp.nix
2024-08-13 16:13:22 +02:00
./wg-clerie.nix
2020-12-06 16:40:47 +01:00
];
boot.kernelParams = [ "console=ttyS0,115200n8" ];
boot.loader.grub.enable = true;
boot.loader.grub.device = "/dev/sda";
boot.loader.grub.extraConfig = "
serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1
terminal_input serial
terminal_output serial
";
networking.useDHCP = false;
2020-12-17 10:41:11 +01:00
networking.nat = {
enableIPv6 = true;
enable = true;
2024-07-14 00:06:41 +02:00
externalInterface = "ppp-dtagdsl";
internalIPv6s = [ "fd00:152:152::/48" "fd00:3214:9453:4920::/64"];
internalIPs = [ "10.152.0.0/16" "192.168.32.0/24" ];
2020-12-17 10:41:11 +01:00
};
2022-01-02 00:30:05 +01:00
services.radvd.enable = true;
2022-01-22 14:13:57 +01:00
services.kea.dhcp4 = {
enable = true;
settings = {
interfaces-config = {
service-sockets-max-retries = 15;
service-sockets-retry-wait-time = 2000;
2022-02-12 15:22:57 +01:00
};
lease-database = {
name = "/var/lib/kea/dhcp4.leases";
persist = true;
type = "memfile";
2022-01-22 14:13:57 +01:00
};
};
};
systemd.services.kea-dhcp4-server = {
after = [
"network-setup.service"
];
requires = [
"network-setup.service"
];
};
2023-02-03 00:41:40 +01:00
clerie.firewall.enable = true;
2021-05-07 21:58:30 +02:00
clerie.monitoring = {
enable = true;
id = "104";
pubkey = "sro9DUSMtVr5xV2o3GTgg+0vmLj+bRc8fN+3pIr6+HY=";
2022-11-02 18:46:24 +01:00
blackbox = true;
2021-05-07 21:58:30 +02:00
};
2020-12-06 16:40:47 +01:00
system.stateVersion = "21.03";
}