pre-router: clean up config and tune some settings to find out mtu issues and realise it was policy routing
This commit is contained in:
parent
48ce5d9886
commit
c6e03d86fb
@ -4,8 +4,6 @@
|
||||
imports =
|
||||
[ # Include the results of the hardware scan.
|
||||
./hardware-configuration.nix
|
||||
./router.nix
|
||||
./ipv6.nix
|
||||
./nginx.nix
|
||||
];
|
||||
|
||||
@ -22,6 +20,63 @@
|
||||
#networking.interfaces.ens18.useDHCP = false;
|
||||
#networking.interfaces.ens19.useDHCP = false;
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
ethtool # manage NIC settings (offload, NIC feeatures, ...)
|
||||
conntrack-tools # view network connection states
|
||||
wireguard-tools
|
||||
];
|
||||
|
||||
networking.nat = {
|
||||
enable = true;
|
||||
externalInterface = "ens18";
|
||||
internalIPs = [
|
||||
"10.42.0.0/16"
|
||||
];
|
||||
};
|
||||
|
||||
boot.kernel.sysctl = {
|
||||
"net.ipv6.conf.all.forwarding" = true;
|
||||
"net.ipv6.conf.default.forwarding" = true;
|
||||
};
|
||||
|
||||
networking.interfaces.ens18.useDHCP = true;
|
||||
networking.interfaces.ens19.useDHCP = false;
|
||||
networking.interfaces.ens19.ipv6.addresses = [
|
||||
{ address = "fd00:10:42:10::25"; prefixLength = 64; }
|
||||
{ address = "2a01:4f8:1c0c:8221::25"; prefixLength = 64; }
|
||||
];
|
||||
networking.interfaces.ens19.ipv4.addresses = [
|
||||
{ address = "10.42.10.25"; prefixLength = 24; }
|
||||
];
|
||||
|
||||
networking.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [ "fe80::42:10:1/64" ];
|
||||
privateKeyFile = "/var/src/secrets/wireguard/wg0";
|
||||
allowedIPsAsRoutes = false;
|
||||
peers = [{
|
||||
publicKey = "Y++eB9SfU17zB4mJ/6AaN761tngXAyTNoVaPNKmuvls=";
|
||||
allowedIPs = [ "::/0" ];
|
||||
endpoint = "78.47.183.82:51876";
|
||||
#endpoint = "gatekeeper.net.clerie.de:51876";
|
||||
persistentKeepalive = 25;
|
||||
}];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
networking.localCommands = ''
|
||||
ip -6 route add default dev wg0 table 100
|
||||
'';
|
||||
|
||||
clerie.policyrouting.enable = true;
|
||||
clerie.policyrouting.rules6 = [
|
||||
{ rule = "lookup main suppress_prefixlength 0"; prio = 10000; }
|
||||
{ rule = "from 2a01:4f8:1c0c:8221::/64 lookup 100"; prio = 19000; }
|
||||
];
|
||||
|
||||
# This value determines the NixOS release from which the default
|
||||
# settings for stateful data, like file locations and database versions
|
||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||
|
@ -1,41 +0,0 @@
|
||||
{ config, pkgs, ...}:
|
||||
|
||||
{
|
||||
environment.systemPackages = with pkgs; [
|
||||
wireguard-tools
|
||||
];
|
||||
|
||||
networking = {
|
||||
firewall.allowedUDPPorts = [ 51820 ];
|
||||
firewall.trustedInterfaces = [ "ens19"];
|
||||
iproute2.enable = true;
|
||||
iproute2.rttablesExtraConfig = ''
|
||||
100 PUBLIC6
|
||||
'';
|
||||
wireguard.enable = true;
|
||||
wireguard.interfaces = {
|
||||
wg0 = {
|
||||
ips = [ "fe80::42:10:1/64" ];
|
||||
privateKeyFile = "/var/src/secrets/wireguard/wg0";
|
||||
listenPort = 51820;
|
||||
allowedIPsAsRoutes = false;
|
||||
postSetup = ''
|
||||
ip -6 rule add from 2a01:4f8:1c0c:8221::/64 lookup PUBLIC6
|
||||
ip -6 route add default via fe80::1 dev wg0 table PUBLIC6
|
||||
'';
|
||||
peers = [{
|
||||
publicKey = "Y++eB9SfU17zB4mJ/6AaN761tngXAyTNoVaPNKmuvls=";
|
||||
allowedIPs = [ "::/0" ];
|
||||
endpoint = "78.47.183.82:51876";
|
||||
#endpoint = "gatekeeper.net.clerie.de:51876";
|
||||
persistentKeepalive = 25;
|
||||
}];
|
||||
};
|
||||
};
|
||||
};
|
||||
boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = 1;
|
||||
networking.interfaces.ens19.ipv6.addresses = [
|
||||
{ address = "fd00:10:42:10::25"; prefixLength = 64; }
|
||||
{ address = "2a01:4f8:1c0c:8221::25"; prefixLength = 64; }
|
||||
];
|
||||
}
|
@ -1,29 +0,0 @@
|
||||
{ config, pkgs, ...}:
|
||||
|
||||
{
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
ethtool # manage NIC settings (offload, NIC feeatures, ...)
|
||||
conntrack-tools # view network connection states
|
||||
];
|
||||
|
||||
networking.firewall.interfaces.ens19.allowedUDPPorts = [ 67 53 ];
|
||||
networking = {
|
||||
nameservers = [ "10.42.10.8" "2a01:4f8:1c0c:8221::8" ];
|
||||
nat = {
|
||||
enable = true;
|
||||
externalInterface = "ens18";
|
||||
internalInterfaces = [ "ens19" ];
|
||||
};
|
||||
interfaces = {
|
||||
ens19.useDHCP = false;
|
||||
ens18.useDHCP = true;
|
||||
# Handle the VLANs
|
||||
ens19 = {
|
||||
ipv4.addresses = [
|
||||
{ address = "10.42.10.25"; prefixLength = 24; }
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in New Issue
Block a user