Hey, I have been using router os for a few years on a RB450GX4. The device was quite weak for my needs so I upgraded to a x64 machine(N305, 6x i226 nics). I tried pfsense, opnsense and untangled and didn’t like them too much and now I have finally almost finished setting up vyos. So far I do really like it but there is stuff that can be improved. I made small notes when setting it up about the things I’d like to see!
- I have a
bad_ipv6
ipv6-network-group. These addresses should be a part of that group but vyos tells me they are invalid and does not add them to this group.
network "::ffff:0.0.0.0/96"
network "::224.0.0.0/100"
network "::127.0.0.0/104"
network "::255.0.0.0/104"
I believe this is a bug
- Is there a way to inverse a filter? For example, I’d like to drop all traffic from WAN that has not been DNAT’ed. So for this, I should have a firewall rule that looks like
set firewall ipv4 forward filter rule 1 action drop
set firewall ipv4 forward filter rule 1 description "Drop all from WAN not DSTNATed"
set firewall ipv4 forward filter rule 1 connection-status nat !destination
but I am not sure if I can apply inverse filters like this? I did see docs contexts in some cases where it suggested I could do !<resource>
but then I don’t see it in other places.
- Similar to 2, I could merge this into a single rule if inverse filters are possible.
rule 14 {
action "accept"
inbound-interface {
interface-name "wg0"
}
source {
group {
network-group "personal_vpn"
}
}
}
rule 15 {
action "drop"
inbound-interface {
interface-name "wg0"
}
}
INTO
rule 14 {
action "drop"
inbound-interface {
interface-name "wg0"
}
source {
group {
network-group "!personal_vpn"
}
}
}
- This can be a small improvement. I’ll prefer the ability to select interface groups when configuring SNAT rules. I had to add multiple rules (1 for each WAN)
set nat destination rule 2 inbound-interface eth1
set nat destination rule 2 inbound-interface pppoe0
set nat destination rule 2 inbound-interface wg1
If it was possible to select interface groups here I could do,
set nat destination rule 2 inbound-interface interface-group WAN
- Similar problems as 4. It’s not possible to select interface groups in
load-balancing
rules.
set load-balancing wan rule 1 inbound-interface eth1
set load-balancing wan rule 1 inbound-interface pppoe0
-
monitor
andlog
commands can use a lot of features.
6a. A command like, monitor wan-load-balance
similar to show wan-load-balance
.
6b. monitor log <line-count>
I have more configuration left to do right now, mostly related to ipv6, monitoring and selective routing of traffic from some hosts over configured wireguard VPN. I’ll try to do that in the next few days