(no title)
binarybanana | 4 years ago
It comes with nice addon packages for stuff like Wireguard, all kinds of tunnels/VPN, adblockers, runs containers and a ton more. I even run it on a VPS as container with it having exclusive access to the "physical" NIC. The parent OS isn't directly accessible at all. Makes firewalling a breeze. The only open ports are for the Tor relay and Wireguard, through Wich I connect to the webui/ssh and do everything else.
Of course, my router also runs OpenWrt...
eric__cartman|4 years ago
You can do a lot with these commodity ARM CPUs, 64-128MB of ram and a few tens of megabytes of flash storage.
maerF0x0|4 years ago
lillecarl|4 years ago
How does it stack up against VyOS (which just recently got VRF-lite support)
dtx1|4 years ago
You SSH into it. Then do whatever you need to. There's nothing in the UI that can't be done via CLI as far as I know. Some plugins might not be 100% CLI compliant but at least the Base UI (luci) is completely transparent to the CLI via uci.
rhn_mk1|4 years ago
I think there's a special configuration command that might fix some of the above issues, but I've been using the web interface (which actually does support committing and, to some extent, validation).
3np|4 years ago
The way OpenWRT handles routing and firewall rules is particular and they apply their own terminology for some things. They have their own distro-specific packages for things like DHCP (odhcp(c)d) and firewall (fw3).
For very simple networks, it's very smooth to get to where you want. Add on dual-stack v4/v6, vlans, multiple firewall zones, routing policies etc and things start becoming very unpredictable.
Oh, and that adblock package? Turns out a single invalid line in a blocklist will completely break DNS (at least on the version I was running from last year).
Not to mention that (AFAIK) there's no good way to keep up to date with security patches and bugfixes while keeping the system stable.
After all the countless hours I poured into OpenWRT configuration, I finally realized that it's so much less pain and confusion with vanilla Debian with systemd-networkd (which BTW natively supports setting up Wireguard interfaces now) and firewalld+nftables, everything configured via ansible playbooks.
For someone diving into this today, it's a lot easier and more future-proof with nftables than iptables - and OpenWRT will be married to iptables for the foreseeable future.
It's great that it works for you, but if you like I did have some imposter syndrome over not perfectly understanding Linux networking and are happy that OpenWRT takes care of those confusing iptables rules and routing policies and what-not - you may just discover that learning how it actually works will take less work than abusing OpenWRT into doing what you want.
Sure, you have to give up the WebUI and some of the custom add-ons.
I am sure BSD or Rocky Linux are fine choices as well; Debian just happens to be what I mostly use for servers otherwise.
I don't want to hate too much on OpenWRT as it's great for novices with trivial needs and there are many devices where it or dd-wrt are the only readily available options. But if you run Linux anyway and have an x86/amd64/arm device you're going to use as a main router, I'd recommend choosing a "normal" distro and setting things up from scratch.
123pie123|4 years ago
you can buy them in the uk/ ebay for 15-20 pounds already with openwrt installed (you can do it yourself, but it includes a bit of soldering) - I have two in case the main one fails - talks to most if not all ISPs
I love openwrt now, it does take a bit of getting used to if you havent used it before.
I mainly use to lock my wifi down between hours for the kids. whilst keeping another wifi/ SSID open.
for security all my NAS's are wired and locked down to key wired computers - I keep meaning to create a Nextcloud gateway on docker
OrvalWintermute|4 years ago
A Palo Alto VM gets you pretty much most of the sweet PA features without the cost, and a better approach than an outdated strategy like VLAN as Access Control, or zone firewalling, permitting the use of permit/deny by protocol, and overall better privilege tiering by network area.
todd8|4 years ago
EvanAnderson|4 years ago
Does Palo Alto have some kind of no-cost offering in their VM line?
stjohnswarts|4 years ago
atatatat|4 years ago
[deleted]