Routers for advanced setups

Woke up to a borked ISP router, refused to talk to any of its switch ports. Now this could just be one of its random fits it has, or due to my 20 nodes using port-fordwarding. Dunno since it happened in the middle of the night.

I restarted the router and nodes and my son is now using starlink, so if it borks again its just me that is affected and maybe I can trace it down.

1 Like

Cool, thank Josh.
I’ve gone with 35, it’s a minefield though as mine was 10 seconds before making any adjustments.
Who knows what folks default settings are and how many will ever venture there.

2 Likes

Anyone interested in 3D printing a 10" rack? Its like a 19" rack but panels/face-plates are 10" wide rather than 19"

I am currently in the final stages of doing one in openSCAD, have most done including face plates and not doing a shelf. Advantage of openSCAD is I have parameters for almost every dimension.

Once I have it finalised I will clean up the code. But its slowed down by life and having to wait for test prints to finish to make sure I have it correct.

Obviously will not take the weights that a metal 19" rack can, but nearly all 10" racks cannot even if metal.

Will use it to contain router/switch/KVM etc. And might even do a separate one for the household ISP router (replacement) that is hopefully less than 2 weeks away.

Oh its much cheaper. The bolts and nuts are where the real cost is in this. The cage nuts and screws are mounted but in a better way for plastic.

3 Likes

A bit offtopic, but maybe not worth a new topic… :slightly_smiling_face:

My current router is not capable for running the amount of connections needed for a big up or download for example, let alone several nodes. I’m about to buy a new one, but I would not be able to set up any of these more advanced models you guys are discussing here.

Would you care to check up this consumer model, FRITZ!Box 6660 Cable, and give your guesstimation if it would be good for a regular, but a bit ambitious household nodelord? :disguised_face:

I have tried to find information about the number of connections, and the best I could find is this:

In router mode, the FRITZ!Box manages all IP connections to the internet so that it can forward responses from remote sites to the correct devices in the home network. The number of simultaneous IP connections is not limited by the FRITZ!Box.

Since the maximum number of IP connections depends on the usage of the FRITZ!Box’s memory, in practice it can vary depending on the other functions being used at a given time (such as Wi-Fi, telephony). Experience has shown that it is always possible to have several hundred simultaneous IP connections.

They talk about hundreds, but could it possibly be several thousands as well? :pray:
They don’t talk about memory in their product page, but by Googling fritz 6660 cable router memory I find these specs:

Box-Model: FRITZ!Box 6660 Cable - Nick: 6660 Web
Memory: RAM: 1024 MB - NAND-Flash: 4096 MB
CPU: Puma7 @ 2000 MHz - - CPU-Cores: 2
HWRevision: 252 - HWSubRevision: 2 PCBs

The reviews from the shop I would buy it talk about it very nicely, especially in replacing the modem provided by my ISP. But there are no mentions about the kind of use I would put it into…

1 Like

Not knowing the size of each Nat table entry, its not possible to estimate the number it can handle. But I’d say with 1GB of memory and no built in limit on the size of the table it will have all of available memory for the table. Guess 1/2GB or so is available. Even 128 MB with 128 bytes per entry, that is 1 million entries.

The table should not be the issue for the router, but more how fast it can handle a massive number of NAT connections.

Now someone talked about their ISP router having 16K entries and being able to run like 30-40 nodes without issues. From that you should be able to run at least 64 times that (say 2000-2500) nodes without any issues for the NAT table.

Then internet connection speed is to be considered next along with CPU power in the devices.

3 Likes

Cool, thanks for your help, I think that box is the best compromise for me regarding capabilities and ease of use. :+1:

I now have 400MBs up and down, the maximum I can get is 1 GB. I think I’ll start with what I have, and upgrade if needed. I’m not going to get any new devices for this, and the capacity of what I have is limited. So I may well stay within the boundaries of my current plan.

Thanks again!

2 Likes

If you rather have a microtik I can hook you up with a guy, he can set it up for you for a fair price.

1 Like

I am loving it, blown away by what it can do. RouterOS is a game changer.
Definitely a bit to learn but it I feel liberated.

Ran a script on it yesterday that set up all my port forwarding rules in 2 seconds.
I will never return to a isp provided router again.

2 Likes

Thanks but I rather go with the one I can hope to manage without too much outside help. I can also walk to a shop and buy it from the self on Monday morning. But thank you anyway!

It’s absolutely bonkers how feature packed these little devils are. And it’s available in every model, even a 40$ mini router thingie has all that badness inside.

1 Like

Yes they have done a good job in making the same s/w work in every box built to run it. RouterOS will not run on some stuff since they are only for switchOS to run.

Been a while since I wrangled with their software, and will get the opportunity to do it again soonish for the household router box to the NBN connection. No good for the starlink though, not even sure if I can replace the router, although I think it can go into bridged mode. If it can then i might get one for it too.

I am going to set up a opensense router box to isolate my ā€œhome labā€ (the current buzz word) network from the house devices, like my printer, 3d printer, and other devices.

Thinking about that, I won’t be able to use --uPnP for devices inside the ā€œhome labā€ since the house router won’t be port forwarding the uPnP ports that open up on the opensense box. I can do portforwarding though. In anycase the nodes will be on the house side so its not an issue except for testing and --home-network will work anyhow.

1 Like

Any chance of sharing that script? Blank out any info needed of course

1 Like

Sure thing, I am away for a few days but I will when I get back.

1 Like

Guys, i have a bunch of hardware for running nodes but am living in area where i need one connection from isp for 20 nodes as here are wired (vdsl) 50/15mbit connections. Yes I am living in EU. That’s the funniest thing. So help me god or maybe optic fibers in near future (read minimum of 5 years from now). So when I saw yours speedtest I asked myself, is it time to rellocate? :smile:

2 Likes

Starlink works using --home-network :slight_smile: 100-300 down and 30 up

4 Likes

Ah, the initial amazement :smiley:
Be prepared that not everything is nice in Mikrotik, there are some evil things I have seen:

  1. Sometimes GUI doesn’t agree with what you see in CLI.
  2. Sometimes only part of the configuration is saved.
  3. Sometimes the device behaves differently after reboot without any changes in config.
  4. Wifi configuration in general is a pain on Mikrotiks.

RouterOS is not bad in general, but it can be a bitch when you are trying to debug some problem.

2 Likes

I see Mikrotik are Latvian. What assurances are there that all your traffic is not being reported to the CIA etc or whoever ?

I shouldn’t have called it a script it is not quite a script but very easy nonetheless.

This is what I did.
/ip dhcp-server lease print will give you a list of all connected devices, addresses, host-names, mac etc.

I grabbed that list and created a .rsc file for the devices that needed port forwarding.

port-forwarding.rsc looks like this example.

/ip firewall nat
add chain=dstnat action=dst-nat to-addresses=10.0.0.1 to-ports=1000-1050 protocol=udp in-interface=ether1 comment="nodeA"
add chain=dstnat action=dst-nat to-addresses=10.0.0.2 to-ports=1100-1150 protocol=udp in-interface=ether1 comment="nodeB"
add chain=dstnat action=dst-nat to-addresses=10.0.0.3 to-ports=1200-1250 protocol=udp in-interface=ether1 comment="nodeC"
add chain=dstnat action=dst-nat to-addresses=10.0.0.4 to-ports=1300-1350 protocol=udp in-interface=ether1 comment="nodeD"
add chain=dstnat action=dst-nat to-addresses=10.0.0.5 to-ports=1400-1450 protocol=udp in-interface=ether1 comment="nodeE"
add chain=dstnat action=dst-nat to-addresses=10.0.0.6 to-ports=1500-1550 protocol=udp in-interface=ether1 comment="nodeF"
add chain=dstnat action=dst-nat to-addresses=10.0.0.7 to-ports=1600-1650 protocol=udp in-interface=ether1 comment="nodeG"

You then upload that .rsc via files and run it from the terminal with /import file=port-forwarding.rsc

Done and dusted.

5 Likes

Those 3 letter agencies can and will already snoop on your traffic at your provider. They dont need microtiks involvement…

4 Likes

Cisco, Juniper and other companies have been proven to have backdoors for USA agencies.
Huawei, ZTE - full of China backdoors

I don’t recall any reports of backdoors in Mikrotik. But security in general is a thing to watch closely on Mikrotik. RouterOS is on milions of devices which makes it interesting target for botnets. Lot of times wrongly configured or old version Mikrotiks gets pwned in minutes on public IP.

2 Likes