EdgeOS UG PDF
EdgeOS UG PDF
EdgeOS UG PDF
Table of Contents
Chapter 1: Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Configuration Interface System Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Hardware Overview and Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Typical Deployment Scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 3: Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter 5: Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
IPv6 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 6: Firewall/NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Port Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Firewall Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Firewall/NAT Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Chapter 7: Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
PPPoE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Chapter 8: VPN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
PPTP Remote Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
IPsec Site-to-Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Chapter 9: QoS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Smart Queue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Basic Queue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Advanced Queue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
6. Configure firewall rules on the Firewall/NAT > Firewall 3. Configure DHCP server(s) on the Services tab; see
Policies tab; see Firewall Policies on page 28 for DHCP Server on page 39 for more information.
more information. 4. Configure NAT rules on the Firewall/NAT > NAT tab; see
7. Configure additional settings as needed for your NAT on page 33 for more information.
network. 5. Configure firewall rules on the Firewall/NAT > Firewall
Corporate Deployment Policies tab; see Firewall Policies on page 28 for
more information.
This scenario uses a single EdgeRouter device. The three
independent interfaces connect to the following: 6. Configure additional settings as needed for your
network.
Internet
DMZ
LAN
Firewall
Policies
Internet
DMZ
LAN
2. Configure the Ethernet adapter on your computer Place your mouse over a port to view the following:
with a static IP address on the 192.168.1.x subnet (e.g., Enabled/Disabled The administrative status is displayed.
192.168.1.100). Link The connection status is displayed.
Note: As an alternative, you can connect a serial Speed The speed (in Mbps) and duplex mode are
cable to the Console port of the EdgeRouter. See displayed.
Command Line Interface on page 89 for
more information.
3. Launch your web browser. Type https://192.168.1.1 in
the address field. Press enter (PC) or return (Mac).
Navigation
The EdgeOS software consists of 10 primary tabs, and
some of these tabs have sub-tabs. This User Guide covers
each tab with a chapter. For details on a specific tab, refer
4. The login screen will appear. Enter ubnt in the to the appropriate chapter.
Username and Password fields. Read the Ubiquiti Dashboard Dashboard on page 9 displays
License Agreement, and check the box next to I agree status information about services and interfaces. You
to the terms of this License Agreement to accept it. Click can also configure interfaces and Virtual Local Area
Login. Networks (VLANs).
Traffic Analysis Traffic Analysis on page 17
displays Deep Packet Inspection (DPI) information
about the applications and IP addresses using the most
bandwidth.
Routing Routing on page 21 configures static
routes and Open Shortest Path First (OSPF) settings,
including metrics, areas, and interfaces.
Firewall/NAT Firewall/NAT on page 27 configures
port forwarding, firewall policies, Network Address
Translation (NAT) rules, and firewall/NAT groups.
Services Services on page 39 configures DHCP
servers, DNS forwarding, and the PPPoE server.
The EdgeOS Configuration Interface will appear, allowing VPN VPN on page 45 configures PPTP remote
you to customize your settings as needed. access and IPSec site-to-site VPN options.
Required fields are marked by a blue asterisk *. When the Click the top right corner of the Alerts tab to close it.
information icon is displayed, you can click the icon for System
more information about an option.
At the bottom of the screen, click the System tab to access
Welcome the device settings.
At the top left of the screen, click Welcome to view the
Logout option:
Gateway
System host name Enter a name for the EdgeRouter. The System domain name Enter the domain name of your
host name identifies the EdgeRouter as a specific device. EdgeRouter. The domain name identifies the EdgeRouters
For example, a .com URL typically uses this format: network on the Internet. For example, a .com URL typically
<host_name>.domain_name.com uses this format:
Time Zone host_name.<domain_name>.com
NTP
NTP is a protocol for synchronizing the clocks of computer
systems over packet-switched, variable-latency data
networks. You can use it to set the system time on the
EdgeRouter. If the System Log option is enabled, then
Use Coordinated Universal Time (UTC) UTC is the the system time is reported next to every log entry that
international time standard used by Network Time registers a system event.
Protocol (NTP) servers. If your routers are located in
multiple time zones, then you may want to use UTC.
Time zone To set your network to a specific time zone,
select Time zone and configure the following:
Select continent/ocean Select your location.
Automatically update system time using NTP By
Select country/region Select your location. default, the EdgeRouter obtains the system time from a
Select time zone Select your time zone. time server on the Internet.
Click Save to apply your changes.
Management Settings Log Level Select the appropriate level of log messages for
reporting: Emergency, Urgent, Critical, Error, Warning,
SSH Server
Further Investigation, Informational, or Debug. The
default is Error.
Note: Properly configure the remote host to receive
syslog protocol messages.
UBNT Discovery
The UBNT Discovery feature enables the EdgeRouter to
Enable Enabled by default. This option allows SSH be discovered by other Ubiquiti devices through the
(Secure Shell) access to the EdgeRouter for remote Discovery tool, which is available in the Toolbox (refer to
configuration by command line. SSH uses encryption and Discover on page 87) or as a separate download at:
authentication, so it is a secure form of communication. www.ubnt.com/download/utilities
See Command Line Interface on page 89 for more
information.
Port Specify the TCP/IP port of the SSH server. The default
is 22.
Telnet Server
Enable Enabled by default. This option activates the UBNT
Discovery feature.
SNMP Agent
Simple Network Monitor Protocol (SNMP) is an
application layer protocol that facilitates the exchange
Enable Disabled by default. This option allows Telnet of management information between network
access to the EdgeRouter for remote configuration devices. Network administrators use SNMP to monitor
by command line. Telnet is not a secure form of networkattached devices for issues that warrant
communication, so we recommend SSH. See Command attention.
Line Interface on page 89 for more information. The EdgeRouter contains an SNMP agent, which does the
Port Specify the TCP/IP port of the Telnet server. The following:
default is 23. Provides an interface for device monitoring using SNMP
System Log Communicates with SNMP management applications
for network provisioning
Every logged message contains at least a system time and
host name. Usually a specific service name that generates Allows network administrators to monitor network
the system event is also specified within the message. performance and troubleshoot network problems
Messages from different services have different contexts For the purpose of equipment identification, configure the
and different levels of detail. Usually error, warning, or SNMP agent with contact and location information:
informational system service messages are reported;
however, more detailed debug level messages can also
be reported. The more detailed the system messages
reported, the greater the volume of log messages
generated.
Hardware
Hardware status information is displayed for the
EdgePoint EP-R8.
The number of each route type and the total number Select the physical or virtual interfaces you want to display
of routes are displayed. Click Routes to display the from the Interfaces column. Click the to hide or display
Routing>Routes tab. Go to Routes on page 22 for this column.
more information.
OSPF
The OSPF status, settings, and number of areas are
displayed. Click OSPF to display the Routing > OSPF tab.
Go to OSPF on page 24 for more information.
NAT
The NAT (Network Address Translation) status and
number of NAT rules are displayed. Click NAT to display
the Firewall/NAT > NAT tab. Go to NAT on page 33 for
more information.
The TX Rate and RX Rate bar graphs display the
Firewall current data traffic, which is colorcoded to match the
The firewall status and numbers of sets and rules are corresponding interface. The graph scale and throughput
displayed. Click Firewall to display the Firewall/NAT > dimension (Mbps, for example) change dynamically
Firewall Policies tab. Go to Firewall Policies on page depending on the mean throughput value. The statistics
28 for more information. are updated automatically.
DHCP
The DHCP server status and numbers of active and
inactive servers are displayed. Click DHCP to display the
Services tab. Go to DHCP Server on page 39 for more
information.
Interfaces
Distribution
Click Hide Distribution to hide the Interfaces > Distribution
section. Click the remaining open/close tab to display the
Interfaces > Distribution section again.
Place your mouse over a bar to view the Current Rate and
Total Amount of traffic for the selected interfaces.
Open/Close Tab
Speed/Duplex The default is Auto negotiation. The -- Use DHCP The interface acquires network settings
EdgeRouter automatically negotiates transmission from a DHCPv4 server. Click the Renew button to
parameters, such as speed and duplex, with its acquire fresh network settings.
counterpart. In this process, the networked devices
first share their capabilities and then choose the fastest
transmission mode they both support.
To manually specify the transmission link speed and
duplex mode, select one of the following options: -- Use DHCP for IPv6 The interface acquires network
100/full, 100/half, 10/full, or 10/half. settings from a DHCPv6 server.
Full-duplex mode allows communication in both -- Manually define IP address(es) Enter the static
directions simultaneously. Half-duplex mode IP address (example: 192.0.2.1/24 for IPv4 or
allows communication in both directions, but not 2001:db8::1/32 for IPv6).
simultaneously and only in one direction at a time.
Proxy ARP Enable the EdgeRouter to answer a source
hosts ARP (Address Resolution Protocol) requests for
the IP address of a destination host that is not located
on the source hosts network. ARP allows hosts on the
same network to discover each others IP address via a -- Add IP Click Add IP to enter additional IP addresses.
layer 2 broadcast to all MAC addresses. If they are not on MTU Enter the MTU (Maximum Transmission Unit)
the same network, the layer 2 broadcast will not reach value, which is the maximum packet size (in bytes) that
its destination; however, the EdgeRouter can serve as a network interface can transmit. For the ERX, ERXSFP,
the go-between if Proxy ARP is enabled. and EPR6, the valid MTU range is 68 to 2018. For all
Click Save to apply your changes, or click Cancel. other models, the valid MTU range is 68 to 9000. The
default is 1500.
Configure the VLAN Proxy ARP Enable the EdgeRouter to answer a source
After you click Config, the Interface Configuration screen hosts ARP (Address Resolution Protocol) requests for
appears. the IP address of a destination host that is not located
on the source hosts network. ARP allows hosts on the
same network to discover each others IP address via a
layer 2 broadcast to all MAC addresses. If they are not on
the same network, the layer 2 broadcast will not reach
its destination; however, the EdgeRouter can serve as
the go-between if Proxy ARP is enabled.
Click Save to apply your changes, or click Cancel.
Configure PPPoE
After you click Config, the Interface Configuration screen
appears.
Password Enter the password to connect to the PPPoE Switch Ports Select the ports for the switch interface.
server; this must match the password configured on the Proxy ARP Enable the EdgeRouter to answer a source
PPPoE server. Check the box to display the password. hosts ARP (Address Resolution Protocol) requests for
MTU Enter the MTU (Maximum Transmission Unit) the IP address of a destination host that is not located
value, which is the maximum packet size (in bytes) that on the source hosts network. ARP allows hosts on the
a network interface can transmit. The valid MTU range is same network to discover each others IP address via a
68 to 1500. The default is 1492. layer 2 broadcast to all MAC addresses. If they are not on
the same network, the layer 2 broadcast will not reach
Note: Setting the MTU higher than 1492 will
its destination; however, the EdgeRouter can serve as
require ISP support and also require increasing
the go-between if Proxy ARP is enabled.
the MTU value of the parent interface (ethX)
accordingly. Click Save to apply your changes, or click Cancel.
Click Save to apply your changes, or click Cancel. Configure the Switch (EdgeRouter X Platform)
Configure the Switch (EdgeRouter PoE) (Available for the EdgeRouter X, EdgeRouter X SFP, and
The switch configuration is available for EdgeRouter PoE, EdgePoint EP-R6 only.) After you click Config, the Interface
EdgeRouter X, EdgeRouter X SFP, and EdgePoint EP-R6 Configuration screen appears.
only. This section covers the options for the EdgeRouter
PoE only. Proceed to the Configure the Switch (EdgeRouter X
Platform) section in the next column for the other models.
After you click Config, the Interface Configuration screen
appears.
Proxy ARP Enable the EdgeRouter to answer a source Configure the PoE Settings
hosts ARP (Address Resolution Protocol) requests for
the IP address of a destination host that is not located Note: Before enabling PoE, check the specifications
on the source hosts network. ARP allows hosts on the of your airFiber, airMAX, UniFi, UniFi Video, legacy, or
same network to discover each others IP address via a thirdparty devices to ensure they support passive
layer 2 broadcast to all MAC addresses. If they are not on PoE and require the available amount of voltage.
the same network, the layer 2 broadcast will not reach (Available for the EdgePoint EP-R6, EdgePoint EP-R8, or
its destination; however, the EdgeRouter can serve as EdgeRouter PoE only.) After you click PoE, the PoE tab of
the go-between if Proxy ARP is enabled. the Interface Configuration screen appears.
Complete the following: Click Save to apply your changes or click Cancel.
Distance (1-255) Enter the administrative distance. Disable Disable the route while keeping its
If there are identical routes from different sources configuration. (This option is not available for black hole
(such as static, RIP, and OSPF), the EdgeRouter routes.)
compares the routes and uses the route with the
lowest distance.
Configure the Static Route
After you click Config, the Static Route Configuration screen
Enable Check the box to enable the route.
appears.
Click Save to apply your changes.
Search Allows you to search for specific text. Begin
typing; there is no need to press enter. The results are
filtered in real time as soon as you type two or more
characters.
All/Static/Connected/RIP/OSPF Click the appropriate tab
to filter the routes as needed.
All All routes are displayed by default.
Static All static routes that you have configured are
displayed.
Connected All routes that are directly connected to the Follow the instructions for your route type:
EdgeRouter are displayed.
Gateway
RIP All RIP (Routing Information Protocol) routes are
displayed. RIP is an interior, distance vector routing Route type The gateway route uses the IP address and
protocol that uses hop count as a metric to determine subnet mask of the next hop gateway.
the best route. Destination network The IP address and subnet mask
OSPF All OSPF (Open Shortest Path First) routes are are displayed in slash notation.
displayed. OSPF is an interior, link-state routing protocol Next hop address The IP address of the next hop
that uses cost as a metric to determine the best route. gateway is displayed.
The bandwidth of an interface determines the cost the Description Enter keywords to identify this route.
higher the bandwidth, the lower the cost.
Distance (1-255) Enter the administrative distance. If
A table displays the following information about each there are identical routes from different sources (such
route. Click a column heading to sort by that heading. as static, RIP, and OSPF), the EdgeRouter compares the
routes and uses the route with the lowest distance.
Enable Check the box to enable the route.
Click Save to apply your changes.
Interface
Selected The status of the route, whether it has been
selected for the routing table, is displayed.
Description If available, the keywords describing the
route are displayed.
Destination The destination IP address is displayed.
Next Hop The IP address of the next-hop interface is
displayed.
Interface The name of the interface is displayed.
Route Type The type of route is displayed.
In FIB The forwarding status of the route, whether it is in
the FIB (Forwarding Information Base), is displayed. Route type The interface route uses the next hop
interface.
Actions Click the Actions button to access the following
options: Destination network The IP address and subnet mask
are displayed in slash notation.
Config To configure the route, click Config. Go to the
Configure the Static Route section in the next column. Next hop interface The name of the next hop interface
is displayed.
Delete Delete the route; its configuration will be
removed. Description Enter keywords to identify this route.
Network Enter the IP address and subnet mask using A table displays the following information about each
slash notation: OSPF Interface. Click a column heading to sort by that
<network_IP_address>/<subnet_mask_number> heading.
(example: 192.0.2.0/24).
Click Add New to enter more network addresses.
Click Save to apply your changes.
Interfaces Interface The name of the interface is displayed.
You can configure interfaces with specific OSPF options. Cost The cost of the interface is displayed. OSPF uses cost
as a metric to determine the best route.
Actions Click the Actions button to access the following
options:
Config To configure the OSPF Interface, click Config.
Go to the Configure the OSPF Interface section.
Delete Delete the OSPF Interface.
Configure the OSPF Interface
Add OSPF Interface To create a new interface, click Add After you click Config, the OSPF Interface Configuration
OSPF Interface. screen appears.
The OSPF Interface Configuration screen appears.
Auto firewall Enabled by default. Displayed if Show Description Enter keywords that will identify this rule.
advanced options is enabled. If you want the EdgeRouter Remove Click Remove to delete a rule.
to automatically open ports for the specified port
forwarding rules, then keep Auto firewall enabled. Add Rule Click Add Rule to create a new rule.
If you disable the Auto firewall option, then you will need
to manually define firewall rules on the Firewall/NAT >
Firewall Policies tab (refer to the Firewall Policies section in
the next column).
LAN interface Click Add LAN to display the drop-down
menu. Then select the appropriate interface. (If you select
Other, then enter the interface name in the field provided.)
Remove LAN Click Remove LAN to delete an interface.
Add LAN Click Add LAN to add another new interface.
Firewall Policies
A firewall policy is a set of rules with a default action.
Firewall policies are applied before SNAT (Source Network
Port Forwarding Rules Address Translation) and after DNAT (Destination Network
This section allows you to create port forwarding rules and Address Translation).
manage them. To create a firewall policy:
Show rules stats Select this checkbox to display statistics 1. Click the Firewall/NAT Groups tab, and create the
for each rule: applicable firewall groups. See Firewall/NAT Groups
Packets The number of forwarded packets is displayed. on page 36 for more information.
Bytes The number of forwarded bytes is displayed. 2. Click the Firewall Policies tab, and then click Add
Ruleset. Configure the basic parameters. See the
Add Ruleset description in the next column for more
information.
3. Configure the details of the firewall policy. See
Configure the Firewall Policy on page 29 for
more information.
Destination on page 32 Match all protocols except for this Match packets
of all protocols except for the selected protocol.
Time on page 32
Destination Week Days Enter the days of the week when the rule
should be applied. Enter Sun, Mon, Tue, Wed, Thu, Fri,
or Sat. If you enter more than one day, use commas to
separate the days (example: Mon, Tue, Wed).
-- Match all week days except for these Match all days
of the week except for the selected days.
Start Date Enter the date the rule should start being
applied. Use the YYYY-MM-DD (year-month-day) format.
Start Time Enter the time the rule should start
being applied. Use the 24-hour format, HH:MM:SS
Address Enter the IP address of the destination. (hours:minutes:seconds).
Port Enter the port number of the destination. Stop Date Enter the date the rule should stop being
Firewall groups are created on the Firewall/NAT Groups applied. Use the YYYY-MM-DD (year-month-day) format.
tab; see Firewall/NAT Groups on page 36 for Stop Time Enter the time the rule should stop
more information. Select the appropriate group(s); being applied. Use the 24-hour format, HH:MM:SS
you can specify up to two groups maximum in these (hours:minutes:seconds).
combinations: Interpret dates and times as UTC Check the box if
An address group and port group your network uses UTC.
A network group and port group Click Save to apply your changes, or click Cancel.
The packets must match both groups to apply the rule. Configuration
Address Group or Interface Addr. Select the
appropriate address group or interface address. If you
select Other as the interface address, then enter the
interface name in the field provided. The firewall rule
will match the IP address of the selected interface.
Network Group Select the appropriate network group.
Port Group Select the appropriate port group.
Click Save to apply your changes, or click Cancel.
Name The name of this policy is displayed.
Time
Description Enter keywords to describe this policy.
Default action All policies have a default action if the
packets do not match any rule. Select the appropriate
default action:
Drop Packets are blocked with no message.
Reject Packets are blocked, and an ICMP (Internet
Control Message Protocol) message is sent saying the
destination is unreachable.
Accept Packets are allowed.
Default Log Check this box to log packets that trigger the
default action.
Click Add Ruleset to apply your changes.
Interfaces
Month Days Enter the days of the month when the rule
should be applied. Enter numbers in the range 1 to 31.
If you enter more than one day, use commas to separate
the numbers (example: 3, 4, 5).
-- Match all month days except for these Match all
days of the month except for the selected days.
Interface Select the appropriate interface from the
drop-down list.
Direction Select the direction of the traffic flow. Source NAT Rules
-- in Match inbound packets. Source NAT Rules change the source address of packets;
-- out Match outbound packets. a typical scenario is that a private source needs to
-- local Match local packets. communicate with a public destination. A Source NAT
Rule goes from the private network to the public network
Remove Click Remove to remove an interface. and is applied after routing, just before packets leave the
Add Interface Click Add Interface to enter more EdgeRouter.
interfaces. Add Source NAT Rule To create a new rule, click Add
Click Save Ruleset to apply your changes. Source NAT Rule. Go to Add or Configure a Source NAT
Stats Rule on page 34.
Save Rule Order To change the rule order, click and drag
a rule up or down the sequence, and then release the rule.
When you are finished, click Save Rule Order.
Search Allows you to search for specific text. Begin
typing; there is no need to press enter. The results are
filtered in real time as soon as you type two or more
characters.
A table displays the following statistics about each rule. A table displays the following information about each rule.
Click a column heading to sort by that heading. Click a column heading to sort by that heading.
Rule The rules are applied in the order specified. The
number of the rule in this order is displayed.
Packets The number of packets that triggered this rule is
displayed.
Order The rules are applied in the order specified. The
Bytes The number of bytes that triggered this rule is number of the rule in this order is displayed.
displayed.
Description The keywords you entered to describe this
Action The action specified by this rule is displayed. rule are displayed.
Description The keywords you entered to describe this Source The source IP address or group is displayed.
rule are displayed.
Destination The destination IP address or group is
NAT displayed.
NAT changes the addressing of packets. A NAT rule tells Translation A description of the translation (such as
the EdgeRouter what action to take with a specific packet. masquerade to eth_) is displayed.
Define the following: Count The number of translations is displayed.
Criteria for matching packets Actions Click the Actions button to access the following
Action to take with matching packets options:
Rules are organized into a set and applied in the specified Config To configure the rule, click Config. Go to the
Rule Order. If the packets match a rules criteria, then its Add or Configure a Source NAT Rule section below.
action is performed. If not, then the next rule is applied. Copy To create a duplicate, click Copy. The duplicate
rule appears at the bottom of the list.
Delete Remove the rule.
Add or Configure a Source NAT Rule Enable Logging Check this box to log instances when
the rule is matched.
After you click Config, the Source NAT Rule Configuration
screen appears. Protocol Select one of the following:
-- All protocols Match packets of all protocols.
-- TCP Match TCP packets.
-- UDP Match UDP packets.
-- Both TCP and UDP Match TCP and UDP packets.
-- Choose a protocol by name Select the protocol from
the drop-down list. Match packets of this protocol.
Match all protocols except for this Match packets
of all protocols except for the selected protocol.
Dest. Address Enter the IP address or network address Order The rules are applied in the order specified. The
of the destination. You can also enter a range of IP number of the rule in this order is displayed.
addresses; one of them will be used. Description The keywords you entered to describe this
Note: If you enter a network address, enter the IP rule are displayed.
address and subnet mask using slash notation: Source The source IP address or group is displayed.
<network_IP_address>/<subnet_mask_number> Destination The destination IP address or group is
(example: 192.0.2.0/24). displayed.
Dest. Port Enter the port name or number of the
destination. You can also enter a range of port numbers; Translation A description of the translation (such as to
one of them will be used. <IP_address>) is displayed.
Dest Address Group or Interface Addr. Select the Count The number of translations is displayed.
appropriate address group or interface address. If you Actions Click the Actions button to access the following
select Other as the interface address, then enter the options:
interface name in the field provided. The NAT rule will Config To configure the rule, click Config. Go to the
match the IP address of the selected interface. Add or Configure a Destination NAT Rule section below.
Dest Network Group Select the appropriate network Copy To create a duplicate, click Copy. The duplicate
group. rule appears at the bottom of the list.
Dest Port Group Select the appropriate port group. Delete Remove the rule.
Click Save to apply your changes, or click Cancel.
Add or Configure a Destination NAT Rule
Destination NAT Rules After you click Config, the Destination NAT Rule
Destination NAT Rules change the destination address of Configuration screen appears.
packets; a typical scenario is that a public source needs
to communicate with a private destination. A Destination
NAT Rule goes from the public network to the private
network and is applied before routing.
Exclude from NAT Check the box to exclude packets Dest. Address Enter the IP address or network address
that match this rule from NAT. of the destination. You can also enter a range of IP
Enable Logging Check this box to log instances when addresses; one of them will be used.
the rule is matched. Note: If you enter a network address, enter the IP
Protocol address and subnet mask using slash notation:
-- All protocols Match packets of all protocols. <network_IP_address>/<subnet_mask_number>
(example: 192.0.2.0/24).
-- TCP Match TCP packets. Dest. Port Enter the port name or number of the
-- UDP Match UDP packets. destination. You can also enter a range of port numbers;
-- Both TCP and UDP Match TCP and UDP packets. one of them will be used.
-- Choose a protocol by name Select the protocol from Dest Address Group or Interface Addr. Select the
the drop-down list. Match packets of this protocol. appropriate address group or interface address. If you
select Other as the interface address, then enter the
Match all protocols except for this Match packets interface name in the field provided. The NAT rule will
of all protocols except for the selected protocol. match the IP address of the selected interface.
Dest Network Group Select the appropriate network
group.
Dest Port Group Select the appropriate port group.
Click Save to apply your changes, or click Cancel.
-- Enter a protocol number Enter the port number of
the protocol. Match packets of this protocol. Firewall/NAT Groups
Match all protocols except for this Match packets Create groups organized by IP address, network address,
of all protocols except for the selected protocol. or port number.
Group Type Select the appropriate option: Network Group Make changes as needed.
-- Address Group Define a group by IP address.
-- Network Group Define a group by network address.
-- Port Group Define a group by port numbers.
Click Save to apply your changes.
Search Allows you to search for specific text. Begin
typing; there is no need to press enter. The results are
filtered in real time as soon as you type two or more
characters.
-- Name The name of this group is displayed.
All/Address/Network/Port Click the appropriate tab to
-- Description Enter keywords to describe this group.
filter the groups as needed.
-- Network Enter the IP address and subnet mask using
All All groups are displayed by default.
slash notation:
Address All of the address groups are displayed. <network_IP_address>/<subnet_mask_number>
Network All of the network groups are displayed. (example: 192.0.2.0/24).
Port All of the port groups are displayed. Click Add New to enter more network addresses.
A table displays the following information about each Click Save to apply your changes.
group. Click a column heading to sort by that heading. Port Group Make changes as needed.
UniFi Controller Enter the IP address of the UniFi Configure the DHCP Server
Controller. The DHCP server will return the UniFi
The DHCP Server - screen appears. You have three tabs
Controllers IP address to its DHCP clients, so if a client
available.
is a UniFi AP, it will know how to contact the UniFi
Controller. Leases
Enable Check the box to enable this DHCP server.
Click Save to apply your changes.
Search Allows you to search for specific text. Begin
typing; there is no need to press enter. The results are
filtered in real time as soon as you type two or more
characters.
A table displays the following information about each
DHCP server. Click a column heading to sort by that
heading.
A table displays the following information about each Static MAC/IP Mapping
DHCP client. Click a column heading to sort by that
heading.
Domain Enter the domain name for DHCP clients. Click Save to apply your changes, or click Cancel.
Lease Time Enter the period of time (in seconds) that a Dynamic DNS
DHCP lease should last.
Dynamic DNS (DDNS) is a network service that notifies the
Enable Check the box to enable this DHCP server. DNS server in real time of any changes in the devices IP
Click Save to apply your changes. settings. Even if the devices IP address changes, you can
At the bottom of the screen, you can click Delete to still access the device through its domain name.
delete the DHCP server and its configuration.
DNS
DNS translates domain names to IP addresses; each
DNS server on the Internet holds these mappings in its
respective DNS database.
On the DNS tab, you can configure multiple interfaces for
DNS forwarding. You can also configure multiple Dynamic
DNS interfaces using multiple Dynamic DNS services.
-- Add Service You can use multiple services as long MTU Enter the MTU (Maximum Transmission Unit)
as they use the same protocol. To add another DDNS value, which is the maximum packet size (in bytes) that a
service, click Add Service. Then configure a new set of network interface can transmit. The default is 1492 for the
DDNS service settings (except for the Protocol setting). PPPoE connection.
Add DDNS Interface You can use multiple DDNS DNS 1 Enter the IP address of the primary remote access
interfaces. To add another interface for DDNS service, click DNS server that your PPPoE client will use.
Add DDNS Interface. Then configure a new set of DDNS DNS 2 Enter the IP address of the secondary remote
interface settings. access DNS server.
You can click Delete to delete the DDNS configuration. Interface Select the appropriate interface that the
Click Apply to save your changes, or click Cancel. EdgeRouter will listen to so it can forward PPPoE requests.
You can click Force Update to initiate an update of the Add Listen Interface You can select multiple interfaces.
devices IP address on the DDNS server. To add another interface for PPPoE connections, click
Add Listen Interface. From the new Interface dropdown
PPPoE menu, select the appropriate interface.
The EdgeRouter can function as a PPPoE (Point-to-Point Click Save to apply your changes, or click Cancel.
Protocol over Ethernet) server so a remote PPPoE client
can establish a tunnel to the EdgeRouter for network
access.
PPPoE Server
Chapter 8: VPN Client IP pool range start The client IP pool is the pool
of IP addresses that remote VPN clients will use. Enter the
The VPN tab displays status information about PPTP and starting IP address of the range (this address must in a /24
IPsec VPN options. You can also configure these options. subnet).
Any setting marked with a blue asterisk * is required. Client IP pool range stop Enter the last IP address of the
When the information icon is displayed, you can click range.
the icon for more information about an option. Server outside address Enter the IP address that VPN
You have two sub-tabs: clients will connect to; this is the outside or external
PPTP Remote Access Configure the EdgeRouter as a address of the PPTP server.
PPTP VPN server. RADIUS server IP address The RADIUS (Remote Access
IPsec Site-to-Site Configure the EdgeRouter as a peer Dial-In User Service) server provides authentication to
router for a basic IPsec site-to-site VPN tunnel. help secure VPN tunnels. Enter the IP address of the
RADIUS server.
PPTP Remote Access RADIUS server key Enter the key shared with the RADIUS
A common type of VPN uses PPTP (Point-to-Point server.
Tunneling Protocol). The EdgeRouter can function as a MTU Enter the MTU (Maximum Transmission Unit)
PPTP VPN server so a remote VPN client can access the value, which is the maximum packet size (in bytes) that a
LAN using a PPTP VPN tunnel over the Internet. network interface can transmit. The default is 1492 for the
PPTP VPN connection.
DNS 1 Enter the IP address of the primary remote access
DNS server that your VPN client will use.
DNS 2 Enter the IP address of the secondary remote
access DNS server.
You can click Delete to delete the PPTP remote access
configuration.
Click Save to apply your changes, or click Cancel.
IPsec Site-to-Site
A common type of VPN uses IPsec (IP security protocol).
The EdgeRouter can function as a peer router so two peer
routers can create an IPsec site-to-site VPN tunnel over the
Internet. Configuration supports multiple peers, multiple
tunnels per peer, and pre-shared secrets.
Note: Any changes you save in the graphical user
interface will override any changes you made in the
CLI.
Site-to-Site Peers
Add Peer To add a site-to-site peer, click Add Peer.
Chapter 9: QoS Here are general guidelines on the expected Smart Queue
shaping performance:
The QoS tab displays status information about Smart
Queue, Basic Queue, and Advanced Queue QoS options. Model Expected Maximum Performance
You can also configure these options. Any setting marked EP-R6 100 - 250 Mbps
with a blue asterisk * is required. When the information EP-R8 120 - 330 Mbps
icon is displayed, you can click the icon for more
ER-X 100 - 250 Mbps
information about an option.
ER-X-SFP 100 - 250 Mbps
You have three sub-tabs:
Smart Queue Optimize the usage of overall WAN ERLite-3 60 - 200 Mbps
bandwidth. ERPoe-5 60 - 200 Mbps
Basic Queue Configure simple QoS policies without the ER-8 160 - 450 Mbps
complexity of the Advanced Queue feature. ERPro-8 200 - 550 Mbps
Advanced Queue Configure a hierarchical tree of queues
to implement a sophisticated bandwidth-sharing scheme. It may require some testing to find the actual threshold
in a specific environment, depending on the actual setup,
Smart Queue traffic patterns, and other conditions. The actual rate
The Smart Queue feature provides FQ-CODEL (Fair limits will be set to 95% of the specified value, so you can
Queuing with Controlled Delay) + HTB (Hierarchical Token experiment with different values if necessary.
Bucket) function and supports dynamic interfaces, even if Each smart queue policy applies to one interface. You can
the dynamic interfaces do not exist yet (the policy will be configure multiple policies for different interfaces.
applied later when the interface comes up).
Note: The Smart Queue feature conflicts with the
The HTB rate limiting is computation-intensive, so the rate
existing traffic policy configuration, so the two
limiting will not work well (cannot achieve the specified
should not be applied to the same interface at the
rate) above a certain threshold rate. The actual threshold
same time.
(applied to the sum of the upload and download rates)
depends on the specific model and conditions of the
actual environment.
Here is another example.The Show burst settings option Burst Size Displayed if Show burst settings is enabled.
is enabled, so the Basic Queue sub-tab shows the Enter the amount of data that can burst at best-effort in
burst rate/size settings for each direction. bytes, from source to destination. Examples: 1200, 5k, or
The first queue specifies the following: 12m.
P2P traffic (as identified by the DPI feature) for the host, Queue Type Select the appropriate queue type:
192.168.100.101 -- FQ_CODEL FQ-CODEL (Fair Queuing with Controlled
2 Mbps upload rate limit, allowing bursting up to Delay) is designed to provide equal service for all
3Mbps for 1 MB of data traffic flows while minimizing delays.
10 Mbps download rate limit (bursting up to 15 Mbps -- HFQ Host Fairness Queueing (HFQ) provides
for 5 MB) simplified policy setup for scenarios in which all
hosts of a specific subnet share the same policy. The
FQ-CODEL in both directions EdgeRouter automatically applies the specified policy
The second queue specifies the following: to every host in the specified subnet.
upload rate limit of 30 Mbps (with FQ-CODEL) for the If you selected HFQ, then you have additional settings
192.168.1.0/24 network to configure:
download (reverse) rate limit of 60 Mbps (with HFQ), Subnet Enter the IP address of the subnet.
each client in the 192.168.1.0/24 subnet has Max Rate Enter the bandwidth limit per host in bits
adownload rate limit of 1 Mbps, bursting up to per second, from source to destination. Examples:
1.5Mbps for 500 KB 1200, 5k, or 12m.
ID Select Source IP or Destination IP.
Burst Rate Enter the rate at which data can burst at
best-effort per host in bits per second, from source
to destination. Examples: 1200, 5k, or 12m.
Burst Size Enter the amount of data that can burst
at best-effort per host in bytes, from source to
destination. Examples: 1200, 5k, or 12m.
Root nodes
Branch nodes
Leaf nodes
Add Leaf This option creates a leaf node associated with
a root node. Click the text next to the node that the added
User Interface node will be attached to. Then select Add Leaf. Proceed to
The Advanced Queue tab allows you to set up the the appropriate section: Add Leaf on page 57.
root/branch/leaf nodes, filters, and queue types using an
intuitive graphical user interface. The diagram allows for
the following interactions:
Drag and Drop Drag and drop a node so you can move
a branch node from one root node to another.
Pan Pan the tree of queues by dragging it with your
mouse.
Center Click a node to center the diagram around
thatnode.
Zoom Use your mouse wheel to zoom in or out.
Delete This option deletes a node, as well as all of its Show Filters
descendants and corresponding filters. Click the text next
to the node icon. Proceed to the appropriate section:
Delete on page 58.
-- Protocol
-- DSCP Enter the IP DSCP (Differentiated Services Code
Point) value. The valid range is 0 to 63. No restrictions on protocols Match packets of all
protocols.
802.1p Class of Service TOS Range DSCP Range WME Category Choose a protocol by name Select the protocol
from the drop-down list. Match packets of this
0 Best Effort 0x00-0x1f 0-7 Best Effort
protocol.
1 Background 0x20-0x3f 8-15 Background
Enter the appropriate decimal or hexadecimal Description Enter keywords to describe the traffic class.
value. The valid decimal range is 0 to 255. The valid Bandwidth Enter the bandwidth limit, and select the
hexadecimal range is 0x0 to 0xff. appropriate unit of measurement: bits/sec, Kbits/sec, or
Mbits/sec.
Note: Advanced users can use a higher value than
255 or 0xff; however, proceed with caution. Click Save to apply your changes, or click Cancel.
Click Save to apply your changes, or click Cancel. Note: To change the parent of a branch node,
drag the branch node to the desired parent node.
Interface The corresponding filters will also be deleted.
Add Leaf
Queue Type Select the queue type for this class. Go to Proceed to the appropriate instructions for your queue
Queue Types on page 58 for more information. type.
Description Enter keywords to describe the traffic class. A table displays the following information about each
Bandwidth Enter the guaranteed bandwidth, and queue type. Click a column heading to sort by that
select the appropriate unit of measurement: bits/sec, heading.
Kbits/sec, or Mbits/sec. Name The identifier of the queue type is displayed.
Ceiling Enter the bandwidth ceiling (maximum Type The queue type is displayed.
allowed bandwidth), and select the appropriate unit of
measurement: bits/sec, Kbits/sec, or Mbits/sec.
Burst Rate Enter the maximum data rate that can
burst at best-effort, and select the unit of meaurement:
bits/sec, Kbits/sec, or Mbits/sec.
Burst Size Enter the maximum amount of data that can
burst at best-effort, and select the unit of measurement:
bytes, Kbytes, or Mbytes, or Gbytes. FQ_CODEL
Click Save to apply your changes, or click Cancel. FQ-CODEL (Fair Queuing with Controlled Delay) is
designed to provide equal service for all traffic flows while
Note: To change the parent of a leaf node, drag minimizing delays.
the leaf node to the desired parent node.
Delete
Click Yes to delete the node and all nodes and filters
attached to it, or click No to cancel.
Queue Types Name Enter a unique identifier for this queue type.
Queueing determines how the EdgeRouter prioritizes Type FQ_CODEL is displayed.
traffic. You can create multiple queue types that use Target Enter the minimum queue delay, and select the
different algorithms to manage traffic. unit of measurement: microseconds (s), milliseconds
Note: The Queue Types option does not apply to root (ms), or seconds. The valid range is 10 s to 10 s.
or branch nodes. Interval When the minimum queue delay has
exceeded the Target for longer than the configured
Search Allows you to search for specific text. Begin Interval, the EdgeRouter will enter drop mode. Enter
typing; there is no need to press enter. The results are the time interval, and select the unit of measurement:
filtered in real time as soon as you type two or more microseconds (s), milliseconds (ms), or seconds. The
characters. valid range is 1 ms to 20 s.
Add Queue Type To add a queue type, click Add Queue ECN Select this option if you want to mark packets
Type and select one of the following options: instead of dropping them. Enabled by default.
FQ_CODEL on page 58 Flows Enter the number of flows into which the
HFQ on page 59 incoming packets are classified. The valid range is 1 to
SFQ on page 59 65535.
PFIFO on page 59 Limit Enter the hard limit on the real queue size. The
valid range in number of packets is 1 to 1000000.
Quantum Enter the packet scheduling quantum for
FQ_CODEL. The valid range in bytes is 256 to 65535.
Click Save to apply your changes, or click Cancel.
Configuration Example
Here is an example:
1. In the Configuration section, click custom-attribute.
2. Click Add to add a custom attribute.
3. In the custom-attribute field, enter the name you want The configuration has been saved.
to use. You have two options:
To add another custom attribute, click Add.
To remove a custom attribute, click Remove.
Note: Type validation for generic types (such as text,
numbers, and IP addresses) is used for fields.
5. Click Preview.
Setup Wizards
There are four types of setup wizards:
Basic Setup (see below)
Load Balancing Wizards on page71
Switch Wizard (ER-X, ER-X-SFP, or EP-R6) on
page76
SOHO Deployment Wizards on page77
Basic Setup
The setup wizard will guide you through a typical Small
Office Home Office (SOHO) deployment:
Configures the Internet connection and NAT
masquerade for the Internet port
Static IP Select this option if your ISP has assigned
Configures eth0 as the WAN port
static network settings to your network.
Enables default firewall settings for the Internet port
-- Address Enter the IP address in the first field and the
Enables DHCP server functionality for local networks subnet mask or prefix length in the second field.
Automatically enables DNS (Domain Name System) -- Gateway Enter the IP address of the ISPs gateway
forwarding for local networks server, which provides the point of connection to the
Automatically enables TCP MSS (Maximum Segment Internet.
Size) clamping for a PPPoE (Pointto-Point over Ethernet) -- DNS server Enter the IP address of the ISPs DNS
connection server.
Bridges the LAN interfaces and/or change the subnets
configured on the LAN interfaces
Configure user accounts during setup
Before You Begin
You can still use the Basic Setup wizard even if the
EdgeRouter is already configured. The Basic Setup setup
wizard will replace the entire configuration and require a
reboot when the new configuration is applied.
Note: The Basic Setup wizard is the same as the
WAN+2LAN2 wizard.
Overview
Click the Basic Setup wizard to begin the SOHO
configuration.
Note: The Basic Setup wizard is designed to set PPPoE Select this option if your ISP uses PPPoE.
up a basic SOHO network. For full configuration
-- Account Name Enter the name of your PPPoE
functionality, use the other tabs of the EdgeOS
account.
Configuration Interface or the Command Line
Interface (CLI). -- Password Enter the password of your PPPoE account.
Internet Port (eth0)
Connect eth0 to your Internet connection.
Internet connection type Select the Internet connection
type your network is using.
DHCP Select this option if your ISP automatically
assigns network settings to your network.
User Setup
You can set up the username and password for the new
EdgeRouter configuration.
User Select one of the following options:
Use default user Replace the default user, ubnt.
-- User Enter a new admin username. Click Apply to save your changes, or click Cancel.
-- Password Enter a new password.
Load Balancing Wizards
-- Confirm Password Enter the new password again.
There are two load balancing setup wizards available:
Load Balancing The Load Balancing setup wizard sets
up basic load balancing and failover using two different
Internet connections. You can also configure user
accounts during setup. Go to the Load Balancing Wizard
section below.
Load Balancing2 The Load Balancing2 setup wizard
sets up basic load balancing and failover using two
different wireless links. You can also configure user
accounts during setup. Go to Load Balancing2
Wizard on page75.
Load Balancing Wizard
Before You Begin
Create new admin user Create a new admin user and
remove the default user, ubnt. Complete the following: Use the Load Balancing setup wizard to set up basic load
balancing with two Internet connections from different
-- User Enter a new admin username.
Internet Service Providers (ISPs).
-- Password Enter a new password.
The Load Balancing setup wizard will replace the entire
-- Confirm Password Enter the new password again. configuration and require a reboot when the new
configuration is applied.
Overview
Click the Load Balancing setup wizard to begin.
Go to Load Balancing on page72 unless you have
the ERPoe-5, then go to Load Balancing > ERPoe-5 on
page75.
Load Balancing
First Internet Port (eth0)
Connect eth0 to your Internet connection.
Internet connection type Select the first Internet
connection type your network is using.
DHCP Select this option if your ISP automatically
assigns network settings to your network.
User Setup
You can set up the username and password for the new
EdgeRouter configuration.
User Select one of the following options:
Use default user Replace the default user, ubnt.
-- User Enter a new admin username. LAN-to-LAN Exclusion
-- Password Enter a new password. The LAN-to-LAN exclusion feature excludes LANtoLAN
-- Confirm Password Enter the new password again. traffic from load-balancing. Click configure this section to
manage this feature.
The load balancing feature creates new routing tables for
the WAN interfaces to use. This works well for LANtoWAN
traffic; however, you do not want to load-balance traffic
that is going from LAN to LAN. We recommend that you
create a firewall/NAT group for the LAN networks and add
a rule to the appropriate firewall policy, so this group uses
the main routing table for LANtoLAN destinations. Refer
to Firewall/NAT on page27 for more information.
Note: The LAN networks rule must precede the
loadbalance rule.
LAN-to-LAN exclusion This option excludes LANtoLAN
traffic from load-balancing. Enabled by default.
Create new admin user Create a new admin user and
remove the default user, ubnt. Complete the following:
-- User Enter a new admin username.
-- Password Enter a new password.
-- Confirm Password Enter the new password again.
Target Network
(interface) Select the appropriate interface.
(network address) Enter the IPv4 address with
subnet mask or prefix for the target network. Example:
192.0.3.1/24
First Link Static IP Select this option to set a static management
(interface) Select the appropriate interface. IP address and other network settings.
(network address) Enter the IPv4 address with subnet -- Address Enter the IP address in the first field and the
mask or prefix for the first wireless link. Example: subnet mask or prefix length in the second field.
192.0.1.1/24 -- Gateway Enter the IP address of the ISPs gateway
server, which provides the point of connection to the
Second Link
Internet.
(interface) Select the appropriate interface.
-- DNS server Enter the IP address of the ISPs DNS
(network address) Enter the IPv4 address with subnet server.
mask or prefix for the second wireless link. Example:
192.0.2.1/24
Failover Only
(checkbox) Disabled by default. Select this option if you
want to use the second link only if the first link fails.
First Link Nexthop
(next hop address) Enter the next hop IPv4 address
for the first wireless link (address on the corresponding
interface of the other router). Example: 192.0.1.2
Second Link Nexthop
(next hop address) Enter the next hop IPv4 address for
the second wireless link (address on the corresponding
interface of the other router). Example: 192.0.2.2
Click Apply to save your changes, or click Cancel.
VLAN Aware Create new admin user Create a new admin user and
remove the default user, ubnt. Complete the following:
Enabled Starting with EdgeOS v1.8.5, the per-port
VLAN feature is available. If this option is enabled, then -- User Enter a new admin username.
untagged and tagged VLANS can be set for each port in -- Password Enter a new password.
switch mode. If this option is kept disabled (default), then
-- Confirm Password Enter the new password again.
the switch ports will pass all VLANs automatically (simple
layer-2 switching with no per-port VLAN).
Switch Ports
If VLAN Aware is enabled, then configure the following
options for each switch port.
pvid Enter the Port Virtual Local Area Network (VLAN)
ID. The valid range is 1 to 4087.
vid Enter the Virtual Local Area Network (VLAN) ID.
Multiple VIDs are allowed; separate the VIDs with a
comma. The valid range is 1 to 4087.
There are two SOHO deployment setup wizards available: Address The IP address is displayed in the first field,
WAN+2LAN The WAN+2LAN setup wizard is the most and the subnet mask or prefix length is displayed in the
basic version available. The WAN port is eth1. Go to the second field.
WAN+2LAN Wizard section below. DHCP Select this checkbox to have the EdgeRouter assign
WAN+2LAN2 The WAN+2LAN2 setup wizard allows you IP addresses.
to bridge the LAN interfaces and/or change the subnets Internet Port (eth1)
configured on the LAN interfaces. The WAN port is eth0. Connect eth1 to your Internet connection.
You can also configure user accounts during setup. Go
to WAN+2LAN2 Wizard on page80. Internet connection type Select the Internet connection
type your network is using.
Note: The WAN+2LAN2 wizard is the same as the DHCP Select this option if your ISP automatically
Basic Setup wizard. assigns network settings to your network.
WAN+2LAN Wizard
Before You Begin
If the EdgeRouter is already configured, then the
WAN+2LAN setup wizard is not available. It is available only
if the EdgeRouter uses its default configuration.
You can reset the EdgeRouter to its factory defaults using
the EdgeOS Configuration Interface:
System Tab Refer to Reset Config to Default on
page7 for instructions. Static IP Select this option if your ISP has assigned
Wizards Tab Click the WAN+2LAN setup wizard in the static network settings to your network.
column on the left. The following window will appear. -- Address Enter the IP address in the first field and the
subnet mask or prefix length in the second field.
-- Gateway Enter the IP address of the ISPs gateway
server, which provides the point of connection to the
Internet.
-- DNS server Enter the IP address of the ISPs DNS
server.
Click Reset to Default Conguration and then follow the on-screen
instructions.
Overview
Click the WAN+2LAN setup wizard to begin the SOHO
configuration.
Go to the WAN+2LAN section below unless you have
the ERPoe-5, then go to WAN+2LAN > ERPoe-5 on
page79.
Note: The WAN+2LAN setup wizard is designed to
set up a basic SOHO network. For full configuration
functionality, use the other tabs of the EdgeOS
Configuration Interface or the Command Line
PPPoE Select this option if your ISP uses PPPoE.
Interface (CLI).
-- Account Name Enter the name of your PPPoE
WAN+2LAN account.
LAN Port (eth0)
-- Password Enter the password of your PPPoE account.
Connect eth0 to your local network, such as a switch.
show password Select to display the password in
plaintext.
Address Enter the IP address in the first field, and enter If Bridging is enabled, then go to the LAN ports (eth1, eth2,
the subnet mask or prefix length in the second field. eth3, and eth4) section below.
DHCP Select this checkbox to have the EdgeRouter assign (Optional) Secondary LAN Port (eth1)
IP addresses. If Bridging is disabled, connect eth1 to your local network,
(Optional) Secondary LAN port (eth2) such as a switch. Then click configure this section.
If Bridging is disabled, you can connect eth2 to your
secondary local network. Then click configure this
section.
Address Enter the IP address in the first field, and enter
the subnet mask or prefix length in the second field.
DHCP Select this checkbox to have the EdgeRouter assign
IP addresses. Address Enter the IP address in the first field, and enter
the subnet mask or prefix length in the second field.
DHCP Select this checkbox to have the EdgeRouter assign
IP addresses.
LAN Ports (eth2, eth3, and eth4)
If Bridging is disabled, connect eth2, eth3, and/or eth4
to your devices and/or a switch. (The eth2, eth3, and/or
LAN Ports (eth1 and eth2) eth4 become switch ports for a local network.) Then click
If Bridging is enabled, connect the local ports to your configure this section.
devices and/or a switch that connects to additional
devices. Then click configure this section.
(_) If this field is blank, then the entry was created UPnP
dynamically from a DHCP dynamic lease. If this field
Instead of manually configuring port forwarding rules, you
displays static-IP, then the entry stems from a static
can use UPnP for automatic port forwarding when you
mapping configured via the DHCP server configuration
have hardware that supports UPnP.
(see Static MAC/IP Mapping on page41 for more
information). Click the UPnP feature wizard to begin configuration.
Click Apply to save your changes, or click Cancel. Set Up UPnP Interfaces
TCP MSS Clamping Add New Click Add New to create a new UPnP interface.
TCP MSS (Maximum Segment Size) clamping is typically Internal interface Select the appropriate LAN interface
used when Path MTU Discovery is not working properly. from the drop-down menu. (If you select Other, then
enter the interface name in the field provided.)
Using ICMP messages, Path MTU Discovery determines
the highest allowable MTU (Maximum Transmission External interface Select the appropriate WAN
Unit) of traffic traveling between two hosts to avoid interface from the drop-down menu. (If you select
fragmentation. Other, then enter the interface name in the field
provided.)
TCP uses MSS, which is the MTU minus the IP and TCP
headers. The sender should limit its data so it does not Remove Click Remove to delete a UPnP interface.
exceed the MSS reported by the receiver. Add New Click Add New to create another new UPnP
Sometimes security firewalls or other issues interfere interface.
with the Path MTU Discovery process (for example, ICMP
messages are blocked), so you can use a workaround,
TCP MSS clamping, which sets the MSS value for all TCP
connections.
Click the TCP MSS Clamping feature wizard to begin
configuration.
TCP MSS Clamping
Enable MSS clamping for TCP connections Select this
option to specify the MSS value for TCP connections. Click Apply to save your changes, or click Cancel.
Interface Types Select which interface types use MSS VPN Status
clamping: PPPoE, PPTP, Tun, or VTI. All are enabled by Click the VPN status feature wizard to display the status of
default. your IPsec site-to-site VPN tunnels. For information about
MSS Enter the MSS value to use; 1412 is the default. configuration, go to IPsec Site-to-Site on page46.
VPN Status List
Name Displays the descriptive name of the VPN tunnel.
Peer IP Displays the IPv4/IPv6 address of the peer router.
IKE Displays the IKE (Internet Key Exchange) encryption
method, hash algorithm, DH group, and lifetime in this
format:
<encryption>-<hash>-<group>-<lifetime>
Status Displays the status of the VPN tunnel.
The following tools are available: Destination Host/IP Enter the IP address.
Ping Packet Count Enter the number of packets to send for
Bandwidth the ping test.
Trace Packet Size Specify the size of the packet.
Discover Run Test Click this button to start the test.
Packet Capture Packet loss statistics and latency time evaluation are
Log Monitor displayed after the test is completed.
Sender
Receiver IP Enter the IP address. Receiver
Show advanced settings Click to display settings for
advanced users.
Duration (s) Enter the length of time in seconds.
Protocol Select the appropriate protocol, TCP or UDP.
-- UDP Bandwidth If you use UDP, then this option is
available. Enter the bandwidth to use.
Run Test Click this button to start the test as the receiver.
Parallel flows (1-20) If you want to increase the stress
or saturate the link, enter the number of connections or The bandwidth results are displayed in Mbps after the test
streams that will run simultaneously. is completed.
Reverse direction Select this option to reverse the Trace
direction of the data flow.
The Trace tool traces the hops from the EdgeRouter to a
TCP window size (KBytes) Enter the TCP window size, specified outgoing IP address. Use this tool to find the
which is the maximum amount of data that can be sent route taken by ICMP packets across the network to the
without an acknowledgement. destination host.
Hide advanced settings Click to hide settings for Click Trace, and the Trace screen appears:
advanced users.
Run Test Click this button to start the test as the sender.
Discover
The Discover tool searches for all Ubiquiti devices on your
network. The Search field automatically filters devices
containing specified names or numbers as you enter
them.
Click Discover, and the Discover screen appears:
Packet Capture
Capture packets traveling through the specified interface
for analysis. You can set up filters to capture the specific
types of packets you are seeking.
Click Packet Capture, and the Packet Capture screen
appears:
All/eth_ Select which interface to search, or select All.
The tool reports the number of Discovered and Displayed
Ubiquiti devices. A table displays the following
information about each Ubiquiti device. Click a column
heading to sort by that heading.
Interface The EdgeRouter interface used by the device is
displayed.
Hardware Address The MAC address of the device is
displayed.
Device Name The name assigned to the device is
displayed.
Interface Enter the name of the interface.
Product Name The Ubiquiti name of the device is
displayed. Packet Limit Enter the number of packets to capture. The
maximum number is 150.
IP Address The IP address of the device is displayed. You
can click it to access the devices configuration through its Resolve addresses Select this option to resolve the IP
web management interface. addresses symbolically (as names) instead of numerically.
For more information, click the arrow to view the Filter
following: Protocol Enter the protocol to filter.
Firmware Version The version number of the devices Address Enter the address to filter.
firmware is displayed.
Port Enter the port number to filter.
Uptime The duration of the devices activity is
Negate filter Check this box to capture all packets
displayed.
except for the ones matching the selected filter(s).
Addresses The addresses of the devices interface are
Start Click this button to start the capture. (If a Packet
displayed. If the device has more than one interface,
Limit is not specified, then this button becomes a Stop
addresses for each interface are displayed.
button during the capture.)
-- hwaddr The MAC address of the devices interface is
Capture results are displayed with Time and Packet
displayed.
descriptions.
-- ipv4 The IP address of the devices interface is
displayed.
Log Monitor
The Log Monitor is a log displaying live updates.
Click Log Monitor, and the System Log Monitor screen
appears:
Click the pause button to stop the live updates. Click the
play button to resume the live updates.
The System log messages table displays the following
information about each log. Click a column heading to
sort by that heading.
Time The system time is displayed next to every log entry
that registers a system event.
Message A description of the system event is displayed.
community.ubnt.com/edgemax
5. At the Password prompt, enter the password (the 3. For help with commands, you can either press the ? key
default is ubnt). or enter show and press the ? key.
6. For help with commands, you can either press the ? key
Note: To enhance security, we recommend that you
or enter show and press the ? key.
change the default login using at least one of the
following options:
Set up a new user account (preferred option).
For details, go to Remove the Default User
Account on page 93.
Change the default password of the ubnt login.
Use the set command as detailed in Remove the
Default User Account on page 93.
Note: Upon initial login, a host key will be 4. At the Password prompt, enter the password (the
displayed. You will be asked to confirm that you default is ubnt).
want to save the host key to the local database.
Click Yes to bypass this message in the future.
At the Password prompt, enter the password (the default
is ubnt).
5. For help with commands, you can either press the ? key
or enter show and press the ? key.
Change the default password of the ubnt login. Note: The question mark does not display
Use the set command as detailed in Remove the onscreen.
Default User Account on page 93.
add delete ping6 reset terminal
Access Using the EdgeOS Configuration clear disconnect reboot restart traceroute
Interface configure generate release set traceroute6
connect initial-setup remove show undebug
Each tab of the EdgeOS interface contains CLI access. copy no rename shutdown
1. At the top right of the screen, click the CLI
. debug ping renew telnet
2. The CLI window appears. At the login prompt, enter the Enter show and press the ? key to view the settings that
username (the default is ubnt). you have configured.
ubnt@ubnt:~$ show
arp flow-accounting nat tech-support
bridge hardware ntp ubnt
configuration history openvpn users
date host pppoe-server version
debugging incoming queueing vpn
dhcp interfaces reboot vrrp
dhcpv6 ip route-map webproxy
disk ipv6 shutdown zebra
3. At the Password prompt, enter the password (the dns lldp snmp
default is ubnt). file log system
firewall login table
For example, type show interfaces to display the
interfaces and their status information.
ubnt@ubnt:~$ show interfaces
Codes: S - State, L - Link, u - Up, D - Down,
A - Admin Down
Interface IP Address S/L Description
--------- ---------- --- -----------
eth0 - u/u
4. For help with commands, you can either press the ? key eth1 - u/D
or enter show and press the ? key. eth2 - u/D
lo 127.0.0.1/8 u/u
To properly shut down the EdgeRouter, use the shutdown
command.
ubnt@ubnt:~$ shutdown
For the show, set, and delete commands, you can press the ubnt@ubnt# set interfaces ethernet eth0 address
? key for help. Possible completions:
set ? View the available commands. <x.x.x.x/x> IP address and prefix length
<h:h:h:h:h:h:h:h/x> IPv6 address and prefix length
show ? View the settings that you have configured. dhcp Dynamic Host Configuration Protocol
(Because configurations vary, the list you see will differ dhcpv6 Dynamic Host Configuration Protocol
from the sample list displayed below.) for IPv6
[edit]
delete ? View the settings that you can delete. ubnt@ubnt# set interfaces ethernet eth0 address
10.1.1.80/23
Enter show and press the ? key.
[edit]
ubnt@ubnt# show
ubnt@ubnt# set interfaces ethernet eth0 description
firewall interfaces protocol service system production LAN
[edit] These changes affect the working configuration, not the
To display the available command completions, press the active configuration. To see what changes have been
tab key. made to the working configuration, use the compare
command:
Note: The tab does not display on-screen. ubnt@ubnt# compare
[edit interfaces ethernet eth0]
ubnt@ubnt# show +address 10.1.1.2/24
Possible completions: +description production LAN
firewall Firewall [edit]
interfaces Network interfaces
To make the changes active, use the commit command:
protocols Routing protocol parameters
ubnt@ubnt# commit
service Services
[edit]
system System parameters
The EdgeRouter uses three configurations: If you reboot the EdgeRouter, the changes will be lost. To
save these changes, use the save command to save the
Working When you make changes to the working
active configuration to the boot configuration.
configuration, they are not applied until you commit the
ubnt@ubnt# save
changes to the active configuration. Saving configuration to /config/config.boot...
Active When you commit changes to the active Done
configuration, they are applied; however, the changes [edit]
do not become part of the boot configuration until you ubnt@ubnt# exit
save the changes to the boot configuration. exit
ubnt@ubnt:~$
Boot When the EdgeRouter reboots, it loads the boot ubnt@ubnt:~$ show interfaces
configuration for use. Codes: S - State, L - Link, u - Up, D - Down,
The following scenarios cover some of the most A - Admin Down
Press the ? or tab key to display options for the specified To return to the top edit level, use the top command:
edit level. ubnt@ubnt# top
ubnt@ubnt# set [edit]
ubnt@ubnt# compare
action disable ipsec p2p source time
description fragment limit protocol state [edit firewall]
destination icmp log recent tcp +name TEST{
[edit firewall name TEST rule 10] + default-action drop
ubnt@ubnt# set description allow icmp + enable-default-log
[edit firewall name TEST rule 10] + rule 10 {
ubnt@ubnt# set action accept + action accept
[edit firewall name TEST rule 10] + description allow icmp
ubnt@ubnt# set protocol icmp + protocol icmp
[edit firewall name TEST rule 10] + }
+}
To show changes within the edit level, use the compare
[edit]
command:
ubnt@ubnt# compare To display the existing firewall rule, use the show firewall
[edit firewall name TEST rule 10] command:
+action accept ubnt@ubnt# show firewall
+description allow icmp name WAN1_LOCAL {
+protocol icmp default-action drop
[edit firewall name TEST rule 10] rule 10 {
action accept
To move up an edit level, use the up command:
state {
ubnt@ubnt#up
established enable
[edit firewall name TEST]
related enable
ubnt@ubnt# compare
}
[edit firewall name TEST]
}
+default-action drop
rule 20 {
+enable-default-log
action drop
+rule 10 {
state {
+ action accept
invalid enable
+ description allow icmp
}
+ protocol icmp
}
+}
rule 30 {
[edit firewall name TEST]
action accept
ubnt@ubnt# up
destination {
[edit firewall]
port 22
ubnt@ubnt# compare
}
[edit firewall]
protocol tcp
+name TEST {
}
+ default-action drop
}
+ enable-default-log
[edit]
+ rule 10 {
+ action accept To create a new firewall rule from an existing firewall rule,
+ description allow icmp use the copy command.
+ protocol icmp ubnt@ubnt# edit firewall
+ } [edit firewall]
+} ubnt@ubnt# copy name WAN1_LOCAL to name WAN2_LOCAL
[edit firewall] [edit firewall]
ubnt@ubnt# commit
[edit firewall]
ubnt@ubnt#top
[edit]
ubnt@ubnt#show firewall
name WAN1_LOCAL {
default-action drop
rule 10 {
action accept
state {
established enable
related enable
}
}
Scenario: In the midst of the administrator changing an You can also keep a specified number of revisions
IPsec tunnel into an OpenVPN tunnel, the administrator of the configuration file on the local disk. Use the
had to revert the EdgeRouter to its previous configuration commitrevisions configuration option.
with the IPsec tunnel. ubnt@RTR# set system config-management commit-revisions
50
1. Before making changes, the administrator saved a [edit]
backup configuration file with a working IPsec tunnel ubnt@RTR# commit
configuration: [edit]
ubnt@RTR# save config.boot-ipsec
Here is an example that uses the commit-revisions
Saving configuration to /config/config.boot-ipsec...
Done
command:
ubnt@RTR# set system login user joe authentication
[edit]
plaintext-password secret
Note: This is a backup; if the EdgeRouter were [edit]
rebooted, it would still boot from the default file: ubnt@RTR# commit
/config/config.boot [edit]
2. After the administrator deleted the IPsec configuration ubnt@RTR# save; exit
Saving configuration to /config/config.boot...
and was configuring of the OpenVPN tunnel,
Done
circumstances changed so that the IPsec tunnel was
exit
required again. Consequently, the administrator
reverted the EdgeRouter to its previous configuration ubnt@RTR:~$ show system commit
with the IPsec tunnel. 0 2012-08-17 18:32:13 by ubnt via cli commit
ubnt@RTR# load config.boot-ipsec 1 2012-08-17 18:31:52 by ubnt via cli commit
Loading configuration from 2 2012-08-17 18:31:51 by root via init commit
/config/config.boot-ipsec...
Note: The following commands require that the
Load complete. Use commit to make changes active.
[edit]
configuration option, commit-revisions, be set first.
ubnt@RTR# commit show system commit diff commit-confirm
[edit] show system commit file confirm
show system commit rollback
ubnt@RTR# save; exit
commit comment
Saving configuration to /config/config.boot...
Done For details on the commit-revisions option, go to
exit Manage the Configuration File on page 95.
ubnt@RTR:~$
To display the changes in revision 0, use the show system
To automatically make a remote backup after every commit diff command.
commit, use the commit-archive configuration option, ubnt@RTR:~$ show system commit diff 0
enter location, and press the ? key. [edit system login]
ubnt@RTR# set system config-management commit-archive +user joe {
location + authentication {
Possible completions: + encrypted-password
<url> Uniform Resource Identifier $1$CWVzYggs$NyJXxC3S572rfm6pY8ZMO.
+ plaintext-password
Detailed information:
+ }
scp://<user>:<passwd>@<host>/<dir> + level admin
ftp://<user>:<passwd>@<host>/<dir> +}
tftp://<host>/<dir>
To display the entire configuration file for revision 0, use
ubnt@RTR# set system config-management commit-archive
location tftp://10.1.0.15/RTR the show system commit file command.
[edit] ubnt@RTR:~$ show system commit file 0
ubnt@RTR# commit To add a comment to the commit, use the comment
Archiving config... command.
tftp://10.1.0.15/RTR OK ubnt@RTR# set system login user joe level operator
[edit] [edit]
On the remote tftp server, a copy with the hostname and ubnt@RTR# commit comment change joe from admin to op
date is saved for each commit. [edit]
admin2@server://tftpboot/RTR$ ls -l ubnt@RTR# save; exit
total 8 Saving configuration to /config/config.boot...
-rw------- 1 nobody nogroup 908 Aug 17 17:19 Done
config.boot-RTR.20120817_171932 exit
-rw------- 1 nobody nogroup 874 Aug 17 17:20
config.boot-RTR.20120818_002046
Now you will see the comment when you use the show ubnt@RTR:~$ show system commit
system commit command. 0 2012-08-21 14:46:41 by admin_5 via cli
ubnt@RTR:~$ show system commit fix bgp policy maps
1 2012-08-21 14:45:59 by admin_5 via cli
0 2012-08-17 18:44:41 by ubnt via cli change joe commit
from admin to op
2 2012-08-21 14:45:33 by admin_5 via cli
1 2012-08-17 18:34:01 by ubnt via cli commit fix port forwarding
2 2012-08-17 18:32:13 by ubnt via cli commit 3 2012-08-21 14:45:15 by admin_5 via cli
3 2012-08-17 18:31:52 by ubnt via cli commit fix firewall
4 2012-08-17 18:31:51 by root via init commit 4 2012-08-21 14:44:29 by ubnt via cli
commit
When you work on a remote router, certain changes,
5 2012-08-21 14:21:15 by ubnt via cli
such as a firewall or NAT rule, can cut off access to the add port forward for port 2222 to build-server
remote router, so you then have to visit the remote router 6 2012-08-21 14:20:24 by ubnt via cli
and reboot it. To avoid such issues when you make risky add dmz interface to eth2
changes, use the commit-confirm command first. Then 7 2012-08-21 14:19:53 by ubnt via cli
use the confirm command to save your changes. add ipsec tunnel to office_exchange
8 2012-08-21 14:07:18 by ubnt via cli
ubnt@RTR:~$ configure
add firewall for WAN_IN
[edit] 9 2012-08-21 14:06:37 by ubnt via cli
ubnt@RTR# set firewall name WAN_IN rule 50 action drop add user first_last
[edit] 10 2012-08-21 14:04:47 by ubnt via cli
ubnt@RTR# set firewall name WAN_IN rule 50 destination commit
address 172.16.0.0/16 11 2012-08-21 14:04:46 by root via init
[edit] commit
ubnt@RTR# commit-confirm After viewing the history of system commits, you decide
commit confirm will be automatically reboot in to discard the last four commits by admin_5. Roll back the
10minutes unless confirmed system configuration file to commit 4:
Proceed? [confirm][y]
ubnt@RTR# rollback 4
[edit]
Proceed with reboot? [confirm] [y]
After you verify that the changes should be saved, use the
Broadcast message from root@RTR (ttyS0) (Mon Aug 21
confirm command. 15:09:12 2012):
ubnt@RTR# confirm
[edit] The system is going down for reboot NOW!
Appendix B: Contact
Information
Ubiquiti Networks Support
Ubiquiti Support Engineers are located around the world
and are dedicated to helping customers resolve software,
hardware compatibility, or field issues as quickly as
possible. We strive to respond to support inquiries within
a 24-hour period.
Ubiquiti Networks, Inc.
2580 Orchard Parkway
San Jose, CA 95131
www.ubnt.com
Online Resources
Support: ubnt.link/EdgeMAX-Support
Community: community.ubnt.com/edgemax
Downloads: downloads.ubnt.com/edgemax
JL081616
2012-2016 Ubiquiti Networks, Inc. All rights reserved. Ubiquiti, UbiquitiNetworks, the Ubiquiti U logo, the Ubiquiti beam logo, airFiber, airMAX, EdgeMAX,
EdgeOS, EdgeRouter, and UniFi are trademarks of Ubiquiti Networks, Inc. in the United States and in other countries. All other trademarks are the property of
their respectiveowners.