Home: Enable DHCP server.

This commit is contained in:
Dmitry Voronin 2024-11-30 14:14:35 +03:00
parent 05b5b20f0f
commit 7e3d009248
Signed by: voronind
SSH key fingerprint: SHA256:3kBb4iV2ahufEBNq+vFbUe4QYfHt98DHQjN7QaptY9k
4 changed files with 60 additions and 74 deletions

View file

@ -1,18 +0,0 @@
{ ... }: {
systemd.network.networks = {
"10-lan" = {
matchConfig.Name = "enp5s0";
linkConfig.RequiredForOnline = "routable";
networkConfig = {
DHCP = false;
DNS = "10.0.0.1";
};
address = [
"10.0.0.7/24"
];
routes = [
{ Gateway = "10.0.0.1"; }
];
};
};
}

View file

@ -1,19 +0,0 @@
{ ... }: {
systemd.network.networks = {
"10-lan" = {
matchConfig.Name = "enp4s0";
linkConfig.RequiredForOnline = "routable";
networkConfig = {
DHCP = false;
DNS = "10.0.0.1";
# IPv6AcceptRA = true;
};
address = [
"10.0.0.3/24"
];
routes = [
{ Gateway = "10.0.0.1"; }
];
};
};
}

View file

@ -1,10 +1,9 @@
# 10.0.0.0/24 - wired clients (lan). # 10.0.0.0/24 - phys clients (lan).
# 10.1.0.0/24 - containers. # 10.1.0.0/24 - containers.
# 10.1.1.0/24 - vpn clients. # 10.1.1.0/24 - vpn clients.
# 192.168.1.0/24 - 5G wireless clients.
# 192.168.2.0/24 - 2.4G wireless clients.
{ {
config, config,
const,
lib, lib,
util, util,
... ...
@ -19,8 +18,15 @@ in {
# Disable SSH access from everywhere, configure access bellow. # Disable SSH access from everywhere, configure access bellow.
services.openssh.openFirewall = false; services.openssh.openFirewall = false;
# NOTE: Debugging.
# systemd.services."systemd-networkd".environment.SYSTEMD_LOG_LEVEL = "debug";
# Wan configuration. # Wan configuration.
# REF: https://nixos.wiki/wiki/Systemd-networkd
# SEE: man 5 systemd.network
systemd.network = { systemd.network = {
enable = true;
wait-online.enable = false; # HACK: So we can use both NM and networkd.
networks = { networks = {
"10-${wan}" = { "10-${wan}" = {
matchConfig.Name = wan; matchConfig.Name = wan;
@ -77,32 +83,52 @@ in {
address = [ address = [
"10.0.0.1/24" "10.0.0.1/24"
]; ];
routes = [
# Wifi 5G clients.
{
Destination = "192.168.1.0/24";
Gateway = wifi;
}
# Wifi 2G clients.
{
Destination = "192.168.2.0/24";
Gateway = wifi;
}
];
networkConfig = { networkConfig = {
DHCPPrefixDelegation = true; DHCPPrefixDelegation = true;
DHCPServer = true;
IPv6AcceptRA = false; IPv6AcceptRA = false;
IPv6SendRA = true; IPv6SendRA = true;
}; };
ipv6SendRAConfig = { ipv6SendRAConfig = {
# EmitDNS = false; # EmitDNS = true;
# DNS = ""; # DNS = ":self";
}; };
dhcpPrefixDelegationConfig = { dhcpPrefixDelegationConfig = {
UplinkInterface = wan;
SubnetId = 1;
Announce = true; Announce = true;
SubnetId = 1;
UplinkInterface = wan;
}; };
dhcpServerConfig = {
DNS = "10.0.0.1";
DefaultLeaseTimeSec = "12h";
EmitDNS = true;
EmitNTP = true;
EmitRouter = true;
EmitTimezone = true;
MaxLeaseTimeSec = "24h";
# PersistLeases = false;
PoolOffset = 100;
PoolSize = 150;
ServerAddress = "10.0.0.1/24";
Timezone = const.timeZone;
UplinkInterface = wan;
};
dhcpServerStaticLeases = let
mkStatic = Address: MACAddress: { dhcpServerStaticLeaseConfig = { inherit Address MACAddress; }; };
in [
# TODO: Add pocket.
(mkStatic "10.0.0.2" "9c:9d:7e:8e:3d:c8") # Wifi AP.
(mkStatic "10.0.0.3" "d8:bb:c1:cc:da:30") # Desktop.
(mkStatic "10.0.0.4" "2c:be:eb:52:53:2b") # Phone.
(mkStatic "10.0.0.5" "14:85:7f:eb:6c:25") # Work.
(mkStatic "10.0.0.6" "08:38:e6:31:54:b6") # Tablet.
(mkStatic "10.0.0.7" "2c:f0:5d:3b:07:78") # Dasha.
(mkStatic "10.0.0.8" "ac:5f:ea:ef:b5:05") # Dasha phone.
(mkStatic "10.0.0.9" "10:b1:df:ea:18:57") # Laptop.
(mkStatic "10.0.0.10" "9c:1c:37:62:3f:d5") # Printer.
(mkStatic "10.0.0.11" "dc:a6:32:f5:77:95") # RPi.
(mkStatic "10.0.0.12" "ec:9c:32:ad:bc:4a") # Camera.
];
}; };
}; };
@ -117,6 +143,10 @@ in {
}; };
networking = { networking = {
dhcpcd.enable = false;
useDHCP = false;
useNetworkd = true;
networkmanager.enable = lib.mkForce false;
firewall = { firewall = {
enable = true; enable = true;
allowPing = true; allowPing = true;
@ -147,6 +177,9 @@ in {
# Full access from Lan. # Full access from Lan.
iptables -I INPUT -j ACCEPT -i ${lan} -d ${internal} iptables -I INPUT -j ACCEPT -i ${lan} -d ${internal}
# Allow DHCP.
iptables -I INPUT -j ACCEPT -i ${lan} -p udp --dport 67
'') '')
# Expose DNS server for internal network. # Expose DNS server for internal network.
+ (mkForward internal cfg.dns.port cfg.dns.address cfg.dns.port tcp) + (mkForward internal cfg.dns.port cfg.dns.address cfg.dns.port tcp)

View file

@ -1,23 +1,13 @@
{ ... }: { { ... }: {
# REF: https://nixos.wiki/wiki/Systemd-networkd
# SEE: man 5 systemd.network
systemd.network = {
enable = true;
wait-online.enable = false; # HACK: So we can use both NM and networkd.
};
networking = { networking = {
dhcpcd.enable = false;
useDHCP = false;
useNetworkd = true;
networkmanager = { networkmanager = {
enable = true; enable = true;
unmanaged = [ # unmanaged = [
"type:bridge" # "type:bridge"
"type:ethernet" # "type:ethernet"
"type:loopback" # "type:loopback"
# "type:wireguard" # # "type:wireguard"
]; # ];
}; };
}; };