72
submitted 8 months ago* (last edited 8 months ago) by CaptainBlagbird@lemmy.world to c/selfhosted@lemmy.world

Hi, I got a new router from my ISP, but it doesn't even have an option to change the address of the DNS server...

So I'm gonna switch (if necessary also the ISP).

I have never used a custom router, so I would appreciate a push in the right direction. What can you recommend? Synology? FritzBox? Asus? Bridge Mode on the ISP router + RasPi?

The following I am running on a separate device, but if possible it would be nice to have it directly on the router device:

  • PiHole
  • Wireguard
  • DDNS updater
top 50 comments
sorted by: hot top controversial new old
[-] Im_old@lemmy.world 28 points 8 months ago

I have been using opnsense on a very cheap celeron nuc for a few years, very happy with it

load more comments (1 replies)
[-] pHr34kY@lemmy.world 21 points 8 months ago

I personally would flick through the OpenWRT supported devices and pick the best supported device with 802.11ax.

[-] possiblylinux127@lemmy.zip 15 points 8 months ago

How much bandwidth and flexibility do you want? OpenWRT is what I use on consumer hardware but many people here also swear by custom hardware with opnsense

[-] TCB13@lemmy.world 16 points 8 months ago

swear by custom hardware with opnsense

...which is completely unnecessary and overkill for most people, even those with home labs, since OpenWrt can do it all.

[-] redcalcium@lemmy.institute 8 points 8 months ago

Homelab is a hobby, and like other hobbies, people actually loves doing the "unnecessary and overkill" stuff.

[-] Gooey0210@sh.itjust.works 6 points 8 months ago

I thought "unnecessary and overkill" is our actual name, and selfhosting is just a nickname

[-] TCB13@lemmy.world 1 points 8 months ago

Think about it... with OpenWrt you can spend even more time tweaking around and doing things that may be more automation under OPNsense. :P But yes, fair point.

load more comments (1 replies)
[-] TCB13@lemmy.world 14 points 8 months ago* (last edited 8 months ago)

How much wifi and open-source do you really want?

If you are willing to go with commercial hardware + open source firmware (OpenWrt) you might want to check the table of hardware of OpenWrt at https://openwrt.org/toh/views/toh_available_16128_ax-wifi and https://openwrt.org/toh/views/toh_available_864_ac-wifi. One solid pick for the future might be the Netgear WAX2* line or the GL.iNet GL-MT6000. One of those models is now fully supported the others are on the way. If you don’t mind having older wifi a Netgear R7800 is solid.

For a full open-source hardware and software experience you need a more exotic brand like this https://www.banana-pi.org/en/bananapi-router/. The BananaPi BPi R3 and here is a very good option with a 4 core CPU, 2GB of RAM Wifi6 and two 2.5G SFP ports besides the 4 ethernet ports. There’s also an upcoming board the BPI-R4 with optional Wifi 7 and 10G SPF.

Both solutions will lead to OpenWRT when it comes to software, it is better than any commercial firmware but be aware that it only support wifi hardware with open-source drives such as MediaTek. While MediaTek is good and performs very well we can't forget that the best performing wifi chips are Broadcom and they use hacks that go behind the published wifi standards and get it go a few megabytes/second faster and/or improve the range a bit.

DD-WRT is another “open-source” firmware that has a specific agreement with Broadcom to allow them to use their proprietary drivers and distribute them as blob with their firmware. While it works don’t expect compatibility with newer hardware nor a bug free solution like OpenWRT is.

There are also alternatives like OPNsense and pfSense that may make sense in some cases you most likely don't require that. You've a small network and OpenWRT will provide you with a much cleaner open-source experience and also allow for all the customization you would like. Another great advantage of OpenWRT is that you've the ability to install 3rd party stuff in your router, you may even use qemu to virtualize stuff like your Pi-Hole on it or simply run docker containers.

[-] blackstrat@lemmy.fwgx.uk 11 points 8 months ago

I've been very happy with Opnsense running as a VM on both ESXi, and now Proxmox. Lots of configuration options and able to setup some complicated firewall rules easily.

[-] eleitl@lemmy.ml 3 points 8 months ago

Also opnsense, but on thin client.

[-] Swarfega@lemm.ee 8 points 8 months ago

I have a Unifi router, switch and four access points. My setup works fine. Stable.

I see other people from work say they get dropouts over the work VPN but I have no issues at all. I'm not saying the hardware is their cause but ISP provided all in one boxes are just that. An all in one solution.

[-] ElderWendigo@sh.itjust.works 3 points 8 months ago

Jack of all trades, master of none. Forcing a router reboot to get the home Internet working again has become a thing of the past since I set up a unifi router and APs.

I'd had router/WiFi combos before running either dd-wrt, open-wrt, or tomato. None of them were stable. But I suspect that was because the hardware just couldn't keep up, not because the open source software was faulty.

[-] walden@sub.wetshaving.social 7 points 8 months ago

Adding another Mikrotik recommendation with the standard warnings -- a bit of a learning curve, although it has a default configuration that "just works". If you mess something up you can just apply the default config to get back online.

Don't buy from Amazon. For whatever reason people have problems with those units. Fakes maybe? Who knows. If you're in the US buy from streakwave, roc-noc, ISP supplies, Double Radius, or Getic (international shipping).

The RB5009 series is very good if you want something beefier with more ports.

[-] Cobrachicken@lemmy.world 7 points 8 months ago

Fritzboxes are rock stable, and support Wireguard from FritzOS 7.5 onwards, see https://avm.de/service/vpn/wireguard-vpn-zur-fritzbox-am-computer-einrichten/

(Apparently NOT the cable versions!)

What nags me most with them is that you have no separate Firewall controll over their WiFi, and the WiFi range is not really great. So probably consider going with dedicated APs instead.

[-] Atemu@lemmy.ml 2 points 8 months ago

They are quite solid but be aware that the web UI is dog slow and the menus weirdly designed.

[-] farcaller@fstab.sh 6 points 8 months ago

One more for mikrotik (I run the VM version on a small linux box).

I tested a ton of those (pf/opn-senses, VyOS, even Cisco), and noone of the free ones can handle IPv6 in a reasonable way in 2024, which is slightly bizzare. Mikrotik has some annoyances, but it's rock solid as a router.

I don’t use its container features and instead run podman in a vm next to it. Works great.

load more comments (4 replies)
[-] wintermute@discuss.tchncs.de 6 points 8 months ago

I'm very happy with my FritzBox (7590), it handles de ADSL connection to the ISP, supports various DDNS providers, Wireguard VPN, 4 port gigabit switch (5 of you don't need the WAN port), guest WiFi with client isolation.

It also has basic media server and NAS functionality (with USB3 external hard drives).

Of course you can change the DNS server and other network controls like QOS, wake on LAN, port forwarding, different profiles with parental controls, filters, connection times, etc.

They also seem to take security seriously.

[-] JurassicPork@lemmy.one 6 points 8 months ago* (last edited 8 months ago)

I've been super happy with mikrotik, currently running mikrotik hex s, and ubiquity u6-lr for wifi, have had 0 issues, no need to reboot etc. Plenty of customizing if desired. A learning curve tho if you do want to start messing around

[-] Entropywins@kbin.social 4 points 8 months ago* (last edited 8 months ago)

I purchased the same router about 2 months ago and love it...cant recommend mikrotik enough.

[-] JurassicPork@lemmy.one 2 points 8 months ago

Ya been rocking it I'd say close to 2 years no 0 issues. The old ISP modem had to be rebooted every few weeks before I had the mikrotik and unify combo.... And the hex s is super cheap to buy now!

[-] different_base@lemmy.world 6 points 8 months ago* (last edited 8 months ago)

I use an entry level router ASUS RT-AX53U with OpenWrt. WiFi 6, IPv6, Guest VLAN, DNSCrypt (DoH), Adblock, Firewall are few things I have configured with OpenWrt.

Even if you don't buy ASUS, make sure your router is supported by OpenWrt. It's a Linux distribution that runs on routers and PCs to configure home networking.

[-] drkt@lemmy.dbzer0.com 6 points 8 months ago* (last edited 8 months ago)

Wireguard and DNS filtering (albeit not as fine tuned and automatic as pihole) can all be done on OpnSense

I recommend OpnSense on whatever modern low-power hardware you can get your hands on, ThinkCentre, NUC or whatever, if you are okay with a separate device for WiFi or do not need WiFi. WiFi APs can be had for as low as 20 bucks and are usually straight forward to set up, but you gotta shell out more if you want the latest and greatest connectivity.

There is also the possibility for adding WiFi directly to OpnSense but I have not even bothered touching it. If you love tinkering and suffering, that's a route you can go.

For the love of God, if you're going to install PfSense, just get OpnSense instead. It's just better.

[-] dukatos@lemm.ee 2 points 8 months ago

I always use separate router / firewall and WiFi AP. That way I can upgrade WiFi to any device I like without touching the router.

[-] drkt@lemmy.dbzer0.com 1 points 8 months ago

what do you mean upgrade WiFi to any device?

[-] dukatos@lemm.ee 2 points 8 months ago

For example, upgrade /n AP to /ax. The router may keep working for LAN connections while you are playing with WiFi.

[-] chiisana@lemmy.chiisana.net 5 points 8 months ago

If you’re new, something like Uniquiti UniFi stack is very beginner friendly and well polished.

If you’re planning to run your own hardware, the usual recommendation seems to be pfsense or opnsense on a modern lower end system (Intel N100 box for example).

Bearing in mind that a router is only responsible for routing (think directing the packets where to go). You’d also want to have access points to provide WiFi for your wireless devices. This is where UniFi stack makes it easier because you can just choose their access point hardware and control through single controller. Whereas rolling your own you’d be looking at getting something else to fill that role.

[-] Zotora@programming.dev 2 points 8 months ago

he following I am run

I second everything said here.

UniFi is a good starting place, and pfsense is good if you really want to dig in.

[-] kylian0087@lemmy.dbzer0.com 5 points 8 months ago* (last edited 8 months ago)

On one hand I love unify on the other I wish i never went this route. They do make it very simple to manage a whole suite of devices. But updates sometimes feel "Alpha/beta" some more advanced stuff requires editing jsons in the devices them self. Also recently the battery in my cloud key gen 2 has blown and their is no way to replace it without replacing the whole cloudkey. Thing lasted like 2 years. which is ridiculous. Personally I have started to look in to Mikrotik which is a load more advanced and has a higher learning curve. but if I am forced to edit jsons and use scripts to do some more advanced things i might as well.

Sorry for the slight rant... just be aware what you can get your self in to.

[-] Zotora@programming.dev 2 points 8 months ago* (last edited 8 months ago)

Thing lasted like 2 years. which is ridiculous. Personally I have started to look in to Mikrotik w

Good points -- I've never ran into any issues with UniFi personally.

At the time I was self-hosting the UniFi Controller on my Proxmox server for a switch and an AP. So i suppose your mileage may vary with UniFi.

As far as routers go, I've been running a pfsense for a while and its been great. There is definitely a bit of a learning curve and it's not something that I'd recommend to someone who has little networking knowledge. Once you understand how to work with it, there is very little you can't do.

Mikrotik has pop-ed up on my radar recently too, might have to give them a look.

Edit: Phrasing.

[-] towerful@programming.dev 1 points 8 months ago

All ill say is ROS script is a huge PITA.
So, making a script that takes an object of vlan/port assignments, and running the required commands to ensure the config of the mikrotik matches the declared vlan/port assignments.

The besy way ive seen to build/manage them is to use a compile step to go from some sane declarative config in order to build the actual ROS script to make the changes.
I just havent got round to making that a thing.

I hope they are working on a native python API, so i can script in a sane language, and run it directly on the mikrotik.

Config files are easy to import/export/edit/read, tho.
It does mean you have to reset to default when you update a config file (or configure the device live, then export the config)

[-] smb@lemmy.ml 4 points 8 months ago

i am happy to have a raspberry pi setup connected to a VLAN switch, internet is behind a modem (like bridged mode) connected with ethernet to one switchport while the raspi routes everything through one tagged physical GB switchport. the setup works fine with two raspi's and failover without tcp disconnections during an actual failover, only few seconds delay when that happens, so basically voip calls recover after seconds, streaming is not affected, while in a game a second off might be too much already, however as such hardware failures happen rarely, i am running only one of them anyway.

for firewall i am using shorewall, while for some special routing i also use unbound dns resolver (one can easily configure static results for any record) and haproxy with sni inspection for specific https routing for the rather specialized setup i have.

my wifi is done by an openwrt but i only use it for having separate wifis bridged to their own vlans.

thus this setup allows for multi-zone networks at home like a wifi for visitors with daily changing passwords and another fror chromecast or home automation, each with their own rules, hardware redundancy, special tweaking, everything that runs on gnu/linux is possible including pihole, wireguard, ddns solutions, traffic statistics, traffic shaping/QOS, traffic dumps or even SSL interception if you really want to import your own CA into your phone and see what data your phones apps (those that don't use certificate pinning) are transfering when calling home, and much more.

however regarding ddns it sometimes feels more safe and reliable to have a somehow reserved IP that would not change. some providers offer rather cheap tunnels for this purpose. i once had a free (ipv6) tunnel at hurricane electronic (besides another one for IPv4) but now i use VMs in data centers.

i do not see any ready product to be that flexible. however to me the best ready router system seems to be openwrt, you are not bound to a hardware vendor, get security updates longer than with any commercial product, can 1:1 copy your config to a new device even if the hardware changes and has the possibility to add packages with special features to it.

"openwrt" is IMHO the most flexible ready solution for longtime use. same as "pfsense" is also very worth looking at and has some similarities to openwrt while beeing different.

[-] qjammer@lemmy.ml 4 points 8 months ago

I recently bought an x86 passive cooled box from Topton, an aliexpress merchant, that was recommended by ServeTheHome, a great youtube channel/blog that reviews all kinds of networking equipment for homelabs. Since it's x86, you can pretty much install anything on it, in my case OPNSense. I recommend you watch some of their videos/read their blogs and see what fits!

[-] Quill0@lemmy.digitalfall.net 3 points 8 months ago

I always liked Mikrotik. Not the most open of router but the most documented and configurable I've seen with a web, gui, ssh, or telnet I've seen

[-] CoopaLoopa@lemmy.dbzer0.com 1 points 7 months ago

+1 for Mikrotik.

Get one of their routers that have an Arm or x86 processor and you can run PiHole and a DDNS updater on there as containers. Wireguard support (client and server) is built in.

Even their cheapest hardware that runs routerOS has access to all the same features as their enterprise level gear.

[-] Ferrous@lemmy.dbzer0.com 3 points 8 months ago

When I reached your situation, I started rackmounting which has saved me a lot of time.

I got a 1u dell poweredge r210 and slapped in a 10Gb network card. Loaded up OPNsense onto it. OPN sense was not easy to learn how to use, for me at least. Struggled to get everything running smoothly. But I am very happy I went with rack mounting instead of adding to the rat's nest.

[-] FutileRecipe@lemmy.world 3 points 8 months ago

If you want to start small, I'd go with one supported by Asuswrt-Merlin, "a third party alternative firmware for Asus routers, with a special emphasis on tweaks and fixes rather than radical changes or collecting as many features as possible." Keeps it close to stock with minor upgrades, and a faster release cycle for fixes. The RT-AX88U_PRO is one of the higher end routers that is supported by Merlin.

[-] Kazumara@feddit.de 3 points 8 months ago

You haven't mentioned what sort of access link or speed you have, that seems very relevant here.

For my 1Gbit/s fiber connection the Edgerouter 6P has been pretty good. It has an SFP port and can route 1 Gbit/s of traffic without issue and my dual-stack setup works well too.

The only significant downside is that its switching is slow, it has no hw support. So I put my NAS on a separate subnet instead so that the traffic to it can be routed instead.

[-] calmluck9349@infosec.pub 3 points 8 months ago

pfSense on an old PC with two NICs should do well. You could buy dedicated hw like a protectoli. Ive had one for 6 years now no issues.

[-] kindenough@kbin.social 3 points 8 months ago

A raspberry pi with pihole running as dhcp server. In the ISP router turn off DHCP, DNS problem solved as pi will advertise its DNS to all connected devices on the network.

[-] dandroid@sh.itjust.works 2 points 8 months ago* (last edited 8 months ago)

I have a mesh system made up of Asus Zenwifi ET8s, and I have been very happy with them. They have a lot of cool features, such as having a VPN server and VPN client, with the VPN client allowing me to apply the VPN to only selected devices. It has tons of customization options for those that are knowledgeable about that sort of thing. For example, I can tweak at what signal strength AP steering happens. It has WiFi 6E and 2.5 Gbps wired backhaul.

When I first got it, it was very buggy, and some features straight up didn't work. But they eventually got all the bugs that I found fixed. It's in a really good state right now.

To address your desired features, it does have wireguard. I don't know about DDNS, but it does not have pihole built in. It has adguard built in, but it doesn't really seem to do much, tbh. Then again, pihole didn't really do anything for me either. I ended up shutting off my pihole because I didn't even notice a difference.

[-] dukatos@lemm.ee 2 points 8 months ago

I am using NanoPi R5S. I am using debian system but there is also openwrt image for it, if you are not experienced Linux admin.

Works for over a year without problems. It runs PiHole and Wireguard client on docker, ddclient, unbound and reverse proxy.

[-] Meltrax@lemmy.world 2 points 8 months ago* (last edited 8 months ago)

I guess maybe too mainline for everyone here but I use an Asus router flashed with the Merlin OS (a painless easy process) and it works excellently. No issues setting up all the things you mentioned.

[-] Decronym@lemmy.decronym.xyz 2 points 8 months ago* (last edited 6 months ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
AP WiFi Access Point
CA (SSL) Certificate Authority
DNS Domain Name Service/System
ESXi VMWare virtual machine hypervisor
IP Internet Protocol
NAS Network-Attached Storage
NUC Next Unit of Computing brand of Intel small computers
PiHole Network-wide ad-blocker (DNS sinkhole)
SSH Secure Shell for remote terminal access
SSL Secure Sockets Layer, for transparent encryption
TLS Transport Layer Security, supersedes SSL
Unifi Ubiquiti WiFi hardware brand
VPN Virtual Private Network

13 acronyms in this thread; the most compressed thread commented on today has 9 acronyms.

[Thread #626 for this sub, first seen 25th Mar 2024, 09:55] [FAQ] [Full list] [Contact] [Source code]

[-] UltraBlack@lemmy.world 1 points 8 months ago

you can convert really any computer into a little router using the help of an ethernet card. I'm planning to do exactly that for my homeserver

[-] tritonium@midwest.social 1 points 8 months ago

I went tplink omada router, switches, and aps, very happy.

[-] bruhduh@lemmy.world 1 points 8 months ago* (last edited 8 months ago)

Hi-end Xiaomi router, they have WiFi ax and enough ram and support open wrt so you can host your things on it, better yet, do DIY router on orange pi board, there's tutorials you can follow

[-] Xanxia@lemmy.zip 1 points 8 months ago

I have a Netgate 3100 that I bought used. Workes fine and at full speed with my 1000/1000Mbit connection.

load more comments
view more: next ›
this post was submitted on 25 Mar 2024
72 points (97.4% liked)

Selfhosted

40329 readers
382 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS