The EdgeRouter ™ Lite is supported and managed by UNMS ™ (Ubiquiti ® Network Management System), a comprehensive controller with an intuitive UI. A single control plane manages registered EdgeMAX ® devices across multiple sites. Ubiquiti EdgeRouter Lite SOHO Network Migration with Consumer-grade WiFi Router A picture of my messy wall rack with the old and new network gear during the EdgeRouter migration. The Netgear WiFi router is mostly hidden behind the rack on the bottom shelf.
The Ubiquiti EdgeRouter: Configuring this extremely low-cost, enterprise-grade router for home use Jan 11, 2015 Updated Jan 17, 2015: Moved the dynamic DNS away from a scheduled task to the new custom- service method Updated Apr 3, 2016: Added dynamic DNS instructions for iwantmyname Updated Jul 24, 2016: Added NAT-PMP for UPnP, up-to-date dynamic DNS methods, IPv6 instructions, and EdgeRouter-X mention I’ve gotten a new, inexplicable, love for. They fit in my favorite category of companies: they make high quality products that cost nothing compared to the old-boys-club equivalents. Oh and these products look spectacular. I’m actually quite surprised how UBNT is able to do all the things they do I couldn’t support them more. After finding out about them from, I looked through their product line to be quite surprised at the feature sets, yet still low cost. Being a huge fan of networking equipment, I decided to buy their cheapest router (at the time), the EdgeMAX EdgeRouter Lite.
A 3 port, gigabit-capable router, that can really only be configured by commandline. Today, they have an even cheaper version of it, for $50! For this article, we’re going to configure the EdgeRouter Lite for home-use. Instructions should be similar if not identical for the EdgeRouter-X. A Challenger Appears! And it’s only $100! Getting going First off, like I mentioned, this thing is only really configurable via commandline.
It uses a forked version of the opensourced edition of 6.3 (now maintained as post their acquisition by Brocade). So to learn about how this thing works, you’ll need to read pages upon pages of documentation from the keeping in mind the Ubnt has modified a bunch of stuff too.
![Edgerouter lite configuration Edgerouter lite configuration](http://blog.garraux.net/wp-content/uploads/2013/05/31.png)
A lot of help is available on their. Oddly enough, they don’t document anything they do, so you’re stuck reading release notes and harassing the employees that troll the forums. A great way to get started is to read the and the PDF docs. When you buy and receive yours, plug into Port 0, assign yourself a Static IP, and use the https Web UI to upload the latest version of their firmware (which is 1.6 as of this writing).
![Edgerouter Edgerouter](https://community.ubnt.com/ubnt/attachments/ubnt/EdgeMAX/14015/1/Network.png)
This will get you up to speed with all the latest Web UI (which is still heavily limited). Use the Wizards on the 1.6 Web UI to get an initial configuration that can actually route something. Then lets start customizing it.
Log in via SSH with ubnt/ ubnt. Port forwarding As of 1.4, Ubiquiti added the non-Vayatta config of port-forward.
Whereas in the past you’d need to manually create NAT mappings and firewall rules (as per ), the EdgeRouter now has made it significantly easier with even automatic firewall rules. Client dev vtun proto udp remote us-east.privateinternetaccess.com 1194 resolv-retry infinite nobind persist-key persist-tun ca /config/auth/pia/ca.crt tls-client remote-cert-tls server auth-user-pass /config/auth/pia/pw.txt comp-lzo verb 1 reneg-sec 0 crl-verify /config/auth/pia/crl.pem route-nopull The big deal is the route-nopull which makes it so that PIA doesnt set the default gateway and route all your traffic to the VPN. Normally you’d use a VPN provider on your computer to route everything, but in this case we only want selective routing. Which we’ll set up next. The way we can modify packets to go through a different interface is to use the firewall. Lets create a firewall modify config to take all traffic from one IP address and force it over the OpenVPN tunnel we created above.