Skip to main content

Creating a Config Template

Navigate to Equipment > Config Templates and click Create Template (or click Edit on an existing custom template). The template editor is organized into sections described below.

Basic Information

FieldRequiredDescription
Template NameYesA descriptive name (e.g., "Branch Office - DPDK")
Edge ModelRead-only. Currently only "VSR1000" is supported
DescriptionNoOptional notes about the template's purpose
Set as DefaultNoCheck to make this the default template for the edge model

Physical Interfaces

Configure the hardware ports available on the edge device. For a VSR1000, ports G0 through G6 are available.

ColumnDescription
PortHardware port name (G0, G1, etc.) — read-only
TypeEthernet (default), WiFi, or LTE
EnabledToggle the port on or off
MTUMaximum Transmission Unit (default: 1500)
DescriptionOptional label (e.g., "WAN Uplink", "LAN Segment A")

By default, G0 (WAN) and G1 (LAN) are enabled. Additional ports are disabled until you need them.

Logical Interfaces

Logical interfaces map to physical ports and define IP addressing and roles. Click Add Interface to create entries.

FieldRequiredOptions / Notes
NameYesDescriptive name (e.g., "WAN-Ethernet", "LAN-Subnet")
TypeYesRouted, Bridged, or Internal
RoleYesWAN, LAN, Loopback, or MGMT
Physical PortNoWhich hardware port this maps to (not needed for Loopback)
VLAN IDNo1–4094 for VLAN sub-interfaces
IPv4 / CIDRNoStatic IP (e.g., 192.168.1.1/24). Leave empty for DHCP
GatewayNoDefault gateway IP
MTUNoOverride the physical port MTU
MSSNoTCP MSS clamping value (e.g., 1046 for tunneled traffic)
DHCP ClientNoEnable to auto-assign IP via DHCP instead of static
DescriptionNoOptional notes
tip

Most edges need at least two logical interfaces: one WAN (with DHCP or static IP + gateway) and one LAN (with a static IP for the local subnet).

Static Routes

Define routing table entries. Click Add Route to create entries.

FieldRequiredNotes
Destination IPYesNetwork address (e.g., 10.0.0.0)
Mask (CIDR)YesPrefix length (e.g., 24)
Next Hop IPNoGateway for this route
InterfaceNoOutbound logical interface (dropdown)
MetricNoRoute preference (lower = preferred)
EnabledToggle on/off

SNAT Rules

Source NAT translates outbound traffic from internal addresses to the WAN IP. Click Add SNAT Rule.

FieldRequiredNotes
NameYesRule identifier (e.g., snat-lan)
TypeYesCurrently "Masquerading" only
Source NetworkNoCIDR of traffic to translate (e.g., 192.168.1.0/24)
Translated IPNoLeave empty for masquerading (uses outgoing interface IP)
Outgoing InterfaceYesWAN logical interface (dropdown)
DescriptionNoOptional notes

DNAT Rules (Port Forwarding)

Destination NAT forwards incoming traffic on a public IP:port to an internal server. Click Add DNAT Rule.

FieldRequiredNotes
NameNoRule identifier
ProtocolYesTCP or UDP
Public IPYesExternal-facing IP address
Public PortYesExternal-facing port number
Private IPYesInternal server IP
Private PortYesInternal server port
InterfaceNoIncoming logical interface (dropdown)
note

DNAT works best when the internal server is behind the LAN interface (different L2 subnet from the WAN). Same-subnet DNAT has limitations due to asymmetric routing.

IoT Gateway (wg0)

The WireGuard IoT gateway provides encrypted tunnels for IoT devices. Toggle Enable to configure.

FieldDefaultNotes
Listen Port51820UDP port for WireGuard
Server Address (CIDR)10.200.0.1/24IP pool for IoT clients
MTU1420Tunnel MTU

Peers are managed per-edge after provisioning — the template sets the server-side tunnel parameters.

App VPN (wg1)

The App VPN provides remote access for users and devices. Toggle Enable to configure.

FieldDefaultNotes
Tunnel ProtocolWireGuardChoose WireGuard or IKEv2
Listen Port51821UDP port (disabled for IKEv2 — uses standard ports)
Server Address (CIDR)10.10.0.254/16 (WG) / 10.11.0.0/16 (IKEv2)Auto-adjusts based on protocol
DNS Server8.8.8.8DNS pushed to VPN clients
MTU1420Tunnel MTU
Protocol Differences
  • WireGuard: Lightweight, high performance. Clients use WireGuard protocol.
  • IKEv2: Standards-based IPSec. Native support on macOS, iOS, Windows without third-party apps. Certificates are generated automatically when enabling IKEv2.

SSH Remote Access

Toggle Enable to provision a reverse SSH tunnel for remote management. A unique port is allocated per-edge automatically.

No additional configuration is needed — the tunnel connects through the SSH bastion host and allows authenticated access to the edge for diagnostics and troubleshooting.

IPFIX / Flowprobe

Flow export sends network flow data to a collector for traffic analysis. Toggle Enable to configure.

FieldDefaultNotes
Collector Address169.254.1.2IPFIX collector IP (typically the edge's local collector)
Collector Port4739IPFIX standard port
Template Interval20 secHow often to re-send flow templates
Active Timer60 secTimeout for active flows
Passive Timer120 secTimeout for idle flows
Record L2OffInclude Layer 2 (MAC) information
Record L3OnInclude Layer 3 (IP) information
Record L4OnInclude Layer 4 (TCP/UDP port) information

Monitored interfaces are configured per-edge after provisioning.

BGP Configuration

Toggle Enable BGP to set up Border Gateway Protocol for dynamic routing.

FieldRequiredNotes
AS NumberYesAutonomous System number (e.g., 65000)
Router IDNoTypically the edge's loopback or WAN IP
info

BGP neighbors are configured automatically via E2E Peering, not in the template. The template only sets the AS number and router ID.

DHCP Pools

Define DHCP address pools for LAN clients. Click Add DHCP Pool.

FieldRequiredNotes
Pool NameYesIdentifier (e.g., dhcp-pool-lan)
InterfaceYesLAN logical interface (dropdown)
EnabledToggle on/off
Start IPYesFirst IP in the pool (e.g., 192.168.1.100)
End IPYesLast IP in the pool (e.g., 192.168.1.200)
GatewayNoDefault gateway pushed to clients
DNS ServersNoComma-separated (e.g., 8.8.8.8, 8.8.4.4)
Lease TimeNoSeconds (default: 86400 = 24 hours)

Saving

Click Save Template to save your changes. The template is immediately available for provisioning new edges.

To use an existing template as a starting point, go back to the template list and click Duplicate on any template (including system templates).