Skip to main content

Edge Configuration

The Configuration page (/edges/:id/config) is where you manage all aspects of an edge's network configuration. Navigate here by clicking Configure on the Edge Detail page.

warning

Changes are not applied immediately. When you modify any configuration section, the changes are staged and the edge is marked as "dirty". Click Sync Config in the page header (next to Config History) to push the configuration to the edge directly from this page. See Syncing Configuration for details.

Configuration Tabs

The configuration page is organized into the following tabs:

Physical Interfaces

View and configure the hardware network ports on the edge:

  • Port type — WAN or LAN role assignment
  • MTU — Maximum transmission unit size
  • Enabled/Disabled — Toggle individual ports
  • Link state — Current up/down status

Physical interface configuration is typically set during provisioning via Config Templates and should only be modified with care.

Logical Interfaces

Manage the logical network interfaces built on top of physical ports. Click Add Logical Interface or the pencil icon on any row to open the interface modal.

Add / Edit Logical Interface modal

The modal is a single scrolling form — there are no tabs. Sections appear and disappear based on the selections you make:

Identity (always visible)

FieldDescription
Physical InterfaceThe hardware port to bind this logical interface to. Ports are listed in natural sort order (G0, G1 … G10). Disabled ports are labelled (disabled).
VLAN IDOptional 802.1Q VLAN tag (1–4094). When set together with a physical interface the name field auto-populates (e.g., G0.100).
Interface NameDisplay / system name. Required. Auto-generated when a VLAN ID is set.
DescriptionFree-text label. Optional.

Role & Type (always visible)

FieldDescription
RoleWAN (uplink, Internet-facing) or LAN (local network). Controls which service sections appear below.
TypeRouted or Bridged.
Bridged WAN is not supported

Selecting Role = WAN and Type = Bridged shows an inline red error and the Save button is disabled. This combination is also rejected server-side (HTTP 400). Change Type to Routed.

If you change an existing interface's role and it has incompatible subscriptions (DHCP pools on a WAN, or NAT / port forwarding rules on a LAN), an amber warning lists up to 5 affected subscriptions. You can still save — it is a soft warning — but you should review and remove the orphaned subscriptions from the sections below before confirming.

Addressing (always visible)

  • DHCP Client toggle — available when role = WAN, or role = LAN with Type = Routed. The toggle is hidden entirely when role = LAN and Type = Bridged (a bridged LAN cannot also be a DHCP client).
  • When DHCP Client is enabled: the IPv4 address, subnet, and gateway fields are hidden (not just disabled). A blue info banner replaces them: "IPv4 address, subnet, and gateway will be auto-configured from the upstream DHCP server when this interface comes up."
  • When DHCP Client is disabled: IPv4 address, subnet mask (dropdown, /8 – /30), and default gateway fields are shown.

DHCP Server Pools (visible only when Role = LAN)

Lists the DHCP pools allocated on this interface. Click Add DHCP Pool to create a new pool, or use the edit / delete icons on each row.

If you are creating a new interface this section shows "Save interface first, then add DHCP pools here." After the initial save the modal transitions to edit mode in place and the section unlocks — you do not need to close and re-open the modal.

Source NAT (visible only when Role = WAN and Type = Routed)

Lists source NAT rules for outbound masquerading on this interface. Click Add Source NAT to add a rule.

Port Forwarding (visible only when Role = WAN and Type = Routed)

Lists inbound DNAT / port-forward rules. Click Add Port Forward to add a rule.

Same "Save interface first" placeholder applies for Source NAT and Port Forwarding on new interfaces.

Advanced (collapsible, collapsed by default)

FieldDescription
MTUInterface MTU in bytes (576–9000, default 1500)
MSSTCP MSS clamping value (536–8960, default 1460)
VRFAssign the interface to a Virtual Routing & Forwarding instance for network isolation

Subscriptions

The Subscriptions tab is a read-only summary of all DHCP pools, Source NAT rules, and port-forward rules across every logical interface on this edge.

Subscriptions are created and managed inside the Logical Interface modal (described above). You cannot add, edit, or delete subscriptions directly from the Subscriptions tab.

What the tab shows:

  • A blue info banner directing you to the Logical Interfaces tab to make changes.
  • Filter chips: All / DHCP Pools / NAT + Port Forwarding — narrow the list by type.
  • Rows grouped by logical interface (collapsible). Each group header shows the interface name and a count of its subscriptions.
  • Each group header has an "Edit in Logical Interfaces →" link that switches to the Logical Interfaces tab so you can open the owning interface and manage subscriptions there.
  • Each row shows: Interface, Type (colour-coded badge), Name, Details (addresses / ports in compact form), Description, and Status (Enabled / Disabled).

Static Routes

The routing table for the edge. Each route entry contains:

FieldDescription
Destination NetworkThe target network in CIDR notation (e.g., 10.0.0.0/8)
GatewayThe next-hop IP address
InterfaceThe outgoing interface for this route
MetricRoute priority (lower values are preferred)

Click Add Route to create a new static route. Existing routes can be edited or deleted.

ACL

Access Control Lists define traffic filtering rules for the edge. Rules are evaluated in priority order (lowest number first).

Each ACL rule contains:

FieldDescription
PriorityNumeric priority determining evaluation order (lower = first)
ActionPermit (allow) or Deny (block)
Source IPSource IP address or CIDR range
Destination IPDestination IP address or CIDR range
ProtocolIP protocol (TCP, UDP, ICMP, or Any)
Source PortSource port or port range (TCP/UDP only)
Destination PortDestination port or port range (TCP/UDP only)

Policies

Configure routing policies and traffic classification rules. This tab (labelled "Policies" in the UI) shows:

  • Edge policies — Policies applied directly to this edge (editable)
  • Device Group policies — Policies inherited from Device Group Access Policy templates (read-only, collapsible section)

See Routing Policies for full details on rule configuration.

Gateways

Configure the edge's VPN gateway instances:

wg0 — IoT Gateway

The IoT Gateway provides a hub-spoke VPN topology for connecting IoT devices, connectors, and remote sites:

  • Server Address — The WireGuard endpoint address (typically the edge's WAN IP)
  • Listen Port — The UDP port WireGuard listens on
  • MTU — Tunnel MTU setting
  • Peers — List of authorized peers with their public keys and allowed IP ranges

wg1 — App VPN

The App VPN provides client-server remote access VPN for end users. Two protocols are supported:

ProtocolDescription
WireGuardHigh-performance tunneling with Curve25519 key exchange. IP pool: 10.10.0.0/16
IKEv2Standards-based IPSec with certificate authentication via StrongSwan. IP pool: 10.11.0.0/16

The protocol is configured on the App VPN server settings. When switching protocols, existing VPN client registrations must be re-provisioned.

  • Listen Port — UDP port for VPN connections
  • DNS — DNS servers pushed to connecting clients
  • Allowed IPs — Network ranges accessible through the tunnel

VPN user peers are managed through the VPN Clients section and are automatically added to the wg1 configuration.

Flow Export (IPFIX)

IPFIX (IP Flow Information Export) enables the edge to collect and export network flow data:

  • Enable/Disable — Toggle flow data collection
  • Collector Address — The IP address and port of the flow collector
  • Active Timer — How often active flows are exported
  • Inactive Timer — Timeout for idle flow expiration
  • Record Layers — L2, L3, and/or L4 data collection

Suricata IDS/IPS

Configure the Suricata intrusion detection and prevention system:

  • Enable/Disable — Toggle Suricata on this edge
  • Mode — IDS (detect only) or IPS (detect and block)
  • Rule sets — Active detection rule categories
note

Suricata service chain configuration (ABF redirect through tap100/tap101) is managed automatically by the agent when Suricata is enabled. No separate UI tab is required.

SSH Access

Manage the reverse SSH tunnel and generate user certificates for remote CLI access:

  • Tunnel Key — Generate or regenerate the tunnel keypair
  • Tunnel Status — Active/inactive indicator (from edge metrics)
  • Tunnel Controls — Start, stop, restart, health check (via MQTT)
  • User Certificate — Generate a 24-hour SSH certificate for admin access
  • Connection Command — Ready-to-paste SSH ProxyJump command

See SSH Access for the complete setup workflow.

Key Rotation

Manage WireGuard key rotation for the edge's tunnel instances:

  • View current key age and rotation schedule
  • Trigger manual key rotation
  • View rotation history

Page Header Actions

The Configure page header contains two action buttons alongside the standard navigation controls:

ButtonDescription
Sync ConfigPush pending configuration changes to the edge. Color-coded: yellow (pending changes), red (sync failed), gray (synced). Available here so you can sync without leaving the Configure page.
Config HistoryView previous configuration snapshots. Each entry shows the timestamp, user who made the change, and a summary of what was modified.