- Organized 252 files across project - Root directory: 187 → 2 files (98.9% reduction) - Moved configuration guides to docs/04-configuration/ - Moved troubleshooting guides to docs/09-troubleshooting/ - Moved quick start guides to docs/01-getting-started/ - Moved reports to reports/ directory - Archived temporary files - Generated comprehensive reports and documentation - Created maintenance scripts and guides All files organized according to established standards.
9.5 KiB
ER605 Router Configuration Guide
Last Updated: 2025-01-20
Document Version: 1.0
Hardware: 2× TP-Link ER605 (v1 or v2)
Overview
This guide provides step-by-step configuration for the ER605 routers in the enterprise orchestration setup, including:
- Dual router roles (ER605-A primary, ER605-B standby)
- WAN configuration with 6× /28 public IP blocks
- VLAN routing and inter-VLAN communication
- Role-based egress NAT pools
- Break-glass inbound NAT rules
Hardware Setup
ER605-A (Primary Edge Router)
Physical Connections:
- WAN1: Spectrum ISP (Block #1: 76.53.10.32/28)
- WAN2: ISP #2 (failover/alternate)
- LAN: Trunk to ES216G-1 (core switch)
WAN1 Configuration:
- IP Address:
76.53.10.34/28 - Gateway:
76.53.10.33 - DNS: ISP-provided or 8.8.8.8, 1.1.1.1
ER605-B (Standby Edge Router)
Physical Connections:
- WAN1: ISP #2 (alternate/standby)
- WAN2: (optional, if available)
- LAN: Trunk to ES216G-1 (core switch)
Role Decision Required:
- Option A: Standby edge (failover only)
- Option B: Dedicated sovereign edge (separate policy domain)
WAN Configuration
ER605-A WAN1 (Primary - Block #1)
Interface: WAN1
Connection Type: Static IP
IP Address: 76.53.10.34
Subnet Mask: 255.255.255.240 (/28)
Gateway: 76.53.10.33
Primary DNS: 8.8.8.8
Secondary DNS: 1.1.1.1
MTU: 1500
ER605-A WAN2 (Failover - ISP #2)
Interface: WAN2
Connection Type: [DHCP/Static as per ISP]
Failover Mode: Enabled
Priority: Lower than WAN1
ER605-B Configuration
If Standby:
- Configure same as ER605-A but with lower priority
- Enable failover monitoring
If Dedicated Sovereign Edge:
- Configure separate policy domain
- Independent NAT pools for sovereign tenants
VLAN Configuration
Create VLAN Interfaces
For each VLAN, create a VLAN interface on ER605:
| VLAN ID | VLAN Name | Interface IP | Subnet | Gateway |
|---|---|---|---|---|
| 11 | MGMT-LAN | 192.168.11.1 | 192.168.11.0/24 | 192.168.11.1 |
| 110 | BESU-VAL | 10.110.0.1 | 10.110.0.0/24 | 10.110.0.1 |
| 111 | BESU-SEN | 10.111.0.1 | 10.111.0.0/24 | 10.111.0.1 |
| 112 | BESU-RPC | 10.112.0.1 | 10.112.0.0/24 | 10.112.0.1 |
| 120 | BLOCKSCOUT | 10.120.0.1 | 10.120.0.0/24 | 10.120.0.1 |
| 121 | CACTI | 10.121.0.1 | 10.121.0.0/24 | 10.121.0.1 |
| 130 | CCIP-OPS | 10.130.0.1 | 10.130.0.0/24 | 10.130.0.1 |
| 132 | CCIP-COMMIT | 10.132.0.1 | 10.132.0.0/24 | 10.132.0.1 |
| 133 | CCIP-EXEC | 10.133.0.1 | 10.133.0.0/24 | 10.133.0.1 |
| 134 | CCIP-RMN | 10.134.0.1 | 10.134.0.0/24 | 10.134.0.1 |
| 140 | FABRIC | 10.140.0.1 | 10.140.0.0/24 | 10.140.0.1 |
| 141 | FIREFLY | 10.141.0.1 | 10.141.0.0/24 | 10.141.0.1 |
| 150 | INDY | 10.150.0.1 | 10.150.0.0/24 | 10.150.0.1 |
| 160 | SANKOFA-SVC | 10.160.0.1 | 10.160.0.0/22 | 10.160.0.1 |
| 200 | PHX-SOV-SMOM | 10.200.0.1 | 10.200.0.0/20 | 10.200.0.1 |
| 201 | PHX-SOV-ICCC | 10.201.0.1 | 10.201.0.0/20 | 10.201.0.1 |
| 202 | PHX-SOV-DBIS | 10.202.0.1 | 10.202.0.0/20 | 10.202.0.1 |
| 203 | PHX-SOV-AR | 10.203.0.1 | 10.203.0.0/20 | 10.203.0.1 |
Configuration Steps
Click to expand detailed VLAN configuration steps
-
Access ER605 Web Interface:
- Default:
http://192.168.0.1orhttp://tplinkrouter.net - Login with admin credentials
- Default:
-
Enable VLAN Support:
- Navigate to: Advanced → VLAN → VLAN Settings
- Enable VLAN support
-
Create VLAN Interfaces:
- For each VLAN, create a VLAN interface:
- VLAN ID: [VLAN ID]
- Interface IP: [Gateway IP]
- Subnet Mask: [Corresponding subnet mask]
- For each VLAN, create a VLAN interface:
-
Configure DHCP (Optional):
- For each VLAN, configure DHCP server if needed
- DHCP range: Exclude gateway (.1) and reserved IPs
Routing Configuration
Static Routes
Default Route:
- Destination: 0.0.0.0/0
- Gateway: 76.53.10.33 (WAN1 gateway)
- Interface: WAN1
Inter-VLAN Routing:
- ER605 automatically routes between VLANs
- Ensure VLAN interfaces are configured
Route Priority
- WAN1: Primary (higher priority)
- WAN2: Failover (lower priority)
NAT Configuration
Outbound NAT (Role-based Egress Pools)
Critical: Configure outbound NAT pools using the /28 blocks for role-based egress.
CCIP Commit (VLAN 132) → Block #2
Source Network: 10.132.0.0/24
NAT Type: PAT (Port Address Translation)
NAT Pool: <PUBLIC_BLOCK_2>/28
Interface: WAN1
CCIP Execute (VLAN 133) → Block #3
Source Network: 10.133.0.0/24
NAT Type: PAT
NAT Pool: <PUBLIC_BLOCK_3>/28
Interface: WAN1
RMN (VLAN 134) → Block #4
Source Network: 10.134.0.0/24
NAT Type: PAT
NAT Pool: <PUBLIC_BLOCK_4>/28
Interface: WAN1
Sankofa/Phoenix/PanTel (VLAN 160) → Block #5
Source Network: 10.160.0.0/22
NAT Type: PAT
NAT Pool: <PUBLIC_BLOCK_5>/28
Interface: WAN1
Sovereign Tenants (VLAN 200-203) → Block #6
Source Network: 10.200.0.0/20, 10.201.0.0/20, 10.202.0.0/20, 10.203.0.0/20
NAT Type: PAT
NAT Pool: <PUBLIC_BLOCK_6>/28
Interface: WAN1
Management (VLAN 11) → Block #1 (Restricted)
Source Network: 192.168.11.0/24
NAT Type: PAT
NAT Pool: 76.53.10.32/28 (restricted, tightly controlled)
Interface: WAN1
Inbound NAT (Break-glass Only)
Default: None
Optional Break-glass Rules:
Emergency SSH/Jumpbox
Rule Name: Break-glass SSH
External IP: 76.53.10.35 (or other VIP from Block #1)
External Port: 22
Internal IP: [Jumpbox IP on VLAN 11]
Internal Port: 22
Protocol: TCP
Access Control: IP allowlist (restrict to admin IPs)
Emergency RPC (if needed)
Rule Name: Emergency Besu RPC
External IP: 76.53.10.36
External Port: 8545
Internal IP: [RPC node IP on VLAN 112]
Internal Port: 8545
Protocol: TCP
Access Control: IP allowlist (restrict to known clients)
Note: All break-glass rules should have strict IP allowlists and be disabled by default.
Firewall Rules
Default Policy
- WAN → LAN: Deny (default)
- LAN → WAN: Allow (with NAT)
- Inter-VLAN: Allow (for routing)
Security Rules
Block Public Access to Proxmox
Rule: Block Proxmox Web UI from WAN
Source: Any (WAN)
Destination: 192.168.11.0/24
Port: 8006
Action: Deny
Allow Cloudflare Tunnel Traffic
Rule: Allow Cloudflare Tunnel
Source: Cloudflare IP ranges
Destination: [Cloudflare tunnel endpoints]
Port: [Tunnel ports]
Action: Allow
Inter-VLAN Isolation (Sovereign Tenants)
Rule: Deny East-West for Sovereign Tenants
Source: 10.200.0.0/20, 10.201.0.0/20, 10.202.0.0/20, 10.203.0.0/20
Destination: 10.200.0.0/20, 10.201.0.0/20, 10.202.0.0/20, 10.203.0.0/20
Action: Deny (except for specific allowed paths)
DHCP Configuration
VLAN 11 (MGMT-LAN)
VLAN: 11
DHCP Range: 192.168.11.100-192.168.11.200
Gateway: 192.168.11.1
DNS: 8.8.8.8, 1.1.1.1
Lease Time: 24 hours
Reserved IPs:
- 192.168.11.1: Gateway
- 192.168.11.10: ML110 (Proxmox)
- 192.168.11.11-14: R630 nodes (if needed)
Other VLANs
Configure DHCP as needed for each VLAN, or use static IPs for all nodes.
Failover Configuration
ER605-A WAN Failover
Primary WAN: WAN1 (76.53.10.34)
Backup WAN: WAN2
Failover Mode: Auto
Health Check: Ping 8.8.8.8 every 30 seconds
Failover Threshold: 3 failed pings
ER605-B Standby (if configured)
- Monitor ER605-A health
- Activate if ER605-A fails
- Use same configuration as ER605-A
Monitoring & Logging
Enable Logging
- System Logs: Enable
- Firewall Logs: Enable
- NAT Logs: Enable (for egress tracking)
SNMP (Optional)
SNMP Version: v2c or v3
Community: [Secure community string]
Trap Receivers: [Monitoring system IPs]
Backup & Recovery
Configuration Backup
-
Export Configuration:
- Navigate to: System Tools → Backup & Restore
- Click Backup to download configuration file
- Store securely (encrypted)
-
Regular Backups:
- Schedule weekly backups
- Store in multiple locations
- Version control configuration changes
Configuration Restore
- Restore from Backup:
- Navigate to: System Tools → Backup & Restore
- Upload configuration file
- Restore and reboot
Troubleshooting
Common Issues
VLAN Not Routing
- Check: VLAN interface is created and enabled
- Check: VLAN ID matches switch configuration
- Check: Subnet mask is correct
NAT Not Working
- Check: NAT pool IPs are in the correct /28 block
- Check: Source network matches VLAN subnet
- Check: Firewall rules allow traffic
Failover Not Working
- Check: WAN2 is configured and connected
- Check: Health check settings
- Check: Failover priority settings
Security Best Practices
- Change Default Credentials: Immediately change admin password
- Disable Remote Management: Only allow LAN access to web interface
- Enable Firewall Logging: Monitor for suspicious activity
- Regular Firmware Updates: Keep ER605 firmware up to date
- Restrict Break-glass Rules: Use IP allowlists for all inbound NAT
- Monitor NAT Pools: Track egress IP usage by role
References
- NETWORK_ARCHITECTURE.md - Complete network architecture
- ORCHESTRATION_DEPLOYMENT_GUIDE.md - Deployment guide
- ER605 User Guide
Document Status: Complete (v1.0)
Maintained By: Infrastructure Team
Review Cycle: Quarterly
Last Updated: 2025-01-20