Install on Intel(R) Celeron(R) J6412 possible?

For x86, the default rootfs is 104MB, which is a tad small.

I'd suggest you first get it running, then deal with that when it becomes an issue. (There are trivial solutions that don't involve fdisk, parted, resize2fs or any of that, and more importantly are persistent across upgrades so you don't need to go through the same pain every time.)

1 Like

Hello Antonk,

This day one for me on Openwrt so wasn't sure what to expect. The Platform on first impression is stable and well built. I have used other firewall solutions before and wanted to try it out. I have a VPS that runs Debian so command line are similar just need to remember that unlike Ubuntu which also used I do not use sudo for what I can see. I am thankful for the community that you have here everyone been quite helpful. When I gather experience I look forward to lending a hand in anyone in need if it's within my reach.

Thanks,

Chispa

1 Like

You own the world :innocent:

LTS has a shirt for that: https://lawrence-technology-services.creator-spring.com/listing/i-am-root-2024

2 Likes

I have similar hardware. OpenWrt ran fine, but I prefer pfSense.

1 Like

I don't have J6412, but I just tested mine with J4125 (which is also a little bit slower than J6412) and it's already 1.76Gbps on Wireguard synthetic test, so I guess the J6412 might hit 2Gbps....

I'm very lazy......since I am using squashFS image so I am simply using USB flash drive to boot and use, you'd probably only write a few times during first setup (install some packages, writing config files) so USB to SATA can be saved.

People do have their preferences, I used pfSense before, however with my new ISP setup pfSense no longer working anymore so I have to switch to OpenWrt, and for some folks that needs PPPoE, they will find that using OpenWrt is running faster.

1 Like

I wanna to say to everyone here a thank you.

I now have two wireguard VPN running at the same time!

It does effect the speed when you split. The only thing left is having remaining traffic go thru WAN still working that.

I have the gl inet flint 2 tomorrow I thought I needed now I probably don't since I am curious I will test it out as if it works having one piece of equipment is better than two.

I figured out the Wan!

Thanks everyone!

1 Like

Do you guys think its worth switching from thr J6412 to a N6005? I believe I use the same memory on it supposedly 25% more multi thread power or wait till a little and get an N305? The N305 suppose to be twice as powerful then what I have.

Depends on why you're upgrading.

https://www.cpubenchmark.net/compare/4474vs4565vs5213/Intel-Celeron-J6412-vs-Intel-Pentium-Silver-N6005-vs-Intel-i3-N305

Like frollic has already said, "It depends."

Are you running internet applications, like a point-of-sale system, or hosting a big forum or game server, or otherwise exposing significant numbers of ports and services to the world at large? I'm guessing no, as that's the domain of enterprise systems. Such systems need a "big router", because they require fancy traffic analysis (DPI - deep packet inspection, see Snort and Suricata as examples) to protect these assets from attack.

Are you behind a reasonably competent residential ISP? If so, then you don't have to worry about incoming DOS attacks, they do that for you, so another "big router" item off the table.

Are you thinking that you might make the box into a VM/podman/docker/proxmox/whatever server, and run OpenWrt in a VM or container as a service? Ooh, you'll get a lot of objections to that scenario (I'll be one of the first :grin:). My philosophy is leave the router box standalone, simple and clean, reducing attack surface as much as possible. Sure build a big VM host, but make it a different box than your router (my big one is a 7950x with 64G ram, perfect for that purpose).

The "normal" applications most of the forum members (I'm sure others will chime in on this) here run are things like wireguard/vpn packages, ad blockers/DNS alternatives, SQM and so on, all of which will run just fine on your J6412. I've had my N5105 as an experimental subnet box for over 2 years now, and I still feel no need to "promote" it to the gateway position, my ancient 2014 PC Engines APU2 works just fine for that, even with its puny AMD Jaguar CPU.

1 Like

Guys,

I will do a fresh install most likely tomorrow. I had a couple of lessons learned. I was running on 24.10.0-rc5. I had two wireguard clients based on policy based rules. Had static ip and ran well with the exception of the DNS leak. I tried cli uci, but nothing. I edited dhcp and nothing. To make matters worst after I did that it crashed my system I could ping from ssh,but internet.

How do I properly have DNS set by interface? I went to interface and advanced settings while using the custom field, but did not work.

I am trying have is Mullvad keep its vpn dns (that was the main dns on system). Have WAN go through quad 9 dns over tls and do the same with my second vpn.

I think I am so close. Any guidance would be appreciated.

I'm not familiar enough with the LuCi interface, but technically you can manually change DNS options in /etc/config/dhcp. Manual editing of these config files is not encouraged around here but at least for me, this is way more straightforward than via LuCi. In that file, you will see config dnsmasq. Under that config, you can add option interface '[interface]'. For multiple interfaces, specify multiple interfaces rather than one. Note that by default, dnsmasq listens on all interfaces. With this option, it will only listen on interfaces you set in the option. You can also have multiple dnsmasq instances by having multiple config dnsmasq entries and assign each one to certain interfaces. To check the result, restart the dnsmasq service: service dnsmasq restart. After restarting the service, you can also check what it writes to log when starting up by issuing the logread command, to make sure there are no errors.

For reference:

https://openwrt.org/docs/guide-user/base-system/dhcp

1 Like

Like this?

config dnsmasq
interface=eth0
server=192.168.0.2
bind-interfaces

config dnsmasq
interface=mullvad
server=9.9.9.9
bind-interfaces

config dnsmasq
interface=VPN2
server=1.1.1.1
bind-interfaces

You need to see how the file is formatted and add an entry with the same format. No need to guess. Also see the syntax here:

https://openwrt.org/docs/guide-user/base-system/uci

I tried it and it was working, but then I stopped the interface and lost internet. I logged in ssh and notice that the info I saved was gone and i know I saved it when I edit with nano. I do have it working now with the use of policy based routing. Thank you!

Hello again,

I got the box mostly working as intended with the exception of dns leaking so decided to push all dns through vpn. Mullvad has dns blockers that do not appear to be working witgmh standard dns nor with dns over https. My box took a huge hit with dns over https dropped 80β„… performance. I wanted to see if you knew of a way in luci or cli that i can force my mullvad to be the default gateway even if I loss power ir reboot. I wanna have the option that if a new device connects it will be through the primary vpn and not the secondry.

Thanks

Yow, that's very much unexpected.

That's outside my realm, some one else might know.

You should start new threads for either or both of those things, get some fresh eyes on them.

Do you mind to run a refresh OpenWrt and contribute some results here?

1 Like

Hello Guys ands Gals,

I installed the nee candidate. I got internet again, but no luci not working although it is running supposedly. Any suggestions?