Enable IP6 and IP4 forwarding so apps like ZeroTier can be used to remotely connect to the physical network? A bit like a VPN

Is it possible for the engineering team to update the next firmware to allow IP6 and IP4 forwarding and also load a set of kernel drivers by default? All the kernel drivers are already present in the current firmware, they are just not loaded when the OS5 loads.

Between ZeroTier and Stefaan Ghysels all the work has already been done because I’ve got this configuration working right now. I’ve stumbled across this after installing the 3rd party OS5 compatible manually installed Docker app.

What mean by this is better shown by a sh code example:

drivers=(
"/usr/local/modules/driver/nf_conntrack.ko"
"/usr/local/modules/driver/nf_nat.ko"
"/usr/local/modules/driver/nf_defrag_ipv4.ko"
"/usr/local/modules/driver/nf_conntrack_ipv4.ko"
"/usr/local/modules/driver/nf_nat_ipv4.ko"
# "/usr/local/modules/driver/nf_defrag_ipv6.ko"
# "/usr/local/modules/driver/nf_conntrack_ipv6.ko"
"/usr/local/modules/driver/x_tables.ko"
"/usr/local/modules/driver/xt_conntrack.ko"
"/usr/local/modules/driver/xt_addrtype.ko"
#"/usr/local/modules/driver/xt_mark.ko"
#"/usr/local/modules/driver/xt_policy.ko"
"/usr/local/modules/driver/xt_tcpudp.ko"
"/usr/local/modules/driver/xt_nat.ko"
"/usr/local/modules/driver/nf_nat_masquerade_ipv4.ko"
"/usr/local/modules/driver/ipt_MASQUERADE.ko"
#"/usr/local/modules/driver/ipt_REJECT.ko"
#"/usr/local/modules/driver/ipt_ULOG.ko"
#"/usr/local/modules/driver/ip6_tables.ko"
#"/usr/local/modules/driver/ip6t_REJECT.ko"
#"/usr/local/modules/driver/ip6t_ipv6header.ko"
#"/usr/local/modules/driver/ip6table_filter.ko"
#"/usr/local/modules/driver/ip6table_mangle.ko"
"/usr/local/modules/driver/ip_tables.ko"
"/usr/local/modules/driver/iptable_filter.ko"
#"/usr/local/modules/driver/iptable_mangle.ko"
"/usr/local/modules/driver/iptable_nat.ko"
"/usr/local/modules/driver/llc.ko"
"/usr/local/modules/driver/stp.ko"
"/usr/local/modules/driver/bridge.ko"
"/usr/local/modules/driver/br_netfilter.ko"
)

for m in "${drivers[@]}"; do
  echo "Loading $m"
  if ! insmod $m ; then
    echo failed to load $m
  fi
  #sleep 1
done

How this helps is that I’ve got the DL4100 as a node on a private ZeroTier network and when I’ve got my phone, laptop, etc… connected to the ZeroTier network from anywhere on the planet, I can actually access all the devices on the physical network (which is on a different subnet) following the following KB article on ZeroTier.

https://zerotier.atlassian.net/wiki/spaces/SD/pages/224395274/Route+between+ZeroTier+and+Physical+Networks

I have actually got this to work on IP4. The code that loads the drivers to allow ip masqurade and nat is in the third party Docker app script that Stefaan Ghysels has written.

The work has all been done. The Engineering Team just needs to make the simple changes as part of the official firmware.