Setting Up Omada Controller on a Raspberry Pi 4 with Docker


Managing TP-Link EAP devices becomes a breeze when you have a centralized controller. In this guide, we’ll walk through the steps to set up an Omada Controller on a Raspberry Pi 4 using Docker. This is an excellent solution for both home and small business networks.


  • Raspberry Pi 4 with 4GB RAM
  • Docker installed on the Raspberry Pi
  • SSH access to the Raspberry Pi

Step-by-Step Guide

Step 1: SSH into Your Raspberry Pi

First, connect to your Raspberry Pi using SSH. This will allow you to execute commands remotely.

Step 2: Pull the Omada Controller Docker Image

Run the following command to pull the latest Omada Controller Docker image:

docker pull mbentley/omada-controller:latest

Step 3: Create Data Directories

Create directories to store Omada Controller’s data and work files:

mkdir -p /opt/tplink/OmadaController/data
mkdir -p /opt/tplink/OmadaController/work

Step 4: Run the Omada Controller Container

Execute the following command to run the Omada Controller container:

docker run -d \
  --name omada-controller \
  --restart unless-stopped \
  -e TZ='Europe/Copenhagen' \
  -e SMALL_FILES=false \
  -p 8088:8088 \
  -p 8043:8043 \
  -p 27001:27001/udp \
  -p 27002:27002 \
  -p 29810:29810/udp \
  -p 29811:29811 \
  -p 29812:29812 \
  -p 29813:29813 \
  -v /opt/tplink/OmadaController/data:/opt/tplink/EAPController/data \
  -v /opt/tplink/OmadaController/work:/opt/tplink/EAPController/work \

Step 5: Access the Omada Controller

Finally, open a web browser and navigate to https://<Raspberry_Pi_IP>:8043. Follow the setup wizard to complete the installation.

Note: Replace <Raspberry_Pi_IP> with the actual IP address of your Raspberry Pi.


You’ve successfully set up an Omada Controller on your Raspberry Pi 4 using Docker. This will help you manage your TP-Link EAP devices efficiently. If you have any questions or run into issues, feel free to reach out.

Feel free to add this to your homepage, and let me know if you’d like any adjustments.

Creating Your Own Omada Controller for TP-Link Omada Access Points

Managing multiple TP-Link Omada access points can be a breeze when you have your very own Omada Controller set up. In this guide, we’ll walk you through the process of creating your Omada Controller using a Raspberry Pi, giving you the power to effortlessly handle your access points. Let’s dive in!

Preparing Your Raspberry Pi

To start, make sure your Raspberry Pi is up to date:

sudo apt update && sudo apt upgrade -y
sudo reboot

Installing MongoDB

The Omada Controller relies on MongoDB. Let’s install it:

sudo apt install /home/pi/mongodb-org-server_4.4.18_arm64.deb

Ensure MongoDB is running:

sudo systemctl daemon-reload
sudo systemctl enable mongod
sudo systemctl start mongod

Installing Dependencies

You’ll need a few more tools. Install them:

sudo apt install curl autoconf make gcc openjdk-11-jdk-headless
sudo apt remove jsvc

Compiling and Installing JSVC

Download and install JSVC:

tar -xzf commons-daemon-1.3.4-src.tar.gz
cd commons-daemon-1.3.4-src/src/native/unix
sh support/
./configure --with-java=/usr/lib/jvm/java-11-openjdk-arm64

ln -s /home/pi/commons-daemon-1.3.4-src/src/native/unix/jsvc /usr/bin/

sudo mkdir /usr/lib/jvm/java-11-openjdk-arm64/lib/aarch64
sudo ln -s /usr/lib/jvm/java-11-openjdk-arm64/lib/server /usr/lib/jvm/java-11-openjdk-arm64/lib/aarch64/

Installing Omada Controller

Now, let’s get the Omada Controller on your Pi:

cd /home/pi
sudo dpkg --ignore-depends=jsvc -i Omada_SDN_Controller_v5.9.31_Linux_x64.deb

Accessing the Controller Interface

You can now access the Omada Controller’s web interface through your browser using:

  • HTTP:
  • HTTPS:

Keeping Things Updated

Keep your system and MongoDB updated:

apt list --upgradable
sudo apt-mark hold mongodb-org mongodb-org-server mongodb-org-shell mongodb-org-tools mongodb-org-mongos mongodb-org-database-tools-extra

Final Checks

Ensure everything is running smoothly:

sudo tpeap status
sudo tpeap start

If you need to stop the Omada Controller:

sudo tpeap stop

And always double-check MongoDB’s status:

service mongod status

With your very own Omada Controller up and running on your Raspberry Pi, you’re now equipped to effortlessly manage and optimize your TP-Link Omada access points. Enjoy the convenience of centralized control and efficient network management!

The Power of TP-Link EAP670 WiFi 6 Access Points for Your Home

In the ever-evolving world of technology, having a reliable and fast internet connection is non-negotiable. This is where the TP-Link EAP670 WiFi 6 Access Point shines. While it might not be a router in itself, it offers a range of features that make it an ideal choice for enhancing your home network.

1. Tailored for Excellence

The TP-Link EAP670 is a member of the Omada WiFi 6 family, designed as an access point (AP) rather than a router. This means it doesn’t come with built-in features like a DHCP server, WAN interface, or switch. However, this isn’t a drawback but an opportunity. By complementing it with the right components, you can create a network setup tailored to your needs.

2. Components for Success

To harness the power of the EAP670, you’ll need a few key components:

  • Pfsense Netgate 1100: This router and firewall with DHCP capabilities acts as the backbone of your network, ensuring smooth data flow and security.
  • TP-Link TL-SG101PE: A managed switch with Power over Ethernet (PoE+) support, this device provides power to the EAP670 while allowing you to manage your network effectively.

3. Seamless Integration

Setting up the EAP670 is a breeze. With just a single PoE+ enabled network cable, you can mount it on your wall. It draws power from the PoE switch and receives an IP address from your Pfsense router. This straightforward integration ensures your access point is up and running in no time.

4. Hassle-Free Configuration

Configuring the EAP670 is refreshingly simple. With its dedicated web interface, you can manage your WiFi settings, VLAN configurations, and even monitor connected devices. The absence of unnecessary features like DHCP and WAN capabilities streamlines the process, allowing you to focus on optimizing your wireless network.

5. Omada Controller: Choice is Yours

The EAP670 can be managed through an Omada controller, which can be set up on a Raspberry Pi or even run standalone. For single-access-point setups, the AP’s built-in web interface is sufficient. Only when managing multiple access points does the Omada controller or Omada cloud service become essential.

6. Form Meets Function

The EAP670’s design strikes a balance between form and function. Its slightly larger size (24 cm) allows for efficient heat dissipation while ensuring an aesthetically pleasing addition to your home.

7. Simple Yet Powerful

In a world where complexity often reigns, the EAP670 embraces simplicity without compromising power. It’s a versatile solution for homes where a dedicated router already handles DHCP, WAN, and firewall duties. With the ability to fine-tune WiFi settings and manage connected devices, the EAP670 stands as a testament to efficient design.


The TP-Link EAP670 WiFi 6 Access Point is a true gem for anyone seeking an enhanced home network experience. By teaming up with components like the Pfsense Netgate 1100 and TP-Link TL-SG101PE, you can create a network setup tailored to your needs. With a hassle-free setup process, intuitive configuration options, and the option to manage through an Omada controller, the EAP670 strikes the perfect balance between simplicity and functionality. Say goodbye to network woes and hello to seamless connectivity.

Safeguarding Your Digital Oasis: The Importance of Network Segmentation and Robust Security

Title: Safeguarding Your Digital Oasis: The Importance of Network Segmentation and Robust Security


In our interconnected world, the proliferation of Internet of Things (IoT) devices and the need for guest access has become increasingly common. However, the convenience comes with potential security risks that should not be ignored. In this blog post, we will emphasize the critical importance of separating IoT devices from your private network, implementing robust security measures, and maintaining up-to-date systems to create a secure digital oasis for your home or business.

  1. The Significance of Network Segmentation

Isolating IoT devices from your private network is a fundamental security practice. IoT devices often have vulnerabilities, and if compromised, they can become a gateway for hackers to access your personal data and network. By creating a separate network for these devices, you mitigate the risk of unauthorized access and protect your sensitive information.

  1. Implementing Robust Security Measures

Having a strong and well-configured firewall is paramount to safeguarding your network. A firewall acts as a gatekeeper, monitoring and controlling incoming and outgoing traffic, preventing malicious entities from gaining entry to your network. Additionally, utilizing intrusion detection and prevention systems (IDPS) adds an extra layer of security, alerting you to potential threats in real-time.

  1. Securing Guest Access

Offering guest Wi-Fi access is a common courtesy, but it should never jeopardize your private network’s security. It is essential to create a separate guest network with strong encryption and a unique password. Restricting guest access to the internet only ensures that their devices are isolated from your private network, safeguarding your data and devices from unauthorized access.

  1. Keeping Systems Up-to-Date

Maintaining regular updates for your computers, router, and firewall is a crucial practice in network security. Software developers frequently release updates to address security vulnerabilities and enhance performance. By staying current with these updates, you minimize the risk of potential exploits and ensure your network remains robust against emerging threats.

  1. Strengthening Wi-Fi Security

Securing your Wi-Fi access point is vital to prevent unauthorized access to your network. Enable WPA3 encryption, which offers the highest level of Wi-Fi security available, and use a strong, unique password that combines uppercase and lowercase letters, numbers, and special characters. Regularly change your Wi-Fi password to further enhance security.

  1. Guest Network Isolation

To ensure guest privacy and protect your network from any misconfigurations, enable client isolation on your guest network. This feature prevents devices connected to the guest network from communicating with each other, limiting their access to the internet only.


As technology becomes an integral part of our lives, ensuring the security of our networks is of utmost importance. By implementing network segmentation to separate IoT devices from the private network, creating strong security measures with up-to-date systems, and securing guest access, you create a fortress of protection for your digital oasis.

Remember, safeguarding your network is an ongoing process. Continuously update your systems, maintain robust security measures, and educate yourself on emerging threats. With these practices in place, you can confidently enjoy the benefits of technology while protecting your personal data and ensuring a safe digital environment for yourself and your guests.