Skip to main content

The Muti Metroo Suite

Muti Metroo is part of a three-component suite designed to cover the full spectrum of mesh networking needs -- from encrypted traffic tunneling, to transparent OS-level routing, to browser-based management. Each component is a standalone binary that can be deployed independently, but together they form a complete networking solution.

Component Roles

ComponentPurposePlatformRequires Root
Muti MetrooMesh networking agent -- encrypted tunnels, SOCKS5 proxy, multi-hop routingAll (Linux, macOS, Windows)No
MutiaukTUN interface -- transparent L3 traffic interception through the SOCKS5 proxyLinux onlyYes
Metroo ManagerWeb dashboard -- browser-based monitoring, management, and remote accessAll (Linux, macOS, Windows)No

Architecture

The following diagram shows how the three components interact:

Traffic paths:

  • SOCKS-aware applications connect directly to Muti Metroo's SOCKS5 proxy
  • All other applications have their traffic transparently intercepted by Mutiauk's TUN interface and forwarded through the SOCKS5 proxy
  • Operators use Metroo Manager's web UI to monitor the mesh topology, manage routes, access remote shells, and transfer files

When to Use What

ScenarioComponents NeededWhy
Route traffic from a specific app (browser, curl)Muti Metroo onlyConfigure the app to use SOCKS5 proxy directly
Route all traffic from a Linux machine transparentlyMuti Metroo + MutiaukMutiauk intercepts L3 traffic so no per-app config is needed
Monitor and manage the mesh from a browserMuti Metroo + Metroo ManagerManager provides a visual dashboard and remote access tools
Full deployment with transparent routing and managementAll threeComplete solution for production environments

Deployment Example

A realistic deployment using all three components:

Step 1: Deploy Muti Metroo Agents

Set up the mesh by deploying agents on each host. At minimum, you need an ingress agent (where clients connect) and an exit agent (where traffic leaves the mesh).

# On the ingress host
muti-metroo init -d ./data
muti-metroo run -c ./ingress-config.yaml

# On the exit host
muti-metroo init -d ./data
muti-metroo run -c ./exit-config.yaml

The agents connect to each other and advertise routes automatically. See First Mesh for a complete walkthrough.

Step 2: Add Mutiauk for Transparent Routing (Linux)

On any Linux client that needs transparent access to the mesh, install Mutiauk and point it at the local ingress agent's SOCKS5 proxy:

sudo mutiauk setup
# Configure:
# SOCKS5 server: 127.0.0.1:1080
# Routes: networks reachable through the mesh

sudo mutiauk daemon start

Now all applications on this machine can reach destinations through the mesh without any proxy configuration.

Step 3: Add Metroo Manager for Web Monitoring

On any machine with access to an agent's HTTP API, launch Metroo Manager:

metroo-manager -agent http://192.168.1.10:8080
# Open http://localhost:3000 in your browser

The dashboard shows the mesh topology, agent status, routes, and provides remote shell and file transfer access to all reachable agents.

Component Downloads

ComponentDownload
Muti MetrooDownload page
MutiaukDownload section
Metroo ManagerDownload section

Next Steps