DEV Community

Vu
Vu

Posted on

Home Lab Networking

Hi folks, welcome to my tutorial for building Homelab. In this part, I will cover some setup I am setting on my server.

Of course, I need to plan a network. I haven't setup a network before, so this is one of the challenges for me.

flowchart TD;
    I[Internet]
    I1[GPON]
    I2[Main Router </br> 192.168.100.1]

    subgraph P1[Proxmox Server]
        P2[Physic Port Network </br> IP: 192.168.100.2/24]
        P3[Logical Network </br> IP: 192.168.100.2/24]

        subgraph vmbr0[vmbr0 Open vSwitch]
            LXC1[AdguardHome </br>192.168.100.x]
            LXC2[Pihole </br>192.168.100.x]
            LXC3[Dockerlxc </br>192.168.100.x]
        end 

        VM1[pfSense VM Firewall]

        subgraph vmbr1[vmbr1 Open vSwitch]
            VM2[VM </br> 10.0.50.x]
            VM3[VM </br> 10.0.70.x]
            VM4[VM </br> 10.0.24.x]
        end 
    end



    I --Optical_fiber--> I1
    I1 --RJ45--> I2
    I2 --RJ45--> P2
    P2 --hypervisor--> P3
    P3 --> LXC1
    P3 --> LXC2
    P3 --> LXC3
    P3 ----> VM1[pfSense VM Firewall </br> WAN/vtnet0: 192.168.100.147 </br> </br> LAN/vtnet1: 10.0.1.1/24 </br> </br> LAN/vtnet1.50: 10.0.50.1/24 </br> </br> LAN/vtnet1.70:1.70: 10.0.70.1/24 </br> </br> LAN/vtnet1.24: 10.0.24.1/24]

    VM1 --vlan1.50--> VM2
    VM1 --vlan1.70--> VM3
    VM1 --vlan1.24--> VM4
Enter fullscreen mode Exit fullscreen mode

Image description

And this is my network diagram, let's break down it:

  1. Internet.
  2. GPON(fiber).
  3. Main router.
    • For wifi and port forwarding.
  4. Proxmox server on MS-01.
  5. vmbr0 (Open vSwitch).
    • Bridged to the logical interface
    • Any VMs attached to this virtual switch will be on your home router’s LAN
  6. Virtual pfSense firewall
    • WAN Port (vtnet0 interface)
      • This is not a public IP, but rather a private IP on your home router’s LAN
      • Attached to VMBR0
      • Allows traffic to get out to the LAN and to the Internet via your home router’s WAN port
    • LAN Port (vtnet1 interface)
      • Provides another virtual LAN for VMBR1
      • Firewall rules will dictate how traffic is routed between subnets
      • VLANs are defined as sub-interfaces on vtnet1
        • vtnet1 (native): 10.0.1.0/24
          • Any machine that is not tagged with a VLAN.
        • vtnet1.50 - 10.0.50.0/24
          • Sec egress network.
        • vtnet1.70 - 10.0.70.0/24
          • Private VMs.
        • vtnet1.345 - 10.0.24.0/24
          • Net for testing purposes.
  7. vmbr1 (Open vSwitch)
    • Connect to pfSense LAN port.
    • Any VM, LXC will be connected to it, we can define the VLAN tags.
Why do we need it?
  • I haven't used the firewall before, so this is my first time and I want to use to firewall (pfSense or OPNsense).
  • I don't have a physical switch with trunk ports so I can use it in the pfSense virtual.
  • You have only one network in card (NIC) such as laptop.
Reference
  • Special thanks Benheter for detail the blog that I can follow and implement.

Image of Timescale

🚀 pgai Vectorizer: SQLAlchemy and LiteLLM Make Vector Search Simple

We built pgai Vectorizer to simplify embedding management for AI applications—without needing a separate database or complex infrastructure. Since launch, developers have created over 3,000 vectorizers on Timescale Cloud, with many more self-hosted.

Read full post →

Top comments (0)

Sentry image

See why 4M developers consider Sentry, “not bad.”

Fixing code doesn’t have to be the worst part of your day. Learn how Sentry can help.

Learn more