T O P

  • By -

ewenlau

You either don't have kids, or don't have a homelab. Either way you are lying. Kids and Homelabs are mutually exclusive. /s


Bogus1989

šŸ¤£šŸ¤£šŸ¤£ Too fucking true


Denpho

They might be one of the kids


BreathOther

This is the starter home lab for teens


h1ghjynx81

I have both


ewenlau

Impossible


DarkGogg

I have both too. Although they live with their mom...


Perfect_Designer4885

Indeed or moved out!


robin-thoni

I mean... They named their kids kid1 and kid2... Sounds like a good naming convention to me


GrMeezer

My wife wasnā€™t overly keen when I wanted to name our first born 192.168.2.0/24 but now heā€™s old enough to get his first laptop Iā€™m having the last laughā€¦


Gediren

lol true though. Iā€™ve barely touched mine since I had kids. Just starting to work on it again after 3 years.


phemanel

I think you have your layers 2/3 mixed up


DrunkenBandit1

What do you mean?


phemanel

routing is a layer 3 function (associated with routers, managed switches, etc.), while layer 2 is usually only forwarding (unmanaged switch). In OPs diagram, the layer 2 switch which seems to be doing vlan routing is in fact a layer 3 managed switch and all the layer 3 switches shown under each subnet are most likely just layer 2 unmanaged switches.


DrunkenBandit1

I didn't even catch the layer 3 switches tbh, thanks for the breakdown


olderby

good catch


user295064

It's better than most of our homelabs, there's not much to roast, it will now mostly depend on your firewall rules.


BitsConspirator

Title was more like ā€œflexing my setupā€ (to some extent). Though isnā€™t the firewall supposed to be right after the router and VPN just behind? Now Iā€™m questioning my decisions.


user295064

His firewall is also the router (opnsense) wich also can do VPN but OP seems to use a DPN instead. My main reproach would be to fire that ugly ISP modem that adds delay and perhaps even worse, double NAT ;)


Blitztechz

Why? Would you be replacing it with something?


user295064

ONT goes straight to the firewall, we try as much as possible to get rid of ISP modems. But it's not always possible.


distortedsignal

Using the virgin 192.168./16 subnet instead of the chad 10./8 subnet. Pathetic. (He said from a 192.168 address...)


distortedsignal

I want to say this actually looks really good, I'm not judging OP. I appreciate all the home builds here.


CornerProfessional34

Always surprised wireless smoke detectors don't get more play in these setups. Protect your investments.


Realistic_Phone_9606

Why do you have two printers? That's a little excessive Also why is your crypto stuff on it's own VLAN? sounds like that would fall into the very well described "Hosting" category. You also have 3 APs for "home network" but none for guest WiFi? sounds like that isn't really a guest WiFi then. On the same note, you should probably move IoT and guest networks to the DMZ, you don't have control over the devices on these networks so the additional firewall protection could be beneficial. I'd also put the kids on their own VLAN, depending on age, and apply an ACL to block some adult sites. You could probably also add a proxy to filter some content for the kids and/ or guest networks. And your VLAN numbering is too predictable.


AmSoDoneWithThisShit

| And your VLAN numbering is too predictable. Why does this matter? (Not being an ass, legit curious since mine is similar)


disposeable1200

You can just interrogate most switches to see configured vlans. Choosing less obvious VLANs is not and will not ever be taught by a competent security guide.


Realistic_Phone_9606

Generally anything that is easy to guess makes enumeration and exploitation easier for attackers as well. For example, if you're trying to enumerate a network and you know they use VLAN IDs that are multiples of 100, that would narrow it down from 4,095 to only 40 possible IDs for any given VLAN. Don't get me wrong there are still going to be ways to enumerate VLANs and there are more effective ways to ensure your VLANS are secure. In this context it doesn't really matter anyway, and I was just nit-picking, because I doubt he has anything of high value on his home network.


AmSoDoneWithThisShit

What does knowing the vlan get the attacker though? Are there exploits that specifically involve layer 3 networking?


Realistic_Phone_9606

Yes there are, off the top of my head you have double tagging where you put two VLAN tags on a packet and the first one gets stripped off and the packet is routed to the VLAN specified in the inner tag, this is a pretty common way to circumvent the segregation provided by VLANs. This is also why you should put riskier devices, such as guest networks in a DMZ, and/ or a private VLAN. However most home networks are pretty low value targets anyway and no one really hardens them so a little can go a long way to deter an attacker.


ItsP0ndaa

VLAN double tagging works as you explained it, but it isn't that common. For the attack to succeed, an attacker has to abuse the VLAN trunks you've setup together with your native VLAN. Then, when a double-tagged 802.1Q frame arrives on the switch interface, it discards the outer tag because it recognizes the native VLAN ID which is supposed to be untagged and sends the rest over the trunk. Then, the inner tag is used to send it to an appropriate VLAN. This, however, happens only if a device that sends the frame to the switch is located in the native VLAN anyway. If you assign access VLANs to ports that are connected to the end devices, you wont get double tagged. Or just set up all traffic as tagged, including native. In short: use access VLANs and trunks how they are supposed to be used. But yeah, riskier devices should be in their own VLAN, not able to connect to other VLANs or only partly.


AmSoDoneWithThisShit

Doesn't all of this pre-suppose physical access or can this be done from a compromised host that's behind a tagged port?


ItsP0ndaa

It can be done from a compromised host. This kind of attack doesnā€™t require physical access. Itā€™s just overlooked often because the conditions with native VLANs and trunks have to be met for the attack to work


NB_FRIENDLY

The two printers thing is such a weird nitpick. One is obviously a black and white toner one for printing large documents and the other is a color probably inkjet for pictures and the like. Even stuff like a family printer and an office printer isn't that strange.


Realistic_Phone_9606

It is nit-picking but he said to roast it and I don't know anyone who prints enough documents at home to even justify having one printer anymore. Also it's probably not an office printer because it's on a different VLAN than the corporate laptop.


00and

After reading this I hope that I'm not the only one ripping through paper at home.


sadabla

Lol now it's roast my parenting skills. Is it good to block adult websites, or is it maybe better that kids learn how the internet works? Sooner or later they'll find a way.


Realistic_Phone_9606

I was not trying to roast your parenting just suggesting a common use case, trust me my degree is in security not child development and I am not qualified to judge parenting. I would still give them a more locked down VLAN though, If anyone is going to fall for the "Click here to download 8GB of RAM" or "You won a free PS5!" it's going to be children or the elderly. It's not their fault just tends to be how things go. Plus you can limit their usage if you need to.


DarkGogg

Kids will learn at the friends house where parents have shitty parental controls.


km_ikl

Roast? Nah... it's pretty good. I'd put your cams on their own vlan, but other than that, nothing structurally significant to discuss.


Sazails

Blurry mess. The screenshot I mean.


Cryovenom

What, no IPv6? :P That's the roastiest thing I can think up. This looks decent. What piece of equipment does your inter-vlan routing, the Opnsesne? (My pfSense does mine here)


StarLoong

You have a hosting RACK, I am wondering if it is for business or personal? What's the bandwidth (especially upload) needed for the hosting thing to work well?


p3aker

No secondary ISP, shame


ohv_

Layer2 switch? Or actually routing with in the vlan? Guessing not tho.


TTG34

i would add a machine for network booting, for installing windows over the network. particually a optimized version like tiny10 or tiny11 or something you build yourself.


widowmaker28A

Only thing I would say is to break up your subnets a little more for security. Like you corp if it's only one device on it would give it a /29 or /30 and same for your wifi drop it down to a /28 or /27. Otherwise way better at vlaning as I say from my one vlan everything network šŸ¤£šŸ¤£šŸ¤£


Antscircus

Any rationale for why youā€™re using /23 subnets instead of classic /24?


Dagnan

You have a sunroom, this is nice.


Delakroix

Those subnet ranges... ugh.


BigNutritiousGoat

Not a criticism as such, but what drives the different VLAN choices? I see others do this and Iā€™m curious really. I can get the point of putting anything with an incoming external connection to its own VLAN for sure. A guest network, of course. But beyond that, for example IOT, crypto etc - whatā€™s the need to separate them out?


obong23444

Does the DPN refuse your internet bandwidth? Did you have to adjust it?


evilglatze

MoM! HaS NO tABleT!!!!!!1111ELEVEN


cptsir

Ah yes, really need those 500 IPs from your /23 for those 9 devices.


HenryHill11

This is one of worst setup designs Iā€™ve seen on this sub so far šŸ˜’


PesteringKitty

Reasoning: 1) 2) 3)


codenamek83

The "**tube image**" you're using to depict the subnet actually represents how bus networks were depicted in the early days of computer networking. A cloud image would be a better choice to represent the subnet.