- On FLINT1 I will add two VLANs; Guest1 and Arbitrary1 that will not have access to the basic vlan
- On FLINT2 I will add two VLANs; Guest2 and Arbitrary2 that will not have access to the basic vlan
- The setup should be able to be altered to accommodate iBGP or VXLAN in the future (or any other items I might want to experiment with)
This is a blog mostly about techie things, what I am doing to my apartment network on the cheap, IOT, 3D Printing, Raspberry Pis, Arduinos, ESP32, ESP8266, Home Automation, Personal Weather Stations, Things That Go Bump in the Night, and some side issues that need discussing. Remember, sometimes the journey to an end is as much fun as the goal achieved!
Wednesday, July 2, 2025
Project #35 - Adding VLANS to the FLINT1 and FLINT2 routers
State of the Network in June 2025
- Complete the task of setting up a Certificate Authority in the HomeLab=
- Add VLANs to the FLINT2 router
- Arrange the power so that the FLINT2 router can remain on if I shutdown the Rack
- Alter the way that I connect my laptop to the network so that it remains connected at all times on the correct VLAN
- Implement the PiHole to give out DNS and DHCP IPs within the HomeLab
- Work up some 3D printed components to stage the remaining Raspberry Pis external to the Rack, but still be present within the HomeLab
- Work up the use of my STREAM deck to issue MQTT messages for HomeLab control
- Spin up a file server on the HomeLab
- Finish setting up the Raspberry Pi display/controller; connected via Tailscale
Tuesday, June 10, 2025
Project #34 - Creating a Certificate Authority for the HomeLab Infrastructure
I have been needing for a long time to create a Certificate Authority so that I will not be using self signed certificates and simply avoiding the checks on various equipment. This needs to change so that it provides a measure of security in the HomeLab that makes sense.
There have been a number of articles about creation of a Certificate Authority, however one in particular seems to be the one that I could use best. The reason is that it provides intermediate certificate authorities. That article is at https://jamielinux.com/docs/openssl-certificate-authority/index.html. I have made a pdf of that site to work its magic.
Obviously, this will require me to make some modifications to make it easier to accomplish, such as using some scripts for the process. I might also make use of an ACME like internal Certificate Authority to automatically update the certificates. Note that this is in addition to the certificates already created in the Tailscale VPN implementation.
Trying to Get Back into the Groove of HomeLab
I admit it, I have been relaxed in updating this blog. Lately it's been because of the death of an immediate member of my family and the birth of another. So, I have been experiencing the lows and highs of emotion. However, I intend on getting back on task since I need to have a focus area.
I intend on revisiting the projects that I have not completed; dropping some, attacking the remainder, and coming up with new projects to keep the entry into HomeLab fully up to date. I think that I will focus on three things:
- Setting up a certificate authority/creation process so that all infrastructure is encrypted
- Setting up a NAS for my HomeLab
- Setting up PiHole so that I can use its features to start removing ads
Friday, April 11, 2025
Project #33 - Moving the DHCP and DNS over to PiHole
This is one project that has stuck in my craw for a number of years. I am now in a situation where I am about to change out my network to be in two pieces. I have enough computers to think about a centralized DHCP/DNS server for the network. I have used PiHole in the past but now I want to make that the default for all of the routers in my network. The rub is, I have all of these vlans that need attention when I am giving out IP addresses. This will be an effort to consolidate the IP gathering and DNS entries into one location that is easier to control. Some specifics of what I want to do are:
- setup my Netgear switches to force certain IP ranges to certain vlans
- use PiHole to issue DHCP IP addresses tied to their MAC addresses
- if the MAC address is unknown, push it to a guest network
- include both the FLINT1 and FLINT2 routers in the mix
- modify my FLINT2 setup to have one guest network vlan that is passthrough
Monday, December 9, 2024
Altering the rack connection so that floor work can be done
Saturday, December 7, 2024
State of the Network in December 2024
- I have changed the configuration of the rack and have removed the switch for the xPod, and removed both of the special purpose Edgerouter-X boxes
- I added a 24 port 1U keystone panel at the bottom to use for projects in the future
- I removed the SLATE router from the living room, since I was not using it very much
- I am first going to start by modifying a test RPi to have two or more namespaces using OpenVSwitch to provide a NAT router function between the NS
- I will also setup the routing tables to make the two NS get their IPs from different DHCP servers
- I am also going to setup a set of Docker containers that lie on either side of the NAT router
- I want to test the idea that normal flow across the NAT is controlled
- I want to test the setup being done via Ansible
- I am going to print a rack panel to mount a GS108T and ER-X at the bottom of the rack for future projects