Skip to content

Changelog⚓︎

Summary⚓︎

This will serve as a repository going forward for any changes made to my Homelab, including cloud hosted applications. Any corresponding documentation will be linked accordingly.

Changes

Level of effort - Large Effort

Fixed

  • Deleted orphaned child VLAN tag assignment on lagg0 interface
    • Orphaned child VLAN tag was preventing reboot, forcing a manual reassignment of VLAN tags to their respective interfaces
  • Recreated parent VLAN with a tag of VLAN2
  • Recreated VLAN2 interface
    • Created NAT outbound mapping for VLAN2
    • Recreated firewall rules for VLAN2
    • Mapped VLAN2 to VPN gateway

New

  • Decommissioned OpenVPN in favor of WireGuard
  • Configured DNS forwarder for VLAN20 and VLAN30
    • Pointed to NextDNS servers
  • Setup pfblockerNG for VPN VLANs
    • Added IP and DNS blocklists to sinkhole malicious traffic
  • Removed any rules to ingress traffic using the WAN interface
  • Configured GeoIP block to reject traffic from top spammers and proxy/satellite regions
  • Configured firewall aliases for trusted devices and trusted VLANs
  • Setup policy routing for WAN and VPN networks
  • Configured Unbound to query root servers for DNS lookups
  • Setup firewall rule to egress specific domains through the WAN gateway instead of the VPN gateway
  • Blocked admin port access for untrusted VLANs
    • Port 4443 for pfsense webGUI
    • SSH on port 8587
  • Setup VPN killswitch
    • Tagged VPN traffic on each VPN VLAN, then setup a separate rule to block any egress tagged traffic from using the WAN gateway
  • Redirected NTP lookups to pfSense for all VLANs
  • Configured DNS redirects for all VLANs
  • Blocked outbound traffic to public DNS servers on port 443
    • Block DNS over https
  • Configured Tailscale to provide secure access from Plex to VLAN30
  • Setup Cloudflare Tunnel to protect the origin IP of all services

Updated

  • Reconfigured parent interface with new VLAN for wifi VPN
  • Adjusted subnet scope for all VLANs
  • Assigned static mappings to most devices
  • Restricted cross VLAN communication on untrusted VLANs
  • Permit cross VLAN communication for trusted devices to trusted VLANs
  • Reconfigured pfSense NTP pool for the following:
    • Make use of Stratum 1 and 2 NTP servers
    • Ensure the closest available servers from the following NTP providers:
      • NTP Pool Project
      • Cloudflare Time Server
      • Apple Time Server
      • Hurricane Electric
  • Disabled Dynamic DNS for all subdomains in favor of Cloudflare Tunnel
  • Limited anti-lockout firewall rule to trusted devices

Resources

Level of effort - Small Effort

Updated

  • Set transmit power on Grove Downstairs AP to the following:
    • 2.4 GHz Radio
      • Custom (18 dBm) to Low
    • 5 GHz Radio
      • Custom (19 dBm) to Auto
  • Set transmit power on Grove Upstairs AP to the following:
    • 2.4 GHz Radio
      • Custom (21 dBm) to Low
    • 5 GHz Radio
      • Custom (21 dBm) to Auto

Level of effort - Medium Effort

New

  • Retired Unifi 24 port switch and 8 port PoE switch
    • Replaced with Unifi 48 port PoE switch (USW-48-PoE)
  • Labeled all used ports within Unifi Controller

Level of effort - Small Effort

Updated

Level of effort - Small Effort

Updated

  • Deleted all cloud firewall rules so droplet is only accessible via Tailscale for SSH or Cloudflared for https.
    • SSH access is restricted to port 8587.