Network configuration: Difference between revisions

From Wildsong
Jump to navigationJump to search
Brian Wilson (talk | contribs)
Brian Wilson (talk | contribs)
 
(4 intermediate revisions by the same user not shown)
Line 13: Line 13:


In the kitchen downstairs,
In the kitchen downstairs,
* Unifi AP-AC-Lite access point; Unifi controller in Docker on Bellman
* Vilo 6 AP set in bridge mode


The access point was moved downstairs to put it closer to where we usually use it. It's on POE from the router.
The access point was moved downstairs to put it closer to where we usually use it.  


The router has a 24vdc supply connected to its coaxial port. Initially I used a POE injector but it was throttling throughput to 100Mbps and that became a problem when Spectrum started giving us 300Mbps service.
The router has a 24vdc supply connected to its coaxial port. Initially I used a POE injector but it was throttling throughput to 100Mbps and that became a problem when Spectrum started giving us 300Mbps service.
Line 25: Line 25:
* WLAN wildsong2 2.4 GHz
* WLAN wildsong2 2.4 GHz
* WLAN wildsong5 5 GHz
* WLAN wildsong5 5 GHz
* DHCP via ERX router
* DHCP via Synology "Wenda"
* DNS via dnsmasq on Bellman
* DNS via Pihole (dnsmasq) on Bellman
* Public DNS (both hosting and resolving) via [https://cloudflare.com/ Cloudflare]. Cloudflare gets a 5 star rating.
* Public DNS (both hosting and resolving) via [https://cloudflare.com/ Cloudflare]. Cloudflare gets a 5 star rating.


Line 41: Line 41:
* [[Murre]] Windows 10 Desktop
* [[Murre]] Windows 10 Desktop
* Other random gadgets come and go including a few Raspberry Pi's
* Other random gadgets come and go including a few Raspberry Pi's
* 1 Grandstream Android phone (called "studio")


== Wireless via Unifi ==
===== Services in Docker =====
'''Cloudflare Zero Trust''' is now being used to hide all services running in Docker containers on [[W6GKD]] and on [[Bellman]].
 
This includes wiki.wildsong.biz and hupi.org.
 
They can be moved between W6GKD and Bellman whenever the need arises.
 
More notes on [[Cloudflare]]
 
== Wireless via Vilo 6 ==


Laptops
Laptops
Line 60: Line 68:


=== EdgeRouter-X aka ERX ===
=== EdgeRouter-X aka ERX ===
2023-12-3 v2.0.9-hotfix.7


2023-11-08 To access Home Assistant from work, it has to be reachable over a normal port, which means 443 or possibly 8443. Since I put TLS onto HA,  
2023-11-08 To access Home Assistant from work, it has to be reachable over a normal port, which means 443 or possibly 8443. Since I put TLS onto HA,  

Latest revision as of 21:43, 12 September 2024

These are notes on the configuration of my home network.

Hardware

In structured media panel

  • DOCSIS modem provided by Spectrum (no WiFi)
  • Ubiquiti Edgerouter (ERX); eth0 = WAN and switch0 = 4 ports LAN

In eLab rack

  • 8 port DLINK 1G unmanaged switch
  • Bellman, an Intel NUC
  • Wenda, a Synology

In the kitchen downstairs,

  • Vilo 6 AP set in bridge mode

The access point was moved downstairs to put it closer to where we usually use it.

The router has a 24vdc supply connected to its coaxial port. Initially I used a POE injector but it was throttling throughput to 100Mbps and that became a problem when Spectrum started giving us 300Mbps service.

Services

  • Firewall via ERX
  • Firewall on Bellman via IPTABLES
  • WLAN wildsong2 2.4 GHz
  • WLAN wildsong5 5 GHz
  • DHCP via Synology "Wenda"
  • DNS via Pihole (dnsmasq) on Bellman
  • Public DNS (both hosting and resolving) via Cloudflare. Cloudflare gets a 5 star rating.

TODO: set up a really lightweight SIP server (Asterisk is fine I suppose) so that I can use my vintage phones. Maybe even put one in the kitchen again! Make Twilio do most of the work.

TODO: Allow network to function when Bellman is down = move DNS to router, I've tried a couple times now. See the ERX section. Maybe running it on Bellman is not so bad.

TODO: Better backups (always)

Wired network

  • Bellman server
  • Murre Windows 10 Desktop
  • Other random gadgets come and go including a few Raspberry Pi's
Services in Docker

Cloudflare Zero Trust is now being used to hide all services running in Docker containers on W6GKD and on Bellman.

This includes wiki.wildsong.biz and hupi.org.

They can be moved between W6GKD and Bellman whenever the need arises.

More notes on Cloudflare

Wireless via Vilo 6

Laptops

Devices

  • Squeezebox (2.4 only)
  • 6 FEIT dimmers (2.4 only)
  • 4 Martin Jerry switches (2.4 only)
  • Random other ESP32 and ESP8266 and nRF and Pi devices come and go.

Configuration notes

EdgeRouter-X aka ERX

2023-12-3 v2.0.9-hotfix.7

2023-11-08 To access Home Assistant from work, it has to be reachable over a normal port, which means 443 or possibly 8443. Since I put TLS onto HA, I can't pass it through the free version of Varnish/Hitch. But I don't think I need to. So I am going to try port forwarding on port 8443 for HA and see if it goes through the Company firewall.

2023-08-18 Changed rules for Traccar GPS to Home Assistant.

2023-02-23 Changed firewall rules limit SSH port 22 to work, vultr, tektonic. Secret! LOL I did this by editing config.boot as described below.

2022-08-24 Put it on a 24V supply and programmed eth4 for POE pass-thru. Eliminated POE injector and increased speeds to Internet from 100 to 300Mbs.

2022-02-25 Updated the boot file and rebooted.

2022-02-25 Checked the DDNS set up but not convinced it does anything since it says "1 Jan 1970' in "show dns dymanic status"

2022-02-18 Installed Wireguard on the ERX

2022-02-17 Updated to 2.0.9 firmware; I wonder what (of significance to me) changed.

2019-08-04 DNS on the ERX basically was too hard to manage, so it's back on Bellman. Including DHCP for integration. DDNS is still on the ERX.

2018-06-29 as mentioned above, ERX is now doing all DHCP and DNS service via DNSMASQ.

2018-12-19 installed 1.10.8 firmware

Use bwilson account to get access

You can SSH into it (ssh gw) or go to its web interface.

Port forwarding to Bellman

  • SSH (using secret port #) I changed both the firewall and bellman to use the same port number.
  • Asterisk (UDP for RTP, 5060-5061 for SIP)
  • 8443 (goes to Varnish/Hitch on Bellman)
  • HTTPS on port 443 goes to the Home Assistant port 8123 on Bellman

Masquerade for outbound traffic

DNS and DDNS set up

This router does DDNS to Cloudflare. For internal web access use https://gw/#Services/DNS -- but I set it up with CLI. When debugging keep in mind it's using ddclient and you can open up the executable if you want because it's just perl source code.

Another tip - grab the ddclient source from github and look at the sample files.

Command line: ssh [/cdn-cgi/l/email-protection [email protected]] (from Bellman typically)

configure
set service dns dynamic interface eth0 service custom-cloudflare protocol cloudflare
set service dns dynamic interface eth0 service custom-cloudflare server www.cloudflare.com

set service dns dynamic interface eth0 service custom-cloudflare host-name bellman.wildsong.biz
set service dns dynamic interface eth0 service custom-cloudflare login "[/cdn-cgi/l/email-protection [email protected]]"
set service dns dynamic interface eth0 service custom-cloudflare password "API KEY GOES HERE"

set service dns dynamic interface eth0 service custom-cloudflare options "zone=wildsong.biz ssl=yes"
set service dns dynamic interface eth0 service custom-cloudflare options "zone=wildsong.biz use=web ssl=yes"

# inside dns
set system static-host-mapping host-name geoserver.wildsong.biz inet 192.168.123.2
commit
save
exit

For good hints, see GreenUkr at https://community.ui.com/questions/EdgeRouter-X-DNS-local-hosts-resolved-using-Dnsmasq/dd3b1d6a-b018-4c31-bda0-b5ddf464392d

To see current settings:

show service dns
dns {
    dynamic {
        interface eth0 {
            service custom-cloudflare {
                host-name bellman.wildsong.biz
                login [/cdn-cgi/l/email-protection [email protected]]
                options "zone=wildsong.biz ssl=yes"
                password PASSWORD REDACTED, SEE PSONO DATABASE ENTRY FOR CLOUDFLARE
                protocol cloudflare
                server www.cloudflare.com
            }
        }
    }
    forwarding {
        cache-size 400
        listen-on switch0
        name-server 1.1.1.1
        name-server 1.0.0.1
        options domain=wildsong.biz
        options local=/wildsong.biz/
        options local=//
        options server=/wiki.wildsong.biz/1.1.1.1
        options server=/www.wildsong.biz/1.1.1.1
        options server=/dart.wildsong.biz/1.1.1.1
        options server=/aurora.wildsong.biz/1.1.1.1
        options server=/wildsong.biz/1.1.1.1
        options dhcp-authoritative
    }
}

I put some static DHCP mappings in for gw and bellman even though they are not normally on DHCP and this makes name lookups for them work.

Use this command to get status:

show dns dynamic status

Force update:

update dns dynamic interface eth0

Test

ddclient -daemon=0 -debug -verbose -noquiet -file=/etc/ddclient/ddclient_eth0.conf

This makes me nervous but it's saying it is a WARNING.

Dec 21 02:51:10 ubnt ddclient[28406]: WARNING:  file /var/cache/ddclient/ddclient_eth0.cache, line 3: Invalid Value for keyword 'ip' = 
Dec 21 02:51:11 ubnt ddclient[28406]: WARNING:  skipping update of bellman.wildsong.biz from <nothing> to 71.8.165.46.

Firewall ruleset

In the Port Forwarding tab, turn off the feature that automatically allows port forwarded traffic.

In the WAN_IN ruleset, I have these rules now

  1. Allow established/related
  2. Drop invalid state
  3. Accept media traffic - ports 10000-20000 both TCP and UDP
  4. Accept all Twilio traffic for North America (using a group)
  5. Accept SSH destination bellman port 22 (ssh_whitelist only)
  6. Accept HTTPS destination bellman port 443 and port 8443

Tuning a firewall rule remotely by editing config.boot

I like using vi to make small changes to the existing config, I only have to use a few unfamiliar commands that way.

  1. Log in via ssh (goto bellman first and then ssh [/cdn-cgi/l/email-protection [email protected]]).
  2. Assume rootly powers, sudo -s
  3. Make a copy of the config file, for example, cd /config; cp config.boot config.boot.geoserver
  4. Edit the copy, vi config.boot.geoserver
  5. Use these commands
configure
load config.boot.geoserver
compare saved

If the changes look like what you actually want, go for it, the worst thing that you can do is lock yourself out of your network!

commit

The new config is now operational. Test it, edit and commit again if you want, until it works. If you want at this point you could reload the old config and you are back where you were:

# Fall back to old config
load config.boot
commit

OR move forward

save
exit 

and that's it.

Getting hammered from the Internet on my Asterisk server

Set up a whitelist for Twilio and block all other outside SIP traffic.

"Simply create an address group, name it "whitelist" and add the allowed IP addresses.

Now go to the firewall tab and look for the ruleset that blocks the traffic. Add a new rule and allow the traffic for this address group under the source/destination tab - depending on what you want to whitelist. Be sure to check the rule order so the "allow" comes before any "reject" or "drop". Otherwise the connection might be rejected/denied before the whitelist rule gets even checked..."

It appears to be working; I can still see attempts in the "STATS" tab for WAN-IN but nothing on the Asterisk console. This should reduce the work that Bellman has to do, checking ACL lists.

Getting syn flooded from 23.225.141.70

ssh 192.168.123.1
configure

# Find a good rule number to use
show firewall name WAN_IN

# Add the rule to blacklist the attacker
set firewall name WAN_IN rule 40 action drop
set firewall name WAN_IN rule 40 source address 23.225.141.70
set firewall name WAN_IN rule 40 protocol tcp
commit; save

# Did not work!
delete firewall name WAN_IN rule 40
commit; save
# Heavy handed, but we're running all services on HTTP anyway
# Just drop port forwarding for port 80!
show port-forward
rule 4 {
    description HTTP
    forward-to {
        address 192.168.123.2
        port 80
    }
    original-port 80
    protocol tcp
}
...
delete port-forward rule 4
commit; save

This worked. For now anyway.

Unifi

Use vastra or admin account to get access to UniFi server in Docker.

2018-11-05 WAP Firmware revision is 3.9.27.8537; as of today, 3.9.54.9373 is available but not worth installing.