network:unifi
Differences
This shows you the differences between two versions of the page.
| network:unifi [2026/01/23 18:12] – created nathna | network:unifi [2026/01/23 18:25] (current) – nathna | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | 📡 TorresVault UniFi Network | + | ====== |
| - | This page documents the full UniFi network configuration | + | This page documents the full UniFi network configuration |
| - | This serves as the official reference for configuration, | + | |
| - | ===== Overview ===== | + | This serves as the **official reference** for configuration, |
| - | The TorresVault network, managed by the UniFi UCG Max, connects: | + | ---- |
| - | Proxmox cluster (PVE1 & PVE2) | + | ===== Overview ===== |
| - | Proxmox Backup Server (PBS) | + | The TorresVault network, managed by the **UniFi UCG Max**, connects and coordinates: |
| - | TrueNAS | + | * Proxmox cluster |
| + | * Proxmox | ||
| + | * TrueNAS (backup | ||
| + | * Home Assistant + IoT ecosystem | ||
| + | * FPP Light Show network | ||
| + | * Pi-hole DNS (VIP 192.168.1.5) | ||
| + | * Local services | ||
| + | (NPM, Grafana, Prometheus, Nextcloud, Jellyfin, etc.) | ||
| - | Home Assistant + IoT ecosystem | + | Routing, VLANs, firewall, DHCP, and VPN are all handled on the **UCG Max**. |
| - | FPP Light Show network | + | ---- |
| - | Pi-hole DNS | + | ===== VLANs ===== |
| - | Local services (NPM, Grafana, Prometheus, Nextcloud, Jellyfin, etc.) | + | ^ VLAN Name ^ VLAN ID ^ Subnet |
| + | | Default | ||
| + | | stark_user | ||
| + | | stark_IOT | ||
| + | | Guest | 30 | 192.168.30.0/ | ||
| + | | IOT+ | 50 | 192.168.50.0/ | ||
| + | | Torres Family Lights | 60 | 192.168.60.0/ | ||
| - | Routing, VLANs, firewall, and DHCP are all handled on the UCG Max. | + | ---- |
| - | ===== VLANs ===== | ||
| - | VLAN Name VLAN ID Subnet Purpose | ||
| - | Default 1 192.168.1.0/ | ||
| - | stark_user 10 192.168.10.0/ | ||
| - | stark_IOT 20 192.168.20.0/ | ||
| - | Guest 30 192.168.30.0/ | ||
| - | IOT+ 50 192.168.50.0/ | ||
| - | Torres Family Lights 60 192.168.60.0/ | ||
| ===== WiFi Networks ===== | ===== WiFi Networks ===== | ||
| - | SSID VLAN Band Clients Notes | ||
| - | stark_IOT 20 2.4/ | ||
| - | stark_user 10 2.4/ | ||
| - | stark_IOT+ 50 2.4/ | ||
| - | All SSIDs are broadcast on all APs. | + | ^ SSID ^ VLAN ^ Band ^ Clients ^ Notes ^ |
| + | | stark_IOT | ||
| + | | stark_user | ||
| + | | stark_IOT+ | ||
| - | ===== Zones ===== | + | _All SSIDs broadcast across all UniFi APs._ |
| - | Zones simplify firewall rule groups: | + | ---- |
| - | Zone VLANs / Networks | + | ===== Zones ===== |
| - | Internal — | + | |
| - | External WAN1, | + | |
| - | Gateway UCG Max | + | |
| - | VPN WireGuard | + | |
| - | Hotspot VLAN 30 | + | |
| - | DMZ — | + | |
| - | User VLAN 1, 10, 60 | + | |
| - | IOT VLAN 20, 50 | + | |
| - | ===== Firewall Policy Summary | + | |
| - | Below is the condensed rule layout (no screenshots, no clutter). | + | ^ Zone ^ VLANs / Networks |
| - | This reflects your exact UniFi ruleset, organized logically. | + | | Internal | — | |
| + | | External | WAN1, WAN2 | | ||
| + | | Gateway | ||
| + | | VPN | WireGuard | ||
| + | | Hotspot | ||
| + | | DMZ | — | | ||
| + | | User | VLAN 1, 10, 60 | | ||
| + | | IOT | VLAN 20, 50 | | ||
| - | === Home Assistant Rules === | + | ---- |
| - | Home Assistant lives on the IOT VLAN (20) and needs access across the network. | + | ===== Firewall Policy Summary ===== |
| - | Allow Rules: | + | Below is the simplified rule layout (no screenshots), |
| - | IOT → User (HA → Proxmox) | + | --- |
| - | IOT → User (HA → FPP 192.168.60.55) | + | ==== Home Assistant Rules ==== |
| - | IOT → Internal | + | **Home Assistant lives on the IoT VLAN (20)** and needs access across the entire network. |
| - | IOT → User (HA → Pi-hole | + | **Allow** |
| + | * IOT → User (HA → Proxmox) | ||
| + | * IOT → User (HA → FPP 192.168.60.55) | ||
| + | * IOT → Internal (HA → Grafana 192.168.1.77) | ||
| + | * IOT → User (HA → Pi-hole DNS) | ||
| + | * IOT → User (HA → Printer 192.168.10.185) | ||
| - | IOT → User (HA → Printer 192.168.10.185) | + | **Return** |
| + | * HA → FPP (Return) | ||
| + | * HA → Pi-hole (Return) | ||
| + | * HA → Grafana (Return) | ||
| - | Return Rules: | + | **Purpose:** |
| + | Allow HA to control everything while keeping it isolated from general user devices. | ||
| - | HA → FPP (Return) | + | --- |
| - | HA → Pi-hole | + | ==== NGINX Proxy Manager |
| - | HA → Grafana | + | **Allow** |
| + | * Internal | ||
| + | * IOT → User (NPM → Nextcloud_IOT) | ||
| + | * Internal → Internal (NPM → Pi-hole) | ||
| - | Purpose: | + | **Return** |
| - | Let HA manage everything while remaining isolated from general user traffic. | + | * NPM → Internal (Return) |
| + | * NPM → Nextcloud_IOT (Return) | ||
| - | === NPM (Reverse Proxy) Rules === | + | **Purpose: |
| + | Expose only public services, keep all internal traffic local. | ||
| - | Allow Rules: | + | --- |
| - | Internal → External (NPM → Nextcloud 192.168.1.150) | + | ==== IoT Isolation Rules ==== |
| - | IOT → User (NPM → Nextcloud_IOT) | + | **Allow** |
| + | * IOT → Gateway | ||
| + | * IOT → Gateway (DNS) | ||
| + | * IOT → Pi-hole | ||
| + | * HA → Printer | ||
| + | * Printer → HA | ||
| - | Internal | + | **Block** |
| + | * IOT → User | ||
| + | * IOT → IOT | ||
| + | * IOT → External | ||
| - | Return | + | **Return** |
| + | * allow IOT → IOT (Return) | ||
| - | NPM → Internal (Return) | + | **Purpose: |
| + | Strong segmentation with precise allowed paths for Home Assistant. | ||
| - | NPM → Nextcloud IOT (Return) | + | --- |
| - | Purpose: | + | ==== VPN Rules ==== |
| - | Expose only what needs to be public, everything else stays internal. | + | |
| - | === IoT Isolation Rules === | + | WireGuard provides **trusted admin remote access**. |
| - | IoT must be isolated from user devices. | + | **Allow** |
| + | * VPN → User | ||
| + | * VPN → IOT | ||
| + | * VPN → Gateway | ||
| + | * VPN → Any | ||
| + | * Allow all return traffic | ||
| - | Allow Rules: | + | **Purpose:** |
| + | Full-access VPN strictly for administrator use. | ||
| - | IOT → Gateway (DHCP) | + | --- |
| - | IOT → Gateway | + | ===== Port Forward Rules (WAN → LAN) ===== |
| - | IOT → Pi-hole | + | ^ Forward Name ^ WAN → LAN ^ Purpose |
| + | | Nathan_Jump RDP | 3389 → 192.168.1.189 | ||
| + | | SCP → Jellyfin | ||
| + | | TrueNAS | ||
| + | | Proxmox | ||
| + | | torresvault.com | ||
| - | HA → Printer | + | All other public services run through NPM → local services. |
| - | Printer → HA | + | ---- |
| - | + | ||
| - | Block Rules: | + | |
| - | + | ||
| - | Block IOT → User | + | |
| - | + | ||
| - | Block IOT → IOT | + | |
| - | + | ||
| - | Block IOT → External | + | |
| - | + | ||
| - | Return Rules: | + | |
| - | + | ||
| - | allow IOT → IOT (Return) | + | |
| - | + | ||
| - | Purpose: | + | |
| - | Strong segmentation with controlled exceptions. | + | |
| - | + | ||
| - | === VPN Rules === | + | |
| - | + | ||
| - | WireGuard is part of the trusted admin plane. | + | |
| - | + | ||
| - | Rules: | + | |
| - | + | ||
| - | Allow VPN → User | + | |
| - | + | ||
| - | Allow VPN → IOT | + | |
| - | + | ||
| - | Allow VPN → Gateway | + | |
| - | + | ||
| - | Allow VPN → Any | + | |
| - | + | ||
| - | Allow Return Traffic | + | |
| - | + | ||
| - | Purpose: | + | |
| - | Secure remote access with full trusted privileges. | + | |
| - | + | ||
| - | === Port Forward Rules (WAN → LAN) === | + | |
| - | Forward WAN → LAN Purpose | + | |
| - | RDP Nathan_Jump 3389 → 192.168.1.189 Remote desktop | + | |
| - | SCP → Jellyfin 22 → 192.168.1.86 Media server access | + | |
| - | TrueNAS 443 → 192.168.1.150 Storage admin | + | |
| - | Proxmox 8006 → 192.168.1.150 PVE dashboard | + | |
| - | torresvault.com 80/ | + | |
| - | Purpose: | + | |
| - | Minimal public exposure, everything else internal behind NPM. | + | |
| ===== Switch Topology ===== | ===== Switch Topology ===== | ||
| - | The UniFi switch | + | The UniFi switching |
| - | UCG Max | + | * **UCG Max** |
| + | * **USW-Lite-8-PoE** | ||
| + | * **USW Flex** | ||
| + | * **USW Flex 2.5G** | ||
| + | * **UDB Switch** | ||
| + | * Multiple UniFi APs | ||
| - | USW-Lite-8-PoE | ||
| - | USW Flex | + | ---- |
| - | USW Flex 2.5G | + | ===== Local DNS ===== |
| - | UDB Switch | + | DNS is served by Pi-hole 1 & 2 via VIP: **192.168.1.5** |
| - | Multiple APs | + | ^ Domain |
| + | | ha.torresvault.com | ||
| + | | hatest.torresvault.com | ||
| + | | in.torresvault.com | ||
| + | | jellyfin.torresvault.com | ||
| + | | matrix.torresvault.com | ||
| + | | megatree.torresvault.com | ||
| + | | monitor.torresvault.com | ||
| + | | next.torresvault.com | ||
| + | | npm.torresvault.com | ||
| + | | pbs.torresvault.com | ||
| - | Network Path Summary | + | ---- |
| - | Ting Fiber → UCG Max → (Core Switches) → APs / Servers / IoT / FPP | + | |
| - | Core Layout (Simplified) | ||
| - | UCG Max | ||
| - | | ||
| - | | ||
| - | | ||
| - | | ||
| - | | ||
| - | |||
| - | |||
| - | All switches trunk all VLANs. | ||
| - | |||
| - | ===== Local DNS ===== | ||
| - | |||
| - | All DNS is served by Pi-hole 1 & 2 with VIP: 192.168.1.5 | ||
| - | |||
| - | Domain IP | ||
| - | ha.torresvault.com 192.168.20.149 | ||
| - | hatest.torresvault.com 192.168.20.150 | ||
| - | in.torresvault.com 192.168.1.27 | ||
| - | jellyfin.torresvault.com 192.168.1.86 | ||
| - | matrix.torresvault.com 192.168.60.56 | ||
| - | megatree.torresvault.com 192.168.60.55 | ||
| - | monitor.torresvault.com 192.168.1.77 | ||
| - | next.torresvault.com 192.168.1.75 | ||
| - | npm.torresvault.com 192.168.1.99 | ||
| - | pbs.torresvault.com 192.168.1.252 | ||
| ===== Notes ===== | ===== Notes ===== | ||
| - | All APs use PoE | + | * All APs use PoE |
| + | * Multiple PoE switches support HA, Pi-hole, APs, FPP network | ||
| + | * VLANs trunked across entire switch chain | ||
| + | * Full IoT segmentation enforced | ||
| + | * WAN failover enabled (WAN1 active, WAN2 backup) | ||
| - | Multiple PoE switches support HA, Pi-hole, APs, and the FPP network | + | ---- |
| - | + | ||
| - | VLANs trunked everywhere | + | |
| - | + | ||
| - | IoT segmentation fully enforced | + | |
| - | + | ||
| - | WAN failover assigned (WAN1 active, WAN2 spare) | + | |
| ===== Future TorresVault 2.0 (Draft) ===== | ===== Future TorresVault 2.0 (Draft) ===== | ||
| - | Replace PVE1 & PVE2 with Mini-PC nodes (lower power, more performance) | + | * Replace PVE1 & PVE2 with Mini-PC nodes |
| - | + | | |
| - | Run Kubernetes inside PVE VMs | + | |
| - | + | | |
| - | Move select | + | |
| - | + | * Add Loki for aggregated network logs | |
| - | Expand HA integrations | + | * Expand VLAN segmentation (per-room IoT) |
| - | + | * Move toward Zero Trust network model | |
| - | Add full UPS + NUT monitoring | + | |
| - | + | ||
| - | Grafana | + | |
| - | Expand VLAN segmentation for per-room IoT | ||
| - | Move toward Zero Trust network model | ||
network/unifi.1769209952.txt.gz · Last modified: by nathna
