Files
docs/content/articles/2025-04-02-Network.md
Michael Housh 5ea3e3bd86
Some checks failed
CI / release (push) Failing after 3m0s
feat: Adds ci workflow.
2025-04-03 11:57:22 -04:00

3.1 KiB

date, updated, author, tags
date updated author tags
2025-4-02 2025-4-03 Michael Housh network, infrastructure

Networking

All of the networking setup is done through unifi. The network is segmented into several different networks to isolate communication.

Networks

An overview of the networks that are setup.

Default Network

The default network can not be deleted, it comes as the default network on the unifi networking gear. It is also generally the network a new device will go if it is plugged into an ethernet cable / switch. For this reason this network is isolated from communicating with other networks.

New devices that end up on this network should be configured to the appropriate network by a network administrator.

Management Network

This network is for unifi equipment (wireless access points, switches, etc.). This network is isolated from other networks to reduce any attack surface if someone gained access to the network.

Main Network

This is where the majority of "trusted" devices should be placed on the network, such as computers, phones, etc. This is also the network when people join the non-guest WiFi.

This network has the ability to communicate with most all other networks.

housh.dev Network

This is the network where all the servers are placed. This network is primarily setup to allow "responses", but not initiate communication with other networks. This is to help reduce the risk if one of the servers gets compromised, an attacker should not easily be able to transition to another network.

Phones Network

This is the network where all the VoIP phones are on. It is considered "untrusted" and should not be able to communicate with any other network.

IoT Network

This is the network where all IoT (internet of things) devices are. This is considered an "untrusted" network and communications with other networks are minimized to what is actually needed to work. This network is not able to communicate with the internet, because these devices are made by so many different companies with unknown intentions, this adds an extra layer of security by ensuring all communications are internal to our networks.

The exception to items placed on the IoT network are "apple" specific devices, such as home-pods and apple-tv because there are network challenges with these devices operating properly when placed on the IoT network, such as airdrop and screen casting (which may be resolved in the future).

Firewall

The unifi management console is what handles firewall rules for the networks. It is accessed via Settings -> Security -> Firewall on the management console.

firewall

This is where settings are made to either allow or deny traffic on the networks from communicating with other networks or the internet.

DNS

DNS is what translates IP addresses to domain names (i.e. po.housh.dev -> 192.168.50.6). This is managed by the unifi management console and is accessed via Settings -> Routing -> DNS.

We primarily use wildcard records, which allow the actual routing to be handled by the servers to the correct service.