My Home Network Setup
It’s been 3 long years since I published anything to this blog …. π³
The not so pretty setup ! |
In this article I’m gonna write about my home network setup. It’s important to note that the decisions and components used here were subjective to,
- Reuse of components from the previous setup
- What I could source conveniently without breaking the bank
- My technology preferences
Before I start rambling about the technicalities, let’s highlight what I needed the setup to do.
The basics like an internet connection, Wi-Fi for the mobile devices, Good connectivity throughout the house. Then the not so obvious need to run a lightweight web server, file server, different surveillance cameras, NVR system, IoT devices, home automation system, remote access for surveillance monitoring and lightweight administration. Let’s list them all.
- Reliable internet connections with enough juice
- Mesh capable WiFi solution
- Ability to have multiple isolated networks
- Easily extensible for future use cases
- Shareable wired and wireless connectivity
- Power over Ethernet
- Remote access
What about privacy and security. When trying to achieve all the above mentioned requirements I’m exposing myself to a whole lot of privacy and security vulnerabilities. There’s no way of fully eliminating the risk. Well you simply cannot have the cake and eat it too. I had to find a good middle ground. This middle ground however is gonna be an ever changing one. With time new risks will emerge and will need mitigation. Here’s me hoping I won’t be finding those new risks the hard way. Fingers crossed.
Let’s jump right into the components and software solutions I ended up using.
- pfSense open source software based router
- i5-5200U based mini pc with 4x 1gig network ports as the router host
- Unify layer 2 switch (VLAN capable)
- Unify wireless access points
- CAT6a shielded cabling
- Blue Iris Software based NVR
- Low power CPU and a low power GPU with CUDA support (for AI)
- Home Assistant open source home automation software
- Zigbee2MQTT bridge
- RTSP compatible POE cameras
- WireGuard, Suricata, pfSense firewall for VPN, IPS, IDS
Looking into router solutions pfSense and OPNSense was the solutions that had the customizability I needed. It’s really hard to choose one over the other given they are both based on FreeBSD and had a shared codebase until OPNSense forked out on 2015. It came down to personal preference. Unify dream machine solutions was a close second but lacked the customizability and the flexibility of running on my own hardware.
I chose a i55200U based mini pc to keep the power consumption low while having enough power with AES-NI. The 4 1gig Intel NICs gave me enough isolated throughput.
Unify layer 2 switch gave me the ability to configure VLANs and port restrictions to keep different networks defined in the pfSense router secure and isolated. This also means I get a good ecosystem with my chosen unify access points. I couldn’t really find any alternative to this setup at a comparable price point.
Blue Iris is a software based NVR. I’m not thrilled about having to run a windows machine for this purpose as Blue Iris only has a windows app. I was also looking into Synology NVRs. In the end the Blue Iris won due to the user base and price point.
I choose Suricata over Snort for IPS, IDS. I already had it running on my web server, thus had a good base configuration that would keep working with minor tweaks. I used a WireGuard tunnel for remote access over OpenVPN. WireGuard had everything I needed and comes bundled in the FreeBSD kernel used in pfSense.
That’s a wrap. In my next post I’m planning to cover how I’m using pfSense with the layer 2 switch and access points to achieve multiple isolated wireless and wired networks …
Comments
Post a Comment