Docs/OPNsense: Difference between revisions
No edit summary |
No edit summary |
||
| Line 7: | Line 7: | ||
'''The VLAN configuration (like VLAN IDs) should probably be moved to [[Docs/Switches]] to keep this article strictly Layer3''' |
'''The VLAN configuration (like VLAN IDs) should probably be moved to [[Docs/Switches]] to keep this article strictly Layer3''' |
||
== |
== Network == |
||
=== Management (OOB) === |
|||
{| class="wikitable" |
{| class="wikitable" |
||
!Subnet |
!Subnet |
||
| Line 25: | Line 27: | ||
Because of this, the iDRAC web login interface should only be accessible to anyone you're okay having root on the server. |
Because of this, the iDRAC web login interface should only be accessible to anyone you're okay having root on the server. |
||
== LAN == |
=== LAN === |
||
{| class="wikitable" |
{| class="wikitable" |
||
!Subnet |
!Subnet |
||
| Line 37: | Line 39: | ||
LAN cannot communicate with Management. |
LAN cannot communicate with Management. |
||
== WAN == |
=== WAN === |
||
{| class="wikitable" |
{| class="wikitable" |
||
!Subnet |
!Subnet |
||
| Line 48: | Line 50: | ||
The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM. |
The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM. |
||
== VPN Networks == |
|||
=== OpenVPN === |
=== OpenVPN === |
||
| Line 75: | Line 75: | ||
Neither wireguard config should have access to the internet. |
Neither wireguard config should have access to the internet. |
||
== OPNSense == |
|||
<Rules for access, updates, generating wireguard configs, etc> |
|||
Revision as of 01:53, 15 May 2025
OPNsense is our router/firewall.
We have two OPNsense devices, Lasagna and Ravioli.
The VLAN configuration (like VLAN IDs) should probably be moved to Docs/Switches to keep this article strictly Layer3
Network
Management (OOB)
| Subnet | VLAN ID |
|---|---|
| 10.10.0.0/24 | 1? |
OOB Management services like Dell iDRAC / HP iLO and internal networking hardware.
Management cannot communicate with LAN/WAN.
Generally, Management should be restricted from everything else.
OOB services tend to be super vulnerable, there are dozens of premade scripts that instapwn iDRACs and give you a root shell by just pointing them at the IP address.
Because of this, the iDRAC web login interface should only be accessible to anyone you're okay having root on the server.
LAN
| Subnet | VLAN ID |
|---|---|
| 10.10.1.0/24 | 2? |
Servers and Virtual Machines.
LAN cannot communicate with Management.
WAN
| Subnet | VLAN ID |
|---|---|
| 141.219.80.64/27 | 640 |
Our public IP subnet under Tech's 141.219.0.0/16 block.
The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM.
OpenVPN
| Subnet | VLAN ID |
|---|---|
| 10.10.10.0/24 | N/A |
Wireguard
| Subnet | VLAN ID |
|---|---|
| 10.10.11.0/24 | N/A |
10.10.11.0/25 - Wireguard admin range (access to LAN+Management)
10.10.11.128/25 - Wireguard user range (access to only LAN)
All members can be freely given 'user' wireguard configs. Only admin configs need to be restricted (due to the aforementioned iDrac exploit issues).
Neither wireguard config should have access to the internet.
OPNSense
<Rules for access, updates, generating wireguard configs, etc>