Home Network Infrastructure Overview
Overview
This document describes the Domus Digitalis home enterprise network infrastructure supporting Linux workstation 802.1X EAP-TLS authentication.
|
This is a HOME ENTERPRISE deployment, not a lab or test environment. All configurations follow enterprise security standards with production-grade infrastructure. |
Infrastructure Components
Core Networking
| Component | Model/Version | IP Address | Role |
|---|---|---|---|
Internet Gateway |
HUMAX BGW320-500 |
192.168.1.254 |
AT&T Fiber 1Gbps |
Firewall/Router |
VyOS 1.4 (HA Pair) |
10.50.1.1 |
Inter-VLAN routing, DHCP, Firewall (VRRP VIP) |
Access Switch |
Cisco 3560-CX |
10.50.1.10 |
802.1X Authenticator, VLAN Trunking |
Wireless Controller |
Cisco C9800-CL |
10.50.1.40 |
CAPWAP controller for Aironet APs |
Wireless AP |
Cisco Aironet 4800 |
10.50.10.101 |
WiFi 5/6 (802.11ax) |
Authentication & Identity Services
| Component | Model/Version | IP Address | Role |
|---|---|---|---|
ISE Primary |
Cisco ISE 3.4 |
10.50.1.20 |
Primary (Admin + PSN + MnT) - ISE 3.4 ACTIVE |
ISE Secondary |
Cisco ISE 3.2p9 |
10.50.1.21 |
Secondary (Admin + PSN + MnT) - PLANNED |
Active Directory |
Windows Server 2025 Core |
10.50.1.50 |
AD DS + DNS (PKI on Vault) |
Domain |
inside.domusdigitalis.dev |
N/A |
Internal AD domain |
Hypervisor Platform
| Component | Specification |
|---|---|
Model |
Supermicro E300-9D |
CPU |
Intel Xeon D-2146NT (16-core, 32-thread) |
RAM |
128GB DDR4 ECC |
Storage |
NVMe + NFS (Synology DS1621+) |
Networking |
Dual 10GbE (Intel X710) |
Management IP |
10.50.1.99 |
All infrastructure VMs (VyOS, ISE, DC, WLC) run on this hypervisor using KVM/QEMU.
VLAN Architecture
VLAN Segmentation
| VLAN | Name | Subnet | Purpose |
|---|---|---|---|
Infrastructure VLANs (servers/services) |
|||
100 |
INFRA |
10.50.1.0/24 |
Network hardware, hypervisors, k3s nodes |
110 |
SECURITY |
10.50.110.0/24 |
Crown jewels: Vault, ISE, secrets |
120 |
SERVICES |
10.50.120.0/24 |
General VMs: Keycloak, Gitea, FreeIPA, BIND |
Client VLANs (endpoints only) |
|||
10 |
DATA |
10.50.10.0/24 |
Corporate wired/wireless devices |
20 |
VOICE |
10.50.20.0/24 |
VoIP phones (QoS) |
30 |
GUEST |
10.50.30.0/24 |
Guest portal (internet only) |
40 |
IOT |
10.50.40.0/24 |
IoT devices, limited access |
999 |
CRITICAL_AUTH |
— |
802.1X failure quarantine (no gateway) |
| VLAN 40 (IOT/Research) is the primary VLAN for Linux workstations requiring EAP-TLS machine authentication. |
VLAN 40 - Research Network (Linux Workstations)
This is the primary VLAN for Linux workstations with strict security requirements:
Security Posture:
-
802.1X EAP-TLS machine authentication REQUIRED
-
Client certificates issued by Vault PKI (DOMUS-ISSUING-CA)
-
Active Directory domain join REQUIRED
-
AD group membership:
GRP-Linux-Admin-Workstations -
ISE authorization rule:
Linux_Admin_EAP-TLS -
ISE authorization profile:
Linux_EAPTLS_Admins -
Downloadable ACL:
LINUX_EAPTLS_PERMIT_ALL
Current Devices:
-
modestus-razer- Razer Blade 15 (Arch Linux) -
modestus-p50- ThinkPad P50 (Arch Linux)
Both workstations are:
-
Domain-joined to
inside.domusdigitalis.dev -
Members of
GRP-Linux-Admin-Workstations -
Configured with 802.1X wired + wireless
-
Using NetworkManager for connection management
Authentication Flow
802.1X EAP-TLS Sequence
-
EAPOL Start - Client sends EAPOL-Start to switch
-
RADIUS Access-Request - Switch forwards to ISE with client certificate
-
AD Validation - ISE validates:
-
Computer account exists in AD
-
Computer is member of
GRP-Linux-Admin-Workstations
-
-
Certificate Validation - ISE checks:
-
Certificate issued by trusted ROOT CA
-
Certificate not revoked (CRL check)
-
Certificate subject matches computer account
-
-
Authorization Decision - ISE applies policy:
-
Rule:
Linux_Admin_EAP-TLS -
Profile:
Linux_EAPTLS_Admins -
VLAN: 40
-
dACL:
LINUX_EAPTLS_PERMIT_ALL
-
-
Access Granted - Switch receives Access-Accept:
-
Assigns port to VLAN 40
-
Downloads ACL from ISE
-
Allows client network access
-
Network Services
DNS Resolution
Internal DNS (BIND):
-
Domain:
inside.domusdigitalis.dev -
Primary NS: 10.50.1.90 (bind-01)
-
Secondary NS: 10.50.1.91 (bind-02)
-
Forwarders: 1.1.1.1, 8.8.8.8
Key Records:
-
home-dc01.inside.domusdigitalis.dev→ 10.50.1.91 -
ise-pan.inside.domusdigitalis.dev→ 10.50.1.20 -
ise-psn.inside.domusdigitalis.dev→ 10.50.1.20 -
wlc.inside.domusdigitalis.dev→ 10.50.1.40
DHCP Scopes
| VLAN | Range | Lease Time |
|---|---|---|
10 (Data) |
10.50.10.50 - 10.50.10.200 |
24 hours |
20 (Voice) |
10.50.20.50 - 10.50.20.200 |
12 hours |
30 (Guest) |
10.50.30.50 - 10.50.30.200 |
2 hours |
40 (Research) |
10.50.40.50 - 10.50.40.200 |
24 hours |
999 (Critical Auth) |
Limited pool |
1 hour |
Firewall Rules Summary
Default Policy: Deny all inter-VLAN traffic
Allowed Traffic:
-
VLAN 40 → All (Research has full network access)
-
VLAN 10 → Internet, Management (limited)
-
VLAN 30 → Internet only (Guest isolation)
-
All → DNS (10.50.1.90)
-
All → DHCP
Blocked Traffic:
-
VLAN 30 (Guest) → Internal networks
-
VLAN 999 → All except ISE portal
PKI Architecture
|
PKI Migration Complete (2026-02): HOME-ROOT-CA (Windows AD CS) has been replaced by DOMUS-ROOT-CA (HashiCorp Vault). All new certificates are issued via Vault PKI. |
Certificate Authority Hierarchy
ROOT CA:
-
Name: DOMUS-ROOT-CA
-
Type: Offline Root (Vault PKI)
-
Server: vault-01 (HashiCorp Vault)
-
Validity: 10 years
-
Key: RSA 4096-bit
ISSUING CA:
-
Name: DOMUS-ISSUING-CA
-
Type: Online Issuing CA (Vault pki_int)
-
Validity: 5 years
-
Issues: Client, server, and EAP-TLS certificates
Vault PKI Roles:
-
domus-client- Client/EAP-TLS certificates (1 year TTL) -
domus-server- Server certificates (1 year TTL)
Legacy (DEPRECATED):
-
HOME-ROOT-CA (Windows AD CS) - No longer issuing certificates
-
See Vault PKI Cert Issuance (infra-ops) for current procedures
Certificate Deployment
Linux Workstations:
-
Certificate:
/etc/ssl/certs/<hostname>-eaptls.pem -
Private Key:
/etc/ssl/private/<hostname>-eaptls.key -
CA Chain:
/etc/ssl/certs/domus-ca-chain.pem(Root + Issuing) -
Subject:
O=Domus Digitalis, OU=Endpoints, CN=<hostname>.inside.domusdigitalis.dev -
Issued via:
vault write pki_int/issue/domus-client
Monitoring & Management
ISE Monitoring
-
Live Logs: Operations → RADIUS → Live Logs
-
MnT API:
netapi ise mnt session <MAC> -
DataConnect:
netapi ise dc session <MAC>
Network Monitoring
-
VyOS Management: ssh vyos@10.50.1.1
-
Switch Management: 10.50.1.10
-
ISE GUI: 10.50.1.20