Home Network Infrastructure Overview
Overview
This document describes the Domus Digitalis home enterprise network infrastructure supporting Linux workstation 802.1X EAP-TLS authentication.
|
This is a HOME ENTERPRISE deployment, not a lab or test environment. All configurations follow enterprise security standards with production-grade infrastructure. |
Infrastructure Components
Core Networking
| Component | Model/Version | IP Address | Role |
|---|---|---|---|
Internet Gateway |
HUMAX BGW320-500 |
192.168.1.254 |
AT&T Fiber 1Gbps |
Firewall/Router |
pfSense CE 2.7.2 |
10.50.1.1 |
Inter-VLAN routing, DNS, DHCP, Firewall |
Access Switch |
Cisco 3560-CX |
10.50.1.10 |
802.1X Authenticator, VLAN Trunking |
Wireless Controller |
Cisco C9800-CL |
10.50.1.40 |
CAPWAP controller for Aironet APs |
Wireless AP |
Cisco Aironet 4800 |
10.50.10.101 |
WiFi 5/6 (802.11ax) |
Authentication & Identity Services
| Component | Model/Version | IP Address | Role |
|---|---|---|---|
ISE PAN/Admin |
Cisco ISE 3.2 |
10.50.1.20 |
Primary Admin Node + PSN |
ISE PSN |
Cisco ISE 3.2 |
10.50.1.21 |
Secondary Policy Services Node |
Active Directory |
Windows Server 2022 |
10.50.1.50 |
AD DS + AD CS (ROOT CA) |
Domain |
inside.domusdigitalis.dev |
N/A |
Internal AD domain |
Hypervisor Platform
| Component | Specification |
|---|---|
Model |
Supermicro E300-9D |
CPU |
Intel Xeon D-2146NT (16-core, 32-thread) |
RAM |
128GB DDR4 ECC |
Storage |
NVMe + NFS (Synology DS1621+) |
Networking |
Dual 10GbE (Intel X710) |
Management IP |
10.50.1.99 |
All infrastructure VMs (pfSense, ISE, DC, WLC) run on this hypervisor using KVM/QEMU.
VLAN Architecture
VLAN Segmentation
| VLAN | Network | Purpose | Access Control |
|---|---|---|---|
100 |
10.50.1.0/24 |
Management |
Infrastructure only (ISE, DC, Switch, WLC, KVM) |
10 |
10.50.10.0/24 |
Corporate Data |
Authenticated users (EAP-PEAP, EAP-TLS) |
20 |
10.50.20.0/24 |
Voice |
IP phones, video conferencing (QoS priority) |
30 |
10.50.30.0/24 |
Guest |
Captive portal, Internet-only access |
40 |
10.50.40.0/24 |
Research / Linux Workstations |
EAP-TLS machine authentication required |
999 |
N/A |
Critical Auth Fallback |
Auth failures, DHCP/DNS only, ISE remediation portal |
VLAN 40 - Research Network (Linux Workstations)
This is the primary VLAN for Linux workstations with strict security requirements:
Security Posture:
-
802.1X EAP-TLS machine authentication REQUIRED
-
Client certificates issued by AD CS (HOME-ROOT-CA)
-
Active Directory domain join REQUIRED
-
AD group membership:
GRP-Linux-Admin-Workstations -
ISE authorization rule:
Linux_Admin_EAP-TLS -
ISE authorization profile:
Linux_EAPTLS_Admins -
Downloadable ACL:
LINUX_EAPTLS_PERMIT_ALL
Current Devices:
-
modestus-razer- Razer Blade 15 (Arch Linux) -
modestus-p50- ThinkPad P50 (Arch Linux)
Both workstations are:
-
Domain-joined to
inside.domusdigitalis.dev -
Members of
GRP-Linux-Admin-Workstations -
Configured with 802.1X wired + wireless
-
Using NetworkManager for connection management
Authentication Flow
802.1X EAP-TLS Sequence
-
EAPOL Start - Client sends EAPOL-Start to switch
-
RADIUS Access-Request - Switch forwards to ISE with client certificate
-
AD Validation - ISE validates:
-
Computer account exists in AD
-
Computer is member of
GRP-Linux-Admin-Workstations
-
-
Certificate Validation - ISE checks:
-
Certificate issued by trusted ROOT CA
-
Certificate not revoked (CRL check)
-
Certificate subject matches computer account
-
-
Authorization Decision - ISE applies policy:
-
Rule:
Linux_Admin_EAP-TLS -
Profile:
Linux_EAPTLS_Admins -
VLAN: 40
-
dACL:
LINUX_EAPTLS_PERMIT_ALL
-
-
Access Granted - Switch receives Access-Accept:
-
Assigns port to VLAN 40
-
Downloads ACL from ISE
-
Allows client network access
-
Network Services
DNS Resolution
Internal DNS (pfSense):
-
Domain:
inside.domusdigitalis.dev -
Primary NS: 10.50.1.1 (pfSense)
-
Secondary NS: 10.50.1.50 (home-dc01)
-
Forwarders: 1.1.1.1, 8.8.8.8
Key Records:
-
home-dc01.inside.domusdigitalis.dev→ 10.50.1.50 -
ise-pan.inside.domusdigitalis.dev→ 10.50.1.20 -
ise-psn.inside.domusdigitalis.dev→ 10.50.1.21 -
wlc.inside.domusdigitalis.dev→ 10.50.1.40
DHCP Scopes
| VLAN | Range | Lease Time |
|---|---|---|
10 (Data) |
10.50.10.50 - 10.50.10.200 |
24 hours |
20 (Voice) |
10.50.20.50 - 10.50.20.200 |
12 hours |
30 (Guest) |
10.50.30.50 - 10.50.30.200 |
2 hours |
40 (Research) |
10.50.40.50 - 10.50.40.200 |
24 hours |
999 (Critical Auth) |
Limited pool |
1 hour |
Firewall Rules Summary
Default Policy: Deny all inter-VLAN traffic
Allowed Traffic:
-
VLAN 40 → All (Research has full network access)
-
VLAN 10 → Internet, Management (limited)
-
VLAN 30 → Internet only (Guest isolation)
-
All → DNS (10.50.1.1)
-
All → DHCP
Blocked Traffic:
-
VLAN 30 (Guest) → Internal networks
-
VLAN 999 → All except ISE portal
PKI Architecture
Certificate Authority Hierarchy
ROOT CA:
-
Name: HOME-ROOT-CA
-
Type: Enterprise Root CA
-
Server: home-dc01 (Windows Server 2022)
-
Validity: 20 years
-
Key: RSA 4096-bit
Certificate Templates:
-
Linux-Workstation-Auth- Client authentication -
User-EAP-TLS- User authentication (future) -
Web-Server- HTTPS certificates
Monitoring & Management
ISE Monitoring
-
Live Logs: Operations → RADIUS → Live Logs
-
MnT API:
netapi ise mnt session <MAC> -
DataConnect:
netapi ise dc session <MAC>
Network Monitoring
-
pfSense Dashboard: 10.50.1.1
-
Switch Management: 10.50.1.10
-
ISE GUI: 10.50.1.20