Intro to this Blog and Current Setup
This blog will show a bit of what I've been working on for the past few years in my home lab and show what I'm implementing next! Stay tuned for more!
UniFi Networking and Home Automation
I got a VERY overbuilt UniFi network. Especially for a household of one (plus cat). Designed to be 2.5 gig ready, and I can swap in 10 GbE equipment if I can afford it one day, lol. ISP plan is depressing though. 1000/40 Mbps with Spectrum in West Hills. I want 1000/1000. (I can literally see the Spectrum office out the window, lmao.) Might need to downgrade the speeds soon though. So might get worse. Especially the upload. Money. (Current job at LAUSD pays less than In-N-Out, lmao. Apparently, I'm not qualified for anything? You may hear me ramble about them throughout this blog.)
UDM-SE is the router, Pro Max 16 PoE as the main switch, APs are all Wi-Fi 7 capable, one is a U7 Pro Max and the other is a U7 Pro. Unfortunately, due to a bad Ethernet run that lets PoE through but only 100 Mbps Ethernet, one AP is meshed to another. Still gets me over 1 Gbps speeds over the air, so I'm happy enough. If I got the money, I'll rip and replace the run. (Re-terminating didn't help for whatever reason. Maybe I damaged the cable when running it.)
VPN to home using WireGuard (primarily) and L2TP/IPSec for compatibility with legacy clients or the built in Windows VPN client. Also can use UniFi Teleport for an instant VPN.
Home phone is an Ubiquiti Phone Touch Max. UniFi Talk for VoIP. No nonsense, easy to use, and gorgeous phones.
Cameras are all Ubiquiti cameras. Got them working with Alexa and other assistants with Scrypted. That way, they act like mostly normal cameras I can use with Alexa. Don't want to show off the inside of my home, so here's the devices.
Scrypted runs on my Home Assistant Yellow box. As mentioned, helps my enterprise UniFi cameras work like normal smart cameras you could buy at a big box store.
Home Assistant also acts as a middleman between UniFi and my August lock so I can use a UniFi access card (or my finger) against my G4 Doorbell and it'll send a webhook to HA to unlock the door. Janky, I know, but it works.
Equipment, Storage and Compute
Main host for most things is my UnRAID NAS. Unraid Pro, 8700K (free from a friend), 32 GB RAM (half from one friend, half from a coworker), almost 32 TB of drives. (Why that much storage? I got no idea what data I'm hoarding anymore, lmao)
As mentioned, I also have a Home Assistant Yellow that runs some other things related to home automation.
And recently, I got a small Lenovo ThinkCenter PC from a coworker. (Thanks, Daniel!) Going to use that to replicate some workloads on my NAS. Running Windows Server 2025 Core with the Hyper-V role installed. (Almost all my Windows Servers run Core if they're not intended to be used interactively. Saves resources, speeds up patching, and reduces attack surface.)
Another coworker gave me another desktop. (Thanks, Stephen!) Still gotta lug it home, install an OS, and figure out what to do with it, lol.
Docker
Below is just a little snippet of the Docker containers I already have running on my UnRAID NAS. I can explain more later. I use NGINX Proxy Manager for my reverse proxy. Simple to use, handles certificate renewals for me, (mostly) stress free, and all access outside of the Docker network uses HTTPS. Oh, and Cloudflare Argo Tunnels help host some of my applications without opening my network to anyone.
| Can Cloudflare please move this to a better place? And stop rearranging things, lol. |
Identity and Security
I already have a pre-existing Entra ID tenancy and local AD (for privileged users only). Entra ID is configured passwordless with strong multifactor auth by default, and users are not created in local AD unless a specific need is identified (like management of my Windows Server farm) to reduce attack surface. (AD users can't be made passwordless to my knowledge (unless you use password not required, lmao), and AD doesn't support FIDO, passkeys, or Microsoft Authenticator for login.)
I also have a PKI infrastructure configured. Root made with OpenSSL/XCA and the myCatLAN Local Directory Sub CA 01 is operated with ADCS. CRLs are published to the Internet at crl.andritolion.com. AIA at ca.andritolion.com. Site hosted with Azure Static Web Sites because I'm poor, lol. But gets the job done well at zero cost to me. The actual CRL files are stored on a private GitHub repo. (helps with historical versioning for auditing too!) Scheduled task on the ADCS host pushes to GitHub using the API every 8 hours.
All machines on local AD have a certificate from ADCS that protects the RDP session and ensures trust.
I have some pre-existing Intune policies deployed, but I no longer have Intune licenses because I'm poor, lol. Below is a little snippet of the policies I have deployed, including a policy that provisions device certificates issued from ADCS. These certificates are to be used to authenticate Intune devices to my UniFi network using EAP-TLS. Now my Intune license expired before I could implement that, but I'd be interested in completing this.



Comments
Post a Comment