Hello,
Just spent a good week installing my home server. Time to pause and lookback to what I’ve setup and ask your help/suggestions as I am wondering if my below configuration is a good approach or just a useless convoluted approach.
I have a Proxmox instance with 3 VLAN:
-
Management (192.168.1.x) : the one used by proxmox host and that can access all other VLANs
-
Servarr (192.168.100.x) : every arr related software + Jellyfin (all LXC). All outbound connectivity goes via VPN. Cant access any VLAN
-
myCloud (192.168.200.X): WIP, but basically planning to have things like Nextcloud, Immich, Paperless etc…
The original idea was to allow external access via Cloudlfare tunnel but finally decided to switch back to Tailscale for “myCloud” access (as I am expected to share this with less than 5 accounts). So:
- myCloud now has Tailscale running on it.
- myCloud can now access Servarr VLAN
Consequently to my choice of using tailscale, I had now to use a DNS server to resolve mydomain.com:
- Servarr now has pihole as DNS server reachable across all VLAN
On the top of all that I have yet another VLAN for my raspberry Pi running Vaultwarden reachable only via my personal tailscale account.
I’m open to restart things from scratch (it’s fun), so let me know.
Also wondering if using LXCs is better than docker especially when it comes to updates and longer term maintenance.
Your first sentence was about physical switches…
There already is a logical separation that makes perfect sense - out through VPN with no network access initiated by that VLAN to the other two internal. That’d a security step that’s pretty clear and valid off the bat.
So again - I don’t follow anything of what you’re driving at, no. Because from the first sentence in your first comment forward isn’t making any sense.
Please, clarify, because I don’t know why you’d even bring up different switches for an extremely basic logical separation.
VLAN on a singular router without physical separation is not secure. OP was asking for feedback, that’s my feedback. It’s accurate.
Thx for the feedback, I don’t have multiple router no. If I had would it be still called VLAN? I thought the V was Virtual for achieving that LAN segmentation with one router. With one router, don’t you think the security added is the same level as configuring a firewall on each VM/LXC ?
Well it wouldn’t matter if your router is the thing that someone gets into. All you’re doing is separate traffic in different subnets, and if that’s your goal, you’re good to go.