<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Networking on The Home Lab</title><link>https://adamazl.github.io/homelab/tags/networking/</link><description>Recent content in Networking on The Home Lab</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 15 Mar 2026 00:37:20 +1300</lastBuildDate><atom:link href="https://adamazl.github.io/homelab/tags/networking/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero-Config Remote Access with Tailscale</title><link>https://adamazl.github.io/homelab/posts/tailscale-remote-access/</link><pubDate>Sat, 29 Nov 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/tailscale-remote-access/</guid><description>&lt;h2 id="the-problem-with-traditional-remote-access"&gt;The Problem with Traditional Remote Access&lt;/h2&gt;
&lt;p&gt;Setting up WireGuard or OpenVPN yourself works, but it has requirements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A public IP (harder to get on CGNAT/IPv6-only connections)&lt;/li&gt;
&lt;li&gt;Port forwarding on your router&lt;/li&gt;
&lt;li&gt;Dynamic DNS if your IP changes&lt;/li&gt;
&lt;li&gt;Key management for each client&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Tailscale removes all of these requirements. It creates an encrypted peer-to-peer mesh network between your devices without any port forwarding, and works through CGNAT, firewalls, and double-NAT.&lt;/p&gt;
&lt;h2 id="how-tailscale-works"&gt;How Tailscale Works&lt;/h2&gt;
&lt;p&gt;Tailscale is built on WireGuard. Each device gets a WireGuard key pair. Tailscale&amp;rsquo;s coordination server (not a relay server) shares public keys between devices so they can establish direct encrypted connections.&lt;/p&gt;</description></item><item><title>Reverse Proxy and SSL with Nginx Proxy Manager</title><link>https://adamazl.github.io/homelab/posts/nginx-proxy-manager-ssl/</link><pubDate>Sat, 15 Nov 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/nginx-proxy-manager-ssl/</guid><description>&lt;h2 id="the-problem-nginx-proxy-manager-solves"&gt;The Problem Nginx Proxy Manager Solves&lt;/h2&gt;
&lt;p&gt;As your homelab grows, you accumulate services running on various IPs and ports: Proxmox on &lt;code&gt;:8006&lt;/code&gt;, Jellyfin on &lt;code&gt;:8096&lt;/code&gt;, Nextcloud on &lt;code&gt;:443&lt;/code&gt;, Home Assistant on &lt;code&gt;:8123&lt;/code&gt;. Remembering port numbers is tedious, but the bigger issue is HTTPS — browsers complain about self-signed certificates, and accessing services over plain HTTP on your LAN is a security risk.&lt;/p&gt;
&lt;p&gt;Nginx Proxy Manager (NPM) solves both problems. It&amp;rsquo;s a Docker container with a web UI that lets you:&lt;/p&gt;</description></item><item><title>Self-Hosted VPN with WireGuard</title><link>https://adamazl.github.io/homelab/posts/wireguard-vpn-server/</link><pubDate>Sat, 01 Nov 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/wireguard-vpn-server/</guid><description>&lt;h2 id="why-self-host-a-vpn"&gt;Why Self-Host a VPN?&lt;/h2&gt;
&lt;p&gt;A self-hosted VPN gives you a secure tunnel back into your home network when you&amp;rsquo;re away. Unlike commercial VPN services (which are for hiding traffic from your ISP), this is about remote access — connecting to your NAS, home automation, internal dashboards, or development environment from a coffee shop or hotel.&lt;/p&gt;
&lt;p&gt;WireGuard is the right choice today. It&amp;rsquo;s built into the Linux kernel, uses modern cryptography (ChaCha20, Curve25519), and has a drastically smaller codebase than OpenVPN (~4,000 lines vs ~400,000). Handshakes complete in milliseconds. Battery drain on mobile is noticeably lower.&lt;/p&gt;</description></item><item><title>Network-Wide Ad Blocking with Pi-hole</title><link>https://adamazl.github.io/homelab/posts/pihole-dns-ad-blocking/</link><pubDate>Sat, 18 Oct 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/pihole-dns-ad-blocking/</guid><description>&lt;h2 id="why-pi-hole"&gt;Why Pi-hole&lt;/h2&gt;
&lt;p&gt;Most ad blockers work at the browser level. Pi-hole works at the DNS level, which means it blocks ads for every device on your network — smart TVs, phones, game consoles, IoT devices — without installing anything on them. It works by acting as the DNS resolver for your LAN and returning &lt;code&gt;0.0.0.0&lt;/code&gt; for known ad and tracking domains instead of the real IP.&lt;/p&gt;
&lt;p&gt;The side effect is that you also get a full picture of every DNS query every device makes, which is genuinely eye-opening. You will quickly discover that your smart TV is phoning home every few minutes.&lt;/p&gt;</description></item><item><title>VLAN Segmentation: Isolating Your IoT Devices</title><link>https://adamazl.github.io/homelab/posts/vlan-segmentation-basics/</link><pubDate>Sat, 04 Oct 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/vlan-segmentation-basics/</guid><description>&lt;h2 id="why-segment-your-network"&gt;Why Segment Your Network?&lt;/h2&gt;
&lt;p&gt;The average home today has dozens of connected devices — smart bulbs, cameras, thermostats,
TVs. Most of these devices have poor security track records: default credentials, infrequent
firmware updates, and sometimes outright malicious firmware from vendors.&lt;/p&gt;
&lt;p&gt;Putting them on the same flat network as your laptop and NAS is an unnecessary risk. VLANs fix
this.&lt;/p&gt;
&lt;h2 id="what-is-a-vlan"&gt;What Is a VLAN?&lt;/h2&gt;
&lt;p&gt;A &lt;strong&gt;Virtual LAN (VLAN)&lt;/strong&gt; is a logical partition of a physical network. Devices on different VLANs
cannot communicate with each other unless you explicitly allow it through firewall rules — even if
they share the same physical switch.&lt;/p&gt;</description></item><item><title>Setting Up OPNsense as Your Home Firewall</title><link>https://adamazl.github.io/homelab/posts/opnsense-firewall-setup/</link><pubDate>Sat, 20 Sep 2025 00:00:00 +0000</pubDate><guid>https://adamazl.github.io/homelab/posts/opnsense-firewall-setup/</guid><description>&lt;h2 id="why-replace-your-isp-router"&gt;Why Replace Your ISP Router?&lt;/h2&gt;
&lt;p&gt;ISP-provided routers are designed to be cheap and manageable by support staff, not to give you control. They have opaque firmware, rarely get security updates, and have none of the features a proper firewall offers: VLAN support, traffic shaping, IDS/IPS, meaningful logs, VPN server, DNS over TLS.&lt;/p&gt;
&lt;p&gt;OPNsense is a FreeBSD-based firewall/router that runs on commodity x86 hardware. It&amp;rsquo;s fully open-source (forked from pfSense in 2015), actively maintained, and has a polished web UI.&lt;/p&gt;</description></item></channel></rss>