Files
homelab-docs/docs/NETWORK-ARCHITECTURE.md
Funky (OpenClaw) 01bc8995c2 Fix VPS IP address (66.63.182.168 → 51.222.12.162) + Add Minecraft port forwarding
CRITICAL CORRECTION:
- Old deprecated VPS: 66.63.182.168 (DO NOT USE)
- Current VPS: 51.222.12.162 (vps-3fce361e.vps.ovh.ca, OVH Canada)
- WireGuard IP: 10.0.9.1 (confirmed via SSH)

Added Minecraft ATM10 port forwarding:
- External: 51.222.12.162:25568
- Internal: 10.0.10.46:25568 (via WireGuard tunnel)
- iptables DNAT + MASQUERADE rules configured
- Rules saved to /etc/iptables/rules.v4 (persists across reboots)
- SRV record: _minecraft._tcp.atmons.deadeyeg4ming.vip → 51.222.12.162:25568

Updated files:
- All 6 documentation files with correct VPS IP
- Added port forwarding section to NETWORK-ARCHITECTURE.md
2026-02-06 02:55:11 +00:00

206 lines
5.4 KiB
Markdown

# Network Architecture - Fred's Homelab
**Last Updated:** 2026-02-06 02:17 UTC
**Documented by:** Funky (OpenClaw)
---
## Network Overview
Fred's homelab uses a multi-layer network architecture with WireGuard VPN connecting the external VPS to the internal network via a UniFi Cloud Gateway Ultra.
---
## Network Subnets
### 10.0.10.0/24 - Main Homelab Network
**Gateway:** UCG Ultra (UniFi Cloud Gateway)
**Purpose:** Internal services, Proxmox hosts, LXC containers, VMs
**Key IPs:**
- 10.0.10.2 - router-pve (Proxmox host)
- 10.0.10.3 - main-pve (Proxmox host)
- 10.0.10.4 - pve-storage (Proxmox host)
- 10.0.10.5 - OMV (OpenMediaVault NAS)
- 10.0.10.11 - Fred's iMac (OpenClaw node)
- 10.0.10.15-50 - Services (see SERVICE-MAP.md)
### 10.0.9.0/24 - WireGuard VPN
**Purpose:** Secure tunnel between VPS and homelab
**Peers:**
- **10.0.9.1** - VPS (vps.nianticbooks.com, 51.222.12.162)
- WireGuard server
- Runs Caddy for *.nianticbooks.com and *.deadeyeg4ming.vip
- **10.0.9.2** - UCG Ultra (UniFi Cloud Gateway)
- WireGuard client mode
- Routes traffic between 10.0.9.0/24 ↔ 10.0.10.0/24
---
## Traffic Flow
### External Request to Internal Service
```
Internet User
DNS Resolution (*.nianticbooks.com or *.deadeyeg4ming.vip)
VPS: 51.222.12.162 (Caddy reverse proxy)
↓ WireGuard tunnel
10.0.9.1 (VPS) → 10.0.9.2 (UCG Ultra)
↓ Internal routing
10.0.10.x (Internal service - Proxmox LXC/VM)
↓ Response back through same path
Internet User
```
### Example: Minecraft Server (atmons.deadeyeg4ming.vip)
```
Player connects to atmons.deadeyeg4ming.vip
DNS → 51.222.12.162
VPS Caddy reverse_proxy 10.0.10.46:25567
↓ WireGuard
10.0.9.1 → 10.0.9.2 (UCG Ultra)
10.0.10.46:25567 (Pterodactyl Wings - Minecraft server)
```
---
## Network Equipment
### UCG Ultra (UniFi Cloud Gateway)
- **Model:** UniFi Cloud Gateway Ultra
- **Role:** Primary gateway/router for homelab
- **WireGuard:** Client mode connecting to VPS (10.0.9.1)
- **Internal IP:** 10.0.10.1 (assumed gateway)
- **WireGuard IP:** 10.0.9.2
- **Routing:** Bridges 10.0.9.0/24 ↔ 10.0.10.0/24
### VPS (vps.nianticbooks.com)
- **Public IP:** 51.222.12.162
- **Provider:** (Unknown - document later)
- **WireGuard IP:** 10.0.9.1
- **Services:**
- Caddy reverse proxy
- WireGuard VPN server
- LetsEncrypt SSL termination
---
## Caddy Reverse Proxy Configuration
### Current Domains
- ***.nianticbooks.com** - Fred's primary domain
- ***.deadeyeg4ming.vip** - Gaming/personal domain
### Known Subdomains
*(Document as they're added)*
Example configuration for new subdomain:
```caddy
atmons.deadeyeg4ming.vip {
reverse_proxy 10.0.10.46:25567
}
```
**Note:** VPS can reach any IP on 10.0.10.0/24 via WireGuard → UCG Ultra routing.
---
## Security Notes
### WireGuard VPN
- ✅ Traffic between VPS and homelab is encrypted
- ✅ Only authorized WireGuard peers can access homelab
- ✅ Proper network segmentation (10.0.9.x separate from 10.0.10.x)
### SSL/TLS
- **External:** LetsEncrypt via Caddy on VPS (automatic renewal)
- **Internal:** Step-CA (10.0.10.15) provides internal certificates
### Access Control
- UCG Ultra manages firewall rules (document separately)
- WireGuard provides authentication via public/private keys
- No direct port forwarding on public IP (all via VPN tunnel)
---
## Deprecated Networks (DO NOT USE)
### ❌ 10.0.8.0/24
- **Old VPN network** from previous VPS setup
- **Status:** DEPRECATED
- **Reason:** Migrated to 10.0.9.0/24 with current VPS
### ❌ Old VPS (55.XX.X.X)
- **Old peer:** 10.0.9.3
- **Status:** DECOMMISSIONED
- **Reason:** Replaced with current VPS (51.222.12.162)
**Action:** Remove any references to 10.0.8.0/24 or old VPS from documentation and configs.
---
## Future Considerations
### Potential Improvements
1. **Document Caddy configuration** - SSH into VPS and document current Caddyfile
2. **UCG Ultra firewall rules** - Document current rules for reference
3. **Additional VPN peers** - If adding more WireGuard clients, use 10.0.9.3+
4. **IPv6** - Consider if needed for future services
### Monitoring
- Monitor WireGuard tunnel health
- Alert if VPN connection drops
- Track bandwidth usage on VPN tunnel
---
## Quick Reference
**VPS Caddy adds new subdomain:**
1. SSH to VPS (need to set up SSH key first!)
2. Edit Caddyfile
3. Add reverse_proxy to internal IP (10.0.10.x)
4. Reload Caddy
5. Update this documentation
**Internal service IPs:** See [SERVICE-MAP.md](SERVICE-MAP.md)
---
*Maintained by: Funky (OpenClaw AI Agent)*
*Source: http://10.0.10.2:3000/fred/homelab-docs*
---
## Port Forwarding (Added 2026-02-06)
### Minecraft Server - ATM10
- **External:** 51.222.12.162:25568
- **Internal:** 10.0.10.46:25568
- **Protocol:** TCP + UDP
- **Method:** iptables DNAT + MASQUERADE
- **SRV Record:** `_minecraft._tcp.atmons.deadeyeg4ming.vip``51.222.12.162:25568`
**Players connect to:** `atmons.deadeyeg4ming.vip` (SRV record handles port automatically)
**iptables rules:**
```bash
# Forward incoming traffic
iptables -t nat -A PREROUTING -p tcp --dport 25568 -j DNAT --to-destination 10.0.10.46:25568
iptables -t nat -A PREROUTING -p udp --dport 25568 -j DNAT --to-destination 10.0.10.46:25568
# Masquerade for return traffic
iptables -t nat -A POSTROUTING -d 10.0.10.46 -p tcp --dport 25568 -j MASQUERADE
iptables -t nat -A POSTROUTING -d 10.0.10.46 -p udp --dport 25568 -j MASQUERADE
```
**Rules saved to:** `/etc/iptables/rules.v4` (persists across reboots)