A homelabber’s networking playground using VLANs

on
Photo of Alex Kretzschmar

It’s OK to break stuff, that’s how we learn. But all too often it’s impossible to find a safe space to do so. In this video, Alex breaks down how to create a segmented network zone for learning purposes using Proxmox to virtualize OPNsense.

Imagine you'd like to test out a new way of working with DHCP — the technology responsible for managing IP addresses within a network. A service like this is absolutely critical to the basic functionality of your network. This often means your window to tinker with different options is often limited to minutes. When you take something as core to a network's function, like DHCP, and break it, it means everything from your laptop to your robot vacuum breaks too.

Using virtualization and VLANs to our advantage we can create a completely segregated network zone to play around in. If you’d like to create a temporary DHCP server, do so using a NIC tagged with the correct VLAN tag and there'll be no conflict. You can spend as long as you like learning the intricacies without having to rush to deploy it in the real world.

Naturally, we can shoehorn Tailscale into this solution too. By installing Tailscale on OPNsense, and turning that firewall appliance into a subnet router, you're able to interact with entities in that safe network zone from your "real" network as if you were in that zone too. We've really only scratched the surface of what you can do in this video and we'd love to hear what you're doing with it. Let us know in the YouTube comment section.

Did we miss a new Tailscale feature you’d like to hear more about? Hit us up on Twitter or the fediverse with your feedback!