<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Netgear on homelab</title>
    <link>https://homelab.nbkelley.com/tags/netgear/</link>
    <description>Recent content in Netgear on homelab</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://homelab.nbkelley.com/tags/netgear/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>UniFi Express VPN &amp; Network Management</title>
      <link>https://homelab.nbkelley.com/docs/networking/unifi-express-vpn/</link>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://homelab.nbkelley.com/docs/networking/unifi-express-vpn/</guid>
      <description>&lt;h1 id=&#34;unifi-express-vpn--network-management&#34;&gt;UniFi Express VPN &amp;amp; Network Management&lt;a class=&#34;anchor&#34; href=&#34;#unifi-express-vpn--network-management&#34;&gt;#&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;h2 id=&#34;what-was-established&#34;&gt;What Was Established&lt;a class=&#34;anchor&#34; href=&#34;#what-was-established&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Methodology for configuring ProtonVPN WireGuard on UniFi Express.&lt;/li&gt;&#xA;&lt;li&gt;Kill switch implementation to prevent IP/DNS leaks when the VPN drops.&lt;/li&gt;&#xA;&lt;li&gt;Best practices for managing Netgear managed switches via dedicated subnets and secure ports.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;key-decisions&#34;&gt;Key Decisions&lt;a class=&#34;anchor&#34; href=&#34;#key-decisions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;WireGuard Protocol&lt;/strong&gt;: Selected over OpenVPN for superior speed and efficiency on UniFi Express.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Kill Switch Pattern&lt;/strong&gt;: Default-deny WAN traffic; only allow forwarding through the &lt;code&gt;wg0&lt;/code&gt; interface.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear Management&lt;/strong&gt;: Restrict switch web GUI access to a dedicated management VLAN/subnet using HTTPS.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;current-configuration&#34;&gt;Current Configuration&lt;a class=&#34;anchor&#34; href=&#34;#current-configuration&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;VPN Client&lt;/strong&gt;: ProtonVPN (WireGuard)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Endpoint&lt;/strong&gt;: &lt;code&gt;us-123.protonvpn.net:51820&lt;/code&gt; (example high-speed server)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;ProtonVPN DNS&lt;/strong&gt;: &lt;code&gt;10.2.0.1&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Allowed IPs&lt;/strong&gt;: &lt;code&gt;0.0.0.0/0&lt;/code&gt; (full tunnel)&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear Switch Management Ports&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;HTTP: &lt;code&gt;80&lt;/code&gt; (insecure, avoid)&lt;/li&gt;&#xA;&lt;li&gt;HTTPS: &lt;code&gt;443&lt;/code&gt; (secure web GUI)&lt;/li&gt;&#xA;&lt;li&gt;SSH: &lt;code&gt;22&lt;/code&gt; (CLI access)&lt;/li&gt;&#xA;&lt;li&gt;SNMP: &lt;code&gt;161&lt;/code&gt; (monitoring)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;historical-notes&#34;&gt;Historical Notes&lt;a class=&#34;anchor&#34; href=&#34;#historical-notes&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Conversation dated 2025-04-14.&lt;/li&gt;&#xA;&lt;li&gt;Gateway device referred to as UniFi Express (infrastructure list notes &amp;ldquo;UCG Express &amp;lsquo;Olorín&amp;rsquo; at 192.168.1.1&amp;rdquo;).&lt;/li&gt;&#xA;&lt;li&gt;Netgear MS308E is the managed switch in the homelab.&lt;/li&gt;&#xA;&lt;li&gt;Kill switch and DNS leak prevention rely on &lt;code&gt;iptables&lt;/code&gt;/&lt;code&gt;nftables&lt;/code&gt; or UniFi OS firewall rules.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;open-questions&#34;&gt;Open Questions&lt;a class=&#34;anchor&#34; href=&#34;#open-questions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Does UniFi Express support native WireGuard kill switch in the GUI, or is manual CLI firewall configuration required?&lt;/li&gt;&#xA;&lt;li&gt;Specific UniFi OS version and exact GUI paths for VPN/kill switch implementation.&lt;/li&gt;&#xA;&lt;li&gt;Whether split tunneling is needed for specific homelab services.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;related-pages&#34;&gt;Related Pages&lt;a class=&#34;anchor&#34; href=&#34;#related-pages&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/infrastructure/network/&#34;&gt;Network Infrastructure &amp;amp; VLANs&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/networking/vlan_setup/&#34;&gt;VLAN Configuration: OPNsense &amp;amp; Netgear MS308E&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/security/cloudflare_integration/&#34;&gt;Cloudflare Integration: SSL &amp;amp; DNS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/services/uptime-kuma/&#34;&gt;Uptime Kuma - Configuration &amp;amp; Integrations&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>UniFi UX7 &amp; Netgear MS308E VLAN Setup</title>
      <link>https://homelab.nbkelley.com/docs/networking/ufi-netgear-vlan-setup/</link>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://homelab.nbkelley.com/docs/networking/ufi-netgear-vlan-setup/</guid>
      <description>&lt;h1 id=&#34;unifi-ux7--netgear-ms308e-vlan-setup&#34;&gt;UniFi UX7 &amp;amp; Netgear MS308E VLAN Setup&lt;a class=&#34;anchor&#34; href=&#34;#unifi-ux7--netgear-ms308e-vlan-setup&#34;&gt;#&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;h2 id=&#34;what-was-established&#34;&gt;What Was Established&lt;a class=&#34;anchor&#34; href=&#34;#what-was-established&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Multi-switch VLAN topology using UniFi UCG Express (UX7) and Netgear MS308E switches.&lt;/li&gt;&#xA;&lt;li&gt;Netgear MS308E 802.1Q Advanced configuration pattern for trunks and access ports.&lt;/li&gt;&#xA;&lt;li&gt;Troubleshooting methodology for multi-switch chains (isolate to inter-switch trunks vs. device-specific vs. firewall).&lt;/li&gt;&#xA;&lt;li&gt;UX7 firewall rule correction for IoT isolation (Tharkûn VLAN 3).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;key-decisions&#34;&gt;Key Decisions&lt;a class=&#34;anchor&#34; href=&#34;#key-decisions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;VLAN 1 (Gandalf): Untagged on trunks, PVID 1. Used for servers and switch management.&lt;/li&gt;&#xA;&lt;li&gt;VLAN 2 (Mithrandir): Tagged on trunks, Untagged on access. PVID 2. Routes through UX7 VPN.&lt;/li&gt;&#xA;&lt;li&gt;VLAN 3 (Tharkûn): Tagged on trunks, Untagged on access. PVID 3. Isolated IoT network.&lt;/li&gt;&#xA;&lt;li&gt;Native VLAN set to 1 on trunks to ensure management traffic passes untagged and remains accessible.&lt;/li&gt;&#xA;&lt;li&gt;UX7 Firewall: Tharkûn (VLAN 3) placed in DMZ zone. Required explicit &amp;ldquo;Allow DMZ to Internet&amp;rdquo; rule to restore IoT connectivity.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;current-configuration&#34;&gt;Current Configuration&lt;a class=&#34;anchor&#34; href=&#34;#current-configuration&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;UX7 (Olorín)&lt;/strong&gt;: 192.168.1.1&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Port 1 (to Netgear Switch 1): Trunk, Native VLAN 1, Allowed VLANs 1, 2, 3.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear MS308E (Switch 1)&lt;/strong&gt;: 192.168.1.239&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Port 1 (to UX7): VLAN 1 Untagged (PVID 1), VLAN 2 Tagged, VLAN 3 Tagged.&lt;/li&gt;&#xA;&lt;li&gt;Ports 2, 3 (to downstream switches): Same as Port 1.&lt;/li&gt;&#xA;&lt;li&gt;Access Ports (e.g., Port 8 to U7 AP): VLAN 3 Untagged, PVID 3.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Netgear MS308E (Switch 2)&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Trunk ports: VLAN 1 Untagged (PVID 1), VLAN 2 Tagged, VLAN 3 Tagged.&lt;/li&gt;&#xA;&lt;li&gt;Access Ports: VLAN 2 Untagged (PVID 2) for PCs, VLAN 3 Untagged (PVID 3) for IoT (e.g., Hue Hub).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;UX7 Firewall Rules (Tharkûn/DMZ)&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Allow DMZ to Internet&lt;/li&gt;&#xA;&lt;li&gt;Allow DMZ to Gateway&lt;/li&gt;&#xA;&lt;li&gt;Block DMZ to Internal&lt;/li&gt;&#xA;&lt;li&gt;Block DMZ to VPN&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;historical-notes&#34;&gt;Historical Notes&lt;a class=&#34;anchor&#34; href=&#34;#historical-notes&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Initial attempts to set trunk ports to &amp;ldquo;No Native VLAN&amp;rdquo; (all tagged) caused lockout because management traffic (VLAN 1) became untagged and was dropped. Reverted to Native VLAN = 1.&lt;/li&gt;&#xA;&lt;li&gt;VLAN 2 (Mithrandir) initially failed on downstream switches due to missing tagged configuration on inter-switch trunks.&lt;/li&gt;&#xA;&lt;li&gt;VLAN 3 (Tharkûn) failed due to missing firewall rule in UX7 Site Manager for the DMZ zone.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;open-questions&#34;&gt;Open Questions&lt;a class=&#34;anchor&#34; href=&#34;#open-questions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;How to handle Rivendell (VLAN 4) when deployed?&lt;/li&gt;&#xA;&lt;li&gt;Will U7 APs require specific VLAN tagging configurations for Tharkûn WiFi?&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;related-pages&#34;&gt;Related Pages&lt;a class=&#34;anchor&#34; href=&#34;#related-pages&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;wiki/networking/vlan_setup.md&lt;/code&gt; (Legacy OPNsense context)&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;wiki/infrastructure/network.md&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;wiki/networking/opnsense_dmz_iot_firewall.md&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://homelab.nbkelley.com/docs/services/uptime-kuma/&#34;&gt;Uptime Kuma - Configuration &amp;amp; Integrations&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VLAN Configuration: OPNsense &amp; Netgear MS308E</title>
      <link>https://homelab.nbkelley.com/docs/networking/vlan_setup/</link>
      <pubDate>Tue, 25 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://homelab.nbkelley.com/docs/networking/vlan_setup/</guid>
      <description>&lt;h1 id=&#34;vlan-configuration-opnsense--netgear-ms308e&#34;&gt;VLAN Configuration: OPNsense &amp;amp; Netgear MS308E&lt;a class=&#34;anchor&#34; href=&#34;#vlan-configuration-opnsense--netgear-ms308e&#34;&gt;#&lt;/a&gt;&lt;/h1&gt;&#xA;&lt;h2 id=&#34;what-was-established&#34;&gt;What Was Established&lt;a class=&#34;anchor&#34; href=&#34;#what-was-established&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Configuration pattern for implementing tagged (trunk) and untagged (access) VLANs using OPNsense as the router and a Netgear MS308E managed switch.&lt;/p&gt;&#xA;&lt;h2 id=&#34;key-decisions&#34;&gt;Key Decisions&lt;a class=&#34;anchor&#34; href=&#34;#key-decisions&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;VLAN Naming/ID&lt;/strong&gt;: Example VLAN &amp;ldquo;Incánus&amp;rdquo; assigned ID &lt;code&gt;20&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Trunking Strategy&lt;/strong&gt;: The port connecting OPNsense to the Netgear switch must be configured as a &lt;strong&gt;Tagged&lt;/strong&gt; port for all active VLANs.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Port Strategy&lt;/strong&gt;: Ports for end-devices must be &lt;strong&gt;Untagged&lt;/strong&gt; for the specific VLAN, with the &lt;strong&gt;PVID&lt;/strong&gt; (Port VLAN ID) set to match that VLAN.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;current-configuration&#34;&gt;Current Configuration&lt;a class=&#34;anchor&#34; href=&#34;#current-configuration&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;opnsense-setup&#34;&gt;OPNsense Setup&lt;a class=&#34;anchor&#34; href=&#34;#opnsense-setup&#34;&gt;#&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Create VLAN&lt;/strong&gt;: &lt;code&gt;Interfaces → Other Types → VLAN&lt;/code&gt; (Assign Parent Interface and Tag ID).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Assign Interface&lt;/strong&gt;: &lt;code&gt;Interfaces → Assignments&lt;/code&gt; (Add the new VLAN interface).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Configure IP&lt;/strong&gt;: Set a static IPv4 address (e.g., &lt;code&gt;192.168.20.1/24&lt;/code&gt; for VLAN 20).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;DHCP&lt;/strong&gt;: Enable DHCPv4 under &lt;code&gt;Services → DHCPv4 → [VLAN Interface]&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h3 id=&#34;netgear-ms308e-setup&#34;&gt;Netgear MS308E Setup&lt;a class=&#34;anchor&#34; href=&#34;#netgear-ms308e-setup&#34;&gt;#&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;VLAN Membership&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Trunk Port (to OPNsense)&lt;/strong&gt;: Set as &lt;strong&gt;Tagged&lt;/strong&gt; for all VLANs (e.g., VLAN 20, 30).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Access Port (to Device)&lt;/strong&gt;: Set as &lt;strong&gt;Untagged&lt;/strong&gt; for the target VLAN.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;PVID Configuration&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;For Access Ports, the &lt;strong&gt;PVID&lt;/strong&gt; must be updated to match the VLAN ID (e.g., Port 1: PVID 20).&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;historical-notes&#34;&gt;Historical Notes&lt;a class=&#34;anchor&#34; href=&#34;#historical-notes&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Configuration established during the rollout of the &amp;ldquo;Incánus&amp;rdquo; network segment.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
