Home Infrastructure Overview

🏠 Home Infrastructure

One of my favorite and most accessible projects to showcase is my home — which has evolved from a single Dell PowerEdge 2950 into a self-hosted, hybrid cloud production environment.

I’ve designed this setup to support full-scale service deployment, automation, disaster recovery, and an off-site colocation system via S2S VPN. While it began as a homelab, it now operates as a live production environment.

The infrastructure resides in a temperature-controlled room (formerly a coal room) and is built around a rack of four servers: three primary (R730A, R730B, T620) and one backup (R720). The core switching is 10Gbps, with two downstream access switches for endpoints (1Gbps and 2.5Gbps capable).

🌐 Network Topology & Redundancy

  • The fiber ONT terminates into a dedicated L2 WAN switch, which fans out to two primary servers (R730A, R730B).

  • These servers host virtualized OpnSense routers running in CARP (Common Address Redundancy Protocol) to ensure gateway failover.

  • All servers connect to a 10Gbps core switch, which uplinks to two access switches via 10Gbps trunking.

  • Wireless coverage is managed by a UniFi Console WLAN, which manages a UniFi U6 Pro access point.

The network is segmented by performance and security intent:

  • Path A (Endpoint-to-Server): Optimized for external service delivery, local access

  • Path B (Server-to-Server): Optimized for migrations, backups, and internal transfers

 

🔐 VLAN Segmentation Strategy

VLAN Category Subnets Purpose
Endpoint Access Data, IoT, Guest Client device segmentation with strict ACLs
Service Access Mgmt, Public, Private, WAN-DMZ, Dev Role-specific isolation for service exposure
Backend Sync NAS-Xfer, Opnsense-Sync, XCP-Xfer High-throughput traffic (backups, replication)

This design enables granular access control, security zoning, and performance separation based on workload characteristics.

🖥️ Server & Storage Architecture

The server infrastructure is designed to support redundancy, performance, and service diversity. Each server is part of an XCP-NG cluster and operates using a shared configuration model for VM templating, backup management, and failover.

The core hardware stack includes:

  • ZFS NVMe Mirrored Pool

    • Operates at the hypervisor level.

    • Hosts all virtual machine OS drives, including TrueNAS VMs.

    • A third NVMe device is installed and available to replace a failed drive.

  • 8–12 HDD RAIDZ1 Pool

    • Managed via TrueNAS SCALE with direct HBA passthrough from the hypervisor.

    • Stores media, documents, and persistent datasets.

    • Shared back to the XCP-NG cluster and endpoints via SMB, NFS, and iSCSI.

  • 4-HDD Striped Pool

    • Composed of smaller, high-RPM disks.

    • Used for high-I/O, scratch, and development workloads.

🌍 Colocation Integration

To extend uptime and redundancy, my infrastructure includes a colocated server connected via a persistent Site-to-Site VPN (OpenVPN).

  • The colo server has a single physical NIC but uses virtual MACs to handle multiple public IPs.

  • These are logically segmented into three separate services:

    • An admin panel

    • A private OpnSense router for internal access

    • A public-facing OpnSense router for exposed services

Despite sharing physical hardware, internal VLANs and routing rules ensure logical and network isolation between environments.

🛡️ Backup & Redundancy Strategy

Both the home infrastructure and the colocation site perform their own local backups and snapshots. Additionally:

  • Encrypted backups are sent across the VPN tunnel for off-site redundancy.

  • Each XCP-NG host performs VM metadata and config backups to a local Buffalo NAS.

  • Key VMs receive secondary backups to remote storage.

  • The shared configuration model allows cross-server VM restoration in the event of hardware failure.

This platform allows me to develop, test, and operate infrastructure at an enterprise scale while retaining full control of the environment. I rely on this setup for both personal productivity and professional demonstration, and I continuously iterate on its capabilities based on real-world usage and performance evaluation.

⚙️ Service & Automation Layer

This infrastructure supports a wide range of internal and external services, including:

  • Home automation

  • DNS filtering and split-DNS resolution

  • Media management

  • Mail Servers, Password managers, Cloud storage 

  • Smart device control

  • Endpoint configuration and lifecycle automation

  • Remote VPN access

All services are deployed using template-based provisioning with automation tasks integrated via Ansible and systemd timers.