I’m a big fan of Homelab. In my point of view, homelabing is a COOL guys stuff. But my limited knowledge of networking is one of my biggest obstacles(💵money is another reason). In my last semester of my undergraduate life, I have a plenty of time to struggle with network. So I dedice to learn linux networking and try to practice on my homelab. One cannot make bricks without straw. Below are a list of devices I own

  1. MikroTik RBD53iG-5HacD2HnD hAP ac3.
  2. A Raspberry pi with OpenWrt installed.
  3. A Raspberry pi with Pi Hole in intalled(Ubuntu 21).
  4. A PC.
  5. A Playstation 5.
  6. A QNAP NAS.

I use OpenWrt Rpi as a second router to do some VPN tunneling. I set gateway on MikroTik to OpenWrt Rpi and DNS to Pi Hole hosted on another Ubuntu Rpi. Let’s see how far I can go along learning the linux networking.

Glossary

  1. Promiscuous Mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN.

DNS

  1. Pi-Hole is a project for dns adblocking and uses dnsmasq as nameserver.
  2. BIND which stands for “Berkely Internet Name Domain” is a free and Opensource software which is widely used in Linux servers. BIND can act as an authoritative and recursive name server.
  3. Dnsmasq is a lightweight DNS, TFTP, PXE, router advertisement and DHCP server.