No description
This repository has been archived on 2023-12-26. You can view files and clone it, but cannot push or open issues or pull requests.
Find a file
2023-04-03 21:02:31 +02:00
ansible update DNS 2023-04-03 21:02:31 +02:00
.gitignore init 2023-03-11 17:10:21 +01:00
cloud_init.cfg.tftpl replace VM if cloudinit image is replaced 2023-03-16 23:29:28 +01:00
main.tf fix variable 2023-03-28 09:39:54 +02:00
network_config.cfg.tftpl parameterize ip 2023-03-11 19:05:42 +01:00
README.md update readme 2023-03-16 23:40:30 +01:00
variables.tf split ansible into roles 2023-03-17 17:26:03 +01:00

Hermes

Hermes is the VM that runs Dnsmasq for DHCP and DNS in our DMZ.

The VMs on our DMZ might like to contact eachother. For example, one VM wants to clone a repository from the git server. However, because our home network is NATed, a DNS lookup of these servers will result in our public IP address. This will in general not work, because the public IP address is only assigned on the WAN port of the router.

One solution is to overwrite DNS requests from the DMZ to the router if they query these VMs. However, then the router needs to operate on the DMZ vlan, which is not ideal in terms of security. Additionally, it would be nice to define the DNS in the DMZ in terms of infrastructure as code.

This solution creates a seperate VM on the DMZ that acts as the DNS and DHCP server. Concretely, Dnsmasq does DHCPv4 and assigns DNS names according to hostnames. Additionally, it tries to match IPv6 addresses using the SLAAC algorithm in order to incorporate them as AAAA records in DNS as well (using ra-names). Dnsmasq also overwrites the public IP address to 192.168.30.3.

What is needed from the router:

  • Static IPv4 addresses on the DMZ interface (192.168.30.1/24).
  • Static IPv6 addresses on the DMZ interface (2a02:58:19a:f730::1/64).
  • DNS domain override for geokunis2.nl, pizzapim.nl, pim.kunis.nl and dmz to 192.18.30.7.
  • unmanaged (SLAAC) IPv6 router advertisements on the DMZ interface.