8.2 KiB
Certainly! Here's a detailed reference guide with specific information and synthetic data for setting up your homelab.local Active Directory domain:
Reference Guide: Setting Up homelab.local AD Domain
Introduction
This guide provides a step-by-step process for creating the homelab.local Active Directory domain, designed for a home network with personal devices, a cybersecurity lab, network-attached storage (NAS), and various IT equipment. The guide focuses on security, management, and operational efficiency.
Domain Configuration
Step 1: Domain and Controller Setup
-
Primary Domain Controller (PDC):
- Server Name:
DC01 - OS: Windows Server 2019 Standard
- IP Address:
192.168.1.10 - Hardware: Dell PowerEdge R440, 32GB RAM, 2x1TB SSD (RAID 1)
- Server Name:
-
Secondary Domain Controller (SDC):
- Server Name:
DC02 - OS: Windows Server 2019 Standard
- IP Address:
192.168.1.11 - Hardware: Dell PowerEdge R440, 16GB RAM, 2x1TB SSD (RAID 1)
- Server Name:
Step 2: Organizational Units (OUs) and Structure
-
Create OUs for Major Areas:
CyberLabHomeDevicesNASUsers
-
Define Sub-OUs:
- Under
CyberLab:Testing Environments,Research,Tools - Under
NAS:Media,Personal Storage,Lab Data
- Under
Step 3: Security Groups and User Accounts
-
Establish Security Groups:
LabAdmins: Full access to CyberLab resourcesFamilyMembers: Access to HomeDevices and Media sharesMediaAccess: Read-only access to Media sharesGuests: Limited access to guest network and resources
-
Create User Accounts:
- Admin Account:
admin@homelab.local - Family User Accounts:
john.doe@homelab.localjane.doe@homelab.localalice.doe@homelab.local
- Guest Account:
guest@homelab.local
- Admin Account:
Step 4: Network Configuration and Security
-
VLANs and Subnets:
VLAN 10: CyberLab -192.168.10.0/24VLAN 20: HomeDevices -192.168.20.0/24VLAN 30: NAS -192.168.30.0/24VLAN 40: Management -192.168.40.0/24
-
Firewall Rules:
- Allow inbound traffic on
VLAN 10for RDP (TCP/3389), SSH (TCP/22), and HTTP(S) (TCP/80, TCP/443) - Allow outbound traffic on
VLAN 10toVLAN 30for NAS access (SMB, NFS) - Allow inbound traffic on
VLAN 20for RDP (TCP/3389) and HTTP(S) (TCP/80, TCP/443) - Allow outbound traffic on
VLAN 20toVLAN 30for NAS access (SMB, NFS) - Deny all other traffic between VLANs
- Allow inbound traffic on
Step 5: NAS Configuration and Access
-
NAS Device:
- Model: Synology DS1819+
- IP Address:
192.168.30.10 - Shares:
Media: Read-only access forMediaAccessgroup, read-write forFamilyMembersgroupPersonal Storage: Individual user folders with read-write access for respective usersLab Data: Read-write access forLabAdminsgroup
-
NAS Backup:
- Daily incremental backup to external USB drive
- Weekly full backup to cloud storage (e.g., Backblaze B2)
Step 6: Group Policy Objects (GPOs)
-
Password Policy:
- Minimum password length: 12 characters
- Password complexity: Enabled
- Maximum password age: 90 days
- LabAdmins Group:
- Minimum password length: 16 characters
- Maximum password age: 60 days
-
Windows Update Policy:
- Automatic updates: Enabled
- Schedule: Every Sunday at 2:00 AM
-
Software Restriction Policy:
- Whitelist:
C:\Program Files,C:\Program Files (x86) - Blacklist:
C:\Users\*\AppData\Local\Temp,C:\Windows\Temp
- Whitelist:
-
NAS Access GPO:
- Applied to
NASOU - Drive mappings:
M:forMediashareP:forPersonal StorageshareL:forLab Datashare
- Applied to
Mermaid Diagram
graph TD;
A[PDC: DC01] -->|Manages| B[CyberLab]
A -->|Manages| C[HomeDevices]
A -->|Manages| D[NAS]
A -->|Manages| E[Users]
B --> F[Testing Environments]
B --> G[Research]
B --> H[Tools]
C --> I[john.doe Laptop]
C --> J[jane.doe Laptop]
C --> K[alice.doe Laptop]
C --> L[Smart TV]
D --> M[Media]
D --> N[Personal Storage]
D --> O[Lab Data]
E --> P[admin]
E --> Q[john.doe]
E --> R[jane.doe]
E --> S[alice.doe]
E --> T[guest]
Conclusion
This detailed reference guide provides specific information and examples for setting up the homelab.local Active Directory domain. By following these steps and configurations, you can create a secure, organized, and efficient environment for your home network and cybersecurity lab.
Certainly! Here's the updated reference guide for setting up your homelab.local Active Directory domain:
Reference Guide: Setting Up homelab.local AD Domain
Introduction
This guide outlines the process for creating an Active Directory (AD) domain, homelab.local, tailored for a comprehensive home network that includes personal devices, a cybersecurity lab, network-attached storage (NAS), and various IT and server equipment. It focuses on security, management, and operational efficiency.
Domain Configuration
Step 1: Domain and Controller Setup
-
Primary Domain Controller (PDC): Choose a dedicated or virtual server with sufficient resources to run Windows Server. This server will manage the
homelab.localdomain. -
Secondary Domain Controller (SDC): Optional but recommended for redundancy. Can be less resource-intensive and also runs Windows Server.
Step 2: Organizational Units (OUs) and Structure
-
Create OUs for Major Areas:
CyberLab: For cybersecurity research and testing.HomeDevices: For personal and home devices.NAS: For network-attached storage access and management.Users: For managing user accounts and permissions.
-
Define Sub-OUs:
- Under
CyberLab: CreateTesting Environments,Research,Tools. - Under
NAS: CreateMedia,Personal Storage,Lab Data.
- Under
Step 3: Security Groups and User Accounts
-
Establish Security Groups:
LabAdmins,FamilyMembers,MediaAccess,Guests, with permissions tailored to their needs.
-
Create User Accounts:
- Setup
Admin Account(s)for AD and resource management. - Create individual
Family User AccountsandGuest Accountsas needed. - Use a clear naming convention for user accounts, e.g.,
john.doe_001.
- Setup
Step 4: Network Configuration and Security
-
Segment LAN/WLAN:
- Differentiate between
CyberLabandHomeDevicesnetworks for security and traffic isolation.
- Differentiate between
-
Implement Firewall Rules:
- Control traffic between network segments, especially protecting
CyberLabresources. - Create specific firewall rules for each sub-OU within the
CyberLab.
- Control traffic between network segments, especially protecting
Step 5: NAS Configuration and Access
-
Set Up Storage Areas:
- Allocate
Media,Personal Storage, andLab Dataareas within the NAS, setting appropriate access permissions for each user or group.
- Allocate
-
NAS Backup Strategy:
- Implement a separate backup strategy for the NAS, including regular incremental backups to an external drive or cloud storage service.
Step 6: Group Policy Objects (GPOs)
-
Define Key Policies:
- Enforce a strong
Password Policy, with a stricter policy for theLabAdminsgroup. - Set an
Update Policyfor automatic Windows updates. - Apply
Software Restrictionsto limit installations on personal and home devices, using a whitelist of approved software.
- Enforce a strong
-
GPO for NAS Access:
- Create a dedicated GPO for NAS access, defining user and group permissions for specific shares.
Mermaid Diagram
graph TD;
A[PDC: homelab.local] -->|Manages| B[CyberLab]
A -->|Manages| C[HomeDevices]
A -->|Manages| D[NAS]
A -->|Manages| E[Users]
B --> F[Testing Environments]
B --> G[Research]
B --> H[Tools]
C --> I[Personal Laptops]
C --> J[Smart Home Devices]
D --> K[Media]
D --> L[Personal Storage]
D --> M[Lab Data]
E --> N[Admins]
E --> O[Family]
E --> P[Guests]
N --> Q[Admin Account]
O --> R[Family User Accounts]
P --> S[Guest Accounts]
Conclusion
This updated reference guide provides a comprehensive blueprint for setting up a secure and efficient Active Directory domain for your home network and cybersecurity lab. By following these steps and considering the additional recommendations, you can create a well-organized, manageable environment that supports both your professional and personal digital activities.