- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands - CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround - CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check - NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere - MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates - LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference Co-authored-by: Cursor <cursoragent@cursor.com>
6.7 KiB
UDM Pro VLAN Plan - 100% Complete! 🎉
Last Updated: 2026-01-14
Status: ✅ ALL 19 VLANs CONFIGURED
🎉 Achievement Unlocked: Complete VLAN Plan
All VLANs from the Network Architecture plan are now configured on the UDM Pro!
Complete VLAN Configuration (19 Networks)
Core Networks
| VLAN ID | Name | Subnet | Status |
|---|---|---|---|
| 1 | Default | 192.168.0.0/24 | ✅ Configured |
| 11 | MGMT-LAN | 192.168.11.0/24 | ✅ Configured |
Besu Networks
| VLAN ID | Name | Subnet | Status |
|---|---|---|---|
| 110 | BESU-VAL | 10.110.0.0/24 | ✅ Configured |
| 111 | BESU-SEN | 10.111.0.0/24 | ✅ Configured |
| 112 | BESU-RPC | 10.112.0.0/24 | ✅ Configured |
Service VLANs
| VLAN ID | Name | Subnet | Status |
|---|---|---|---|
| 120 | BLOCKSCOUT | 10.120.0.0/24 | ✅ Configured |
| 121 | CACTI | 10.121.0.0/24 | ✅ Configured |
| 130 | CCIP-OPS | 10.130.0.0/24 | ✅ Configured |
| 132 | CCIP-COMMIT | 10.132.0.0/24 | ✅ Configured |
| 133 | CCIP-EXEC | 10.133.0.0/24 | ✅ Configured |
| 134 | CCIP-RMN | 10.134.0.0/24 | ✅ Configured |
| 140 | FABRIC | 10.140.0.0/24 | ✅ Configured |
| 141 | FIREFLY | 10.141.0.0/24 | ✅ Configured |
| 150 | INDY | 10.150.0.0/24 | ✅ Configured |
| 160 | SANKOFA-SVC | 10.160.0.0/22 | ✅ Configured |
Sovereign Tenant VLANs
| VLAN ID | Name | Subnet | Status | Note |
|---|---|---|---|---|
| 200 | PHX-SOV-SMOM | 10.200.0.0/20 | ✅ Configured | |
| 201 | PHX-SOV-ICCC | 10.201.0.0/20 | ✅ Configured | |
| 202 | PHX-SOV-DBIS | 10.202.0.0/24 | ✅ Configured | ⚠️ Shows /24, plan had /20 |
| 203 | PHX-SOV-AR | 10.203.0.0/20 | ✅ Configured |
Total: ✅ 19/19 Networks (100%)
Configuration Verification Checklist
✅ Network Configuration
- All 19 VLANs created
- Subnets match plan (except PHX-SOV-DBIS - verify /24 vs /20)
- DHCP Server enabled on all VLANs
- All VLANs show "UDM Pro" as router
⏳ Settings Verification (Next Steps)
- Network Isolation: Verify "Isolate Network" is UNCHECKED for all VLANs
- Zone Assignment: Verify all VLANs are in "Internal" zone
- Zone Matrix: Verify Internal → Internal = "Allow All"
- Gateway IPs: Verify gateway IPs match plan (e.g., 10.110.0.1 for BESU-VAL)
- DHCP Ranges: Verify DHCP ranges are configured appropriately
⏳ Testing & Utilization
- Inter-VLAN Routing: Test routing between VLANs
- Firewall Rules: Configure inter-VLAN firewall rules
- VM/Container Assignment: Assign VMs/containers to VLANs
- Connectivity Testing: Test connectivity from each VLAN
Critical Settings to Verify
1. Network Isolation (CRITICAL)
For each VLAN:
- Navigate: Settings → Networks → [VLAN Name]
- Scroll to "Network" section
- Ensure "Isolate Network" is UNCHECKED
- Save if changed
Why: Network Isolation blocks inter-VLAN routing. Must be disabled for VLANs to communicate.
2. Zone Matrix (CRITICAL)
- Navigate: Policy Engine → Zone Matrix
- Find: Internal → Internal
- Verify it says "Allow All"
- If not, click and change to "Allow All"
Why: Zone Matrix controls inter-zone communication. Internal → Internal = Allow All enables inter-VLAN routing.
3. Zone Assignment
For each VLAN:
- Navigate: Settings → Networks → [VLAN Name]
- Verify: Zone = "Internal"
- All VLANs should be in Internal zone
Next Steps for VLAN Utilization
Immediate (Today)
-
✅ Verify Network Isolation
- Check all 19 VLANs
- Ensure "Isolate Network" is unchecked
-
✅ Verify Zone Matrix
- Policy Engine → Zone Matrix
- Internal → Internal = Allow All
-
✅ Verify PHX-SOV-DBIS Subnet
- Currently shows
/24(10.202.0.0/24) - Plan had
/20(10.202.0.0/20) - Verify if
/24is intentional or needs update
- Currently shows
Short-term (This Week)
-
Test Inter-VLAN Routing
# From VLAN 11, test routing to other VLANs ping 10.110.0.1 # BESU-VAL ping 10.111.0.1 # BESU-SEN ping 10.120.0.1 # BLOCKSCOUT # etc. -
Configure Firewall Rules
- Management → Service VLANs
- Service VLANs → Management
- Sovereign tenant isolation
-
Assign VMs/Containers to VLANs
- Via Proxmox Web UI or CLI
- Test connectivity
Long-term (This Month)
-
Migrate Services to VLANs
- Move VMs/containers to appropriate VLANs
- Update service configurations
-
Document VLAN Assignments
- Document which services are on which VLANs
- Update architecture documentation
-
Monitor and Optimize
- Monitor inter-VLAN traffic
- Optimize firewall rules
- Adjust as needed
VLAN Utilization Guide
Assigning VMs/Containers to VLANs
Via Proxmox Web UI:
- Go to: Datacenter → [Host] → VMs/Containers → [VM/Container ID]
- Click: Hardware → Network Device
- Edit: Bridge =
vmbr0, VLAN Tag = [VLAN ID] - Save
Via CLI:
# For containers
pct set <CTID> -net0 name=eth0,bridge=vmbr0,tag=<VLAN_ID>
# For VMs
qm set <VMID> --net0 virtio,bridge=vmbr0,tag=<VLAN_ID>
Example VLAN Assignments
Besu Validators:
- VLAN: 110 (BESU-VAL)
- Subnet: 10.110.0.0/24
Besu Sentries:
- VLAN: 111 (BESU-SEN)
- Subnet: 10.111.0.0/24
Besu RPC:
- VLAN: 112 (BESU-RPC)
- Subnet: 10.112.0.0/24
Blockscout:
- VLAN: 120 (BLOCKSCOUT)
- Subnet: 10.120.0.0/24
FireFly:
- VLAN: 141 (FIREFLY)
- Subnet: 10.141.0.0/24
Sovereign Tenants:
- VLANs: 200-203
- Subnets: 10.200.0.0/20, 10.201.0.0/20, 10.202.0.0/24, 10.203.0.0/20
Testing Inter-VLAN Routing
Test 1: Gateway Connectivity
# From VLAN 11, test routing to other VLAN gateways
ping 10.110.0.1 # BESU-VAL
ping 10.111.0.1 # BESU-SEN
ping 10.112.0.1 # BESU-RPC
ping 10.120.0.1 # BLOCKSCOUT
# etc.
Test 2: VM/Container Connectivity
# After assigning VMs/containers to VLANs
# Test connectivity between VLANs
ping <VM_IP_ON_VLAN_110> # From VLAN 11
ping <VM_IP_ON_VLAN_120> # From VLAN 11
# etc.
Test 3: Firewall Rules
# Test firewall rules
# Should allow: Management → Service VLANs (SSH, monitoring)
# Should block: Sovereign tenants → Each other
Summary
Status: ✅ 100% COMPLETE
Achievement:
- ✅ All 19 VLANs configured
- ✅ Complete VLAN plan implemented
- ✅ Ready for VLAN utilization
Next Steps:
- Verify Network Isolation settings
- Verify Zone Matrix configuration
- Test inter-VLAN routing
- Configure firewall rules
- Assign VMs/containers to VLANs
VLAN Plan Utilization: ✅ READY TO PROCEED
Last Updated: 2026-01-14