Edge & Traffic Policy

This document describes the design and behavior of the network edge, including WAN connectivity, routing strategy, firewall posture, and traffic shaping.

The goal is consistent latency and predictable behavior under load, not maximum aggregate throughput.

Design principles: see Lab Philosophy.


Edge Router

The network edge is implemented using a single router:

All VLANs are terminated on the edge router using a router-on-a-stick model. Switches operate strictly at Layer 2.


WAN Connectivity

Two independent WAN connections are in use:

Spectrum (Primary)

AT&T (Secondary)

Both links are active and shaped independently.


Routing Strategy

The network primarily uses static routing.

Selective dynamic behavior is introduced via an internal control project (wanctl) that adjusts policy routing and traffic steering based on measured conditions.

This approach allows adaptive behavior without introducing a fully dynamic routing protocol or distributed control plane.

At present, wanctl is treated as an internal implementation detail and is not fully documented.


VLAN Overview

VLANNamePurposeNetwork Policy Summary
99MgmtInfrastructure managementRestricted, no WAN access
110TrustedUsers and serversWAN allowed, inter-VLAN controlled
120IoTEmbedded and consumer gearWAN allowed, no lateral access
130CameraVideo sourcesNo WAN, ZoneMinder-only access

Firewall Philosophy

The firewall is designed around explicit trust boundaries:

Additional restrictions apply to sensitive segments:

Rules favor clarity and auditability over compactness.


Traffic Shaping & QoS

Traffic shaping is a first-class component of the network design.

Latency-sensitive traffic such as VoIP, gaming, and video calls is prioritized to remain responsive even during sustained load or backup activity.

Shaping parameters are actively managed and adjusted by the control plane rather than remaining static.


Known Dependencies

The network design assumes the availability of the following services:

Failure of these services may result in partial or total loss of functionality by design.


Design Notes

This document applies to all current and future network-connected systems unless explicitly stated otherwise.

Firewall and NAT rules are reviewed periodically to ensure documented policy and actual enforcement remain aligned.