# 🌐 Network Overview The **[[MajorInfrastructure|MajorsHouse]]** infrastructure is connected via a private **[[Network Overview#Tailscale|Tailscale]]** mesh network. This allows secure, peer-to-peer communication between devices across different geographic locations (US and UK) without exposing services to the public internet. ## πŸ›οΈ Infrastructure Summary - **Address Space:** 100.x.x.x (Tailscale CGNAT) - **Management:** Centralized via **[[Network Overview#Ansible|Ansible]]** (`MajorAnsible` repo) - **Host Groupings:** Functional (web, mail, homelab, bots), OS (Fedora, Ubuntu), and Location (US, UK). ## 🌍 Geographic Nodes | Host | Location | IP | OS | |---|---|---|---| | `[[dca|dca]]` | πŸ‡ΊπŸ‡Έ US | 100.104.11.146 | Ubuntu 24.04 | | `[[majortoot|majortoot]]` | πŸ‡ΊπŸ‡Έ US | 100.110.197.17 | Ubuntu 24.04 | | `[[majorhome|majorhome]]` | πŸ‡ΊπŸ‡Έ US | 100.120.209.106 | Fedora 43 | | `[[teelia|teelia]]` | πŸ‡¬πŸ‡§ UK | 100.120.32.69 | Ubuntu 24.04 | ## πŸ”— Tailscale Setup Tailscale is configured as a persistent service on all nodes. Key features used include: - **Tailscale SSH:** Enabled for secure management via Ansible. - **MagicDNS:** Used for internal hostname resolution (e.g., `majorlab.tailscale.net`). - **ACLs:** Managed via the Tailscale admin console to restrict cross-group communication where necessary. --- *Last updated: 2026-03-04*