SOP - Performing a Network Audit and Asset Discovery
The Instructor's Perspective
In the Army, we call this “Mapping the Terrain.” You can’t secure what you can’t see. This SOP defines how to perform a multi-layer reconnaissance of the Home Lab using Proxmox, MikroTik, and Nmap. This is a “Force Multiplier” for identifying “Ghost Devices” and ensuring “Signal Discipline.”
1. Prerequisites
- SSH Access to the Proxmox Hypervisor (192.168.42.10).
- SSH Access to the Office Router (192.168.42.1) and House Router (192.168.88.1).
nmapinstalled on the workstation or a discovery node.
2. Phase 1: Edge Recon (MikroTik)
Start at the “Front Line.” Identify what the router sees on its ports and ARP table.
- Interfaces: Run
/interface printto see physical link status. - ARP Table: Run
/ip arp printto see active IP-to-MAC mappings. - Neighbor Discovery: Run
/ip neighbor printto find LLDP/MNDP-capable hardware (Ubiquiti, other MikroTiks). - Firewall Audit: Run
/ip firewall exportto verify port-forwarding and NAT rules.
3. Phase 2: Hypervisor Recon (Proxmox)
Check the “Command Post” for virtualized assets.
- LXC/VM List: Run
pct listandqm list. - IP Mapping: For internal containers, run:
for id in $(pct list | awk '{print $1}' | grep '^[0-9]'); do pct config $id | grep ip=; done - ZFS Health: Check for old snapshots taking up space with
zfs list -t snapshot.
4. Phase 3: Active Scanning (Nmap)
Perform a “Signal Sweep” to find anything not reporting to the hypervisor or router.
- Host Discovery:
nmap -sn 192.168.42.0/24(and other subnets). - Deep Service Scan:
nmap -A [target_ip]for unidentified MAC addresses.- Look for: XCC/IPMI controllers, IoT sensors, and mobile devices.
5. Phase 4: Documentation (The NetYeti Way)
- Archive Offline Devices: Move any devices not found during the scan to
Network/Devices/Archive/. - Update Active Devices: Ensure all discovered IPs and services are reflected in the
Network/Devices/folder. - Update the Map: Verify the physical and logical links in the Network Map.
Knowledge Check: Signal Review
- Why do we use the Hypervisor as a discovery node? (Answer: It has the “Ground Truth” for internal container IPs that may not respond to external pings).
- What is the significance of the “bad_ipv4” list in the MikroTik firewall? (Answer: It drops bogon and non-routable traffic at the RAW table layer, saving CPU cycles).
- How do you identify a Lenovo XClarity Controller? (Answer: Look for “IMM3-Main” in the web headers or the “Compal Information” MAC vendor).
Status: Operational Related: SOP - Secret Management in the Home Lab, The Stack