Home Network Architecture
Design a segmented home network with VLANs, firewall rules, IDS/IPS, WireGuard VPN, and monitoring dashboards worthy of your professional standards.
Network Segmentation with VLANs
Most home networks are flat: every device β your laptop, your kid's tablet, your smart fridge, your security cameras β shares the same Layer 2 broadcast domain. A compromised IoT device can ARP-spoof your workstation, scan internal services, or pivot to anything else on the network.
VLANs (Virtual LANs) create separate broadcast domains on a single physical network, and inter-VLAN traffic must pass through a router/firewall where you control it.
VLAN Architecture
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β HOME NETWORK β
β β
β VLAN 10: Trusted (192.168.10.0/24) β
β βββ Your workstation β
β βββ Your phone β
β βββ NAS (restricted access) β
β βββ Access: Full internet + all VLANs (outbound) β
β β
β VLAN 20: IoT (192.168.20.0/24) β
β βββ Smart thermostat, lights, speakers β
β βββ Smart TV, streaming devices β
β βββ Access: Internet only, NO access to other VLANsβ
β β
β VLAN 30: Guest (192.168.30.0/24) β
β βββ Guest WiFi devices β
β βββ Access: Internet only, isolated from all VLANsβ
β β
β VLAN 40: Cameras/Security (192.168.40.0/24) β
β βββ Security cameras, door locks β
β βββ Access: NVR only, NO internet (optional) β
β β
β VLAN 50: Lab (192.168.50.0/24) β
β βββ Development servers, VMs, home lab β
β βββ Access: Internet + limited trusted VLAN accessβ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Hardware Requirements
You need:
- A managed switch that supports 802.1Q VLAN tagging (TP-Link TL-SG108E ~$30, or UniFi Switch Lite 8 PoE ~$100)
- A router/firewall that supports VLANs (OPNsense/pfSense on any x86 box, or OpenWrt on a supported router)
- A WiFi access point that supports multiple SSIDs mapped to VLANs (UniFi AP, or OpenWrt-compatible AP)
OPNsense VLAN Configuration
# OPNsense: Create VLANs
# Interfaces β Other Types β VLAN
# Create VLAN 10 on parent interface igb1 (LAN)
# Create VLAN 20 on parent interface igb1
# etc.
# Assign interfaces
# Interfaces β Assignments β Add each VLAN
# VLAN10 β OPT1 (rename to "Trusted")
# VLAN20 β OPT2 (rename to "IoT")
# VLAN30 β OPT3 (rename to "Guest")
# Enable DHCP on each interface
# Services β DHCPv4 β [each VLAN interface]
# VLAN10: 192.168.10.100 - 192.168.10.250
# VLAN20: 192.168.20.100 - 192.168.20.250
# VLAN30: 192.168.30.100 - 192.168.30.250
Switch Configuration (TP-Link Managed)
# 802.1Q VLAN Configuration
# Port 1 (uplink to router): Tagged on VLANs 10, 20, 30, 40, 50
# Port 2-4 (trusted devices): Untagged VLAN 10
# Port 5-6 (IoT devices): Untagged VLAN 20
# Port 7 (camera NVR): Untagged VLAN 40
# Port 8 (lab server): Untagged VLAN 50
# WiFi: Create SSIDs per VLAN
# SSID "HomeNet" β VLAN 10 (WPA3)
# SSID "IoT" β VLAN 20 (WPA2 for compatibility)
# SSID "Guest" β VLAN 30 (WPA2, client isolation ON)
Why This Matters
Without VLANs, a compromised smart lightbulb can:
- ARP spoof to intercept traffic from your workstation
- Port scan to find your NAS, home lab, or SSH services
- Serve as a pivot point for lateral movement
- Exfiltrate data from any device on the LAN
With VLANs + firewall rules, the lightbulb can only talk to the internet and sees nothing else. The compromise is contained to VLAN 20, and your firewall logs the boundary crossing attempt.
VLAN segmentation is the single highest-impact network security improvement for a home network.