Top 5 This Week

Related Posts

6 things you need to know before setting up VLANs on your home network

If you have networking equipment that can support them, setting up virtual local area networks (VLANs) makes sense from a security and management perspective. Your devices will still think they’re on a physical LAN and will be able to talk to each other, but the different VLANs will only be able to talk to each other if you allow it.That’s perfect for keeping insecure IoT devices away from your data, your data away from your guests, and your guests away from the contents of your computer. Unless you decide you want them to talk to each other, of course. It essentially gives you multiple networks from one set of equipment, and makes your life much easier as a budding homelabber or network admin.

6

Inventory your network devices

You can’t manage what you don’t know you have

Before you even set up your first VLAN, the first thing is to take stock of the networked devices in your home. That way, you know what you’re about to manage and can sort them into groups according to whatever metrics you choose.

These could include:

  • Laptops
  • Mobile devices like phones and handheld gaming consoles
  • Desktops
  • IoT devices like video doorbells, smart thermostats, and smart lights
  • Network-attached storage (NAS) devices
  • Servers
  • Devices that are regularly at your home but not owned by you

Don’t forget to add your networking equipment to this list because some devices will be unmanaged and need grouping onto VLANs, while some will be managed and creating the VLANs for use by other devices.

Related


10 free and open-source ways to monitor your home network

Know what’s going on in your home network with these solid open-source monitoring tools.

5

Decide on how to group them

VLANs are awesome for keeping essential services accessible but safe

A TerraMaster F4-424 Max, F8 SSD Plus, and an Aiffro K100 placed side-by-side

One of the best features of using VLANs is better security, as devices that might be easier to attack can be kept on their own VLAN. Maybe you want to keep all your networked devices that have essential services on their own VLAN, like printers, NAS and other storage devices, and media servers. Keeping your mobile phones on a separate VLAN keeps them connected to the internet while not letting them touch other devices, and keeping laptops or desktops on their own VLAN makes things easier if one gets infected by malware.

However, how you want to group your devices is up to you, and finding the right balance between security and ease of administration is key here. You can even have a demilitarized zone (DMZ) on one VLAN to let web servers and game servers have incoming access from the internet, without opening the rest of your network to a potential attack vector. You’ll still want to run a hardware firewall on your network, but having VLANs correctly configured can slow or stop the spread of attacks if the firewall fails.

4

Don’t forget the guest network

You want to be a hospitable host, but not too hospitable

Set up guest network with time limits on TP-Link Archer

Access to the internet is almost a human right at this point, and you don’t want to tell your friends they can’t use your Wi-Fi to save their data plan while they’re around. But at the same time, you don’t want to let them access your file servers or your other devices. When you set up a guest network on your router, you’re setting up a VLAN that’s already configured to give devices connected to that network access to the internet while keeping them away from your other networked devices. Your friends get internet access, you stay safer, and everyone is happy.

Related


4 reasons you need to set up a guest network on your Wi-Fi

Add guest Wi-Fi with no new hardware

3

Keep IoT devices segregated

They’re a big security risk and are best kept apart from your other devices

When adding Internet of Things (IoT) devices to your network, keeping them away from your other networked devices is always a good idea. It’s not that they’re inherently insecure, but they tend to be quickly designed and rarely updated when security fixes for the hardware inside arrive, so they could be a potential issue.

When adding Internet of Things (IoT) devices to your network, keeping them away from your other networked devices is always a good idea.

The easiest way to keep them, and you, safe is to put all of your IoT devices on their own VLAN, with limited or no access to the internet. This might limit some of their functionality if you’re able to access them from outside your home, but you can put those on their own VLAN and ones that don’t need access to the wider internet on a second VLAN. That limits the exposure of your data-containing devices if one of the IoT devices gets hacked and also stops them from intercepting network traffic between your private devices.

Related


4 reasons you should use your SBC as an IoT hub for your smart home devices

Despite their small stature, SBCs are great for monitoring and controlling your smart gadgets

2

Custom firewall rules

Which VLANs can talk to each other and which can’t

Man working on a network switch by plugging in ethernet cable

Now you’ve got your devices on their own VLANs; it’s time to decide which devices need to be able to talk to those on other VLANs. This could be as simple as letting your laptops and desktops talk to your NAS to transfer data, or your streaming boxes to your home media server. Maybe you’ve got a printer and other networked devices on one VLAN that you want every one of your computers to be able to access or you want to be able to see your video doorbell from your laptop.

With VLANs set up, a managed switch, or a suitable router, you can then set custom firewall rules to get those devices and only those devices talking to each other. This is fantastic for controlling the flow of data around your network, building skills you could use in the workplace, and keeping your homelab in a place that it can’t affect the rest of your network if it goes down.

Related


You can virtualize your router and firewall – here’s how

Virtualizing a router isn’t anywhere nearly as difficult as you might think, provided you’ve got some spare network interfaces

1

Managed switches are more expensive

The more you want to do with them, the more you’ll have to pay

cat6a-switches-1

While simple, unmanaged switches can be relatively inexpensive, they can’t set up VLANs or let you configure any settings. Managed switches give you more utility, but the price increases with the number of additional features. If you’re going to be using VLANs on your network, you’ll want a managed switch with many ports so you can do advanced things like put individual VLANs to specific ports. You could even take this further and have that port go to another switch to expand the VLAN to more devices, but that one doesn’t have to be a managed switch if you don’t want it to be.

Related


9 things you can do with a managed network switch

We take a look at the great features that a managed network switch can provide, and why they are so important.

VLANs are amazing, but they take some thinking before you put them into practice

You don’t have to manage a huge corporate network to find utility in using VLANs. They’re an essential part of advanced network management and help keep your home network safer. There’s even the chance your router already has one in the inbuilt Guest Network feature, so you can still set one up to put less secure devices on even if you don’t have a prosumer router.

Related


How to easily replace your ISP router with a custom OPNsense firewall

Easily create your own router with this free open-source software

#setting #VLANs #home #network

source: https://www.xda-developers.com/things-you-need-to-know-before-setting-up-vlans-on-your-home-network/

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Popular Articles