Home About Certifications Projects Contact
Home Lab 2026

The Issue with Routers & Segmentation

Modern home routers trade security for convenience — and most people have no idea how vulnerable their flat networks really are. This project explores why network segmentation matters, when VLANs aren't an option, and how I built an 8-VLAN UniFi setup that balances real security with daily usability.

UniFi VLANs Network Segmentation Firewall Rules IoT Security Home Lab

Overview

Home routers are designed for speed and simplicity — a user can be online in minutes. But that ease of setup often comes at a serious cost to security. Beyond default passwords and unpatched firmware, the biggest overlooked problem is the lack of network segmentation. When every device lives on the same flat network, a single infected guest phone or sketchy smart plug can reach your work laptop, NAS, or anything else on the network.

Segmentation is the practice of separating devices into isolated groups so that a compromise in one zone cannot spread to others. VLANs (Virtual Local Area Networks) are the standard tool for this — they let a single physical router carry multiple logically separated networks simultaneously. Many consumer routers used to support VLANs, but they were complicated enough that most people ignored them. Today, with IoT devices in every room and remote work on every kitchen table, the stakes are too high to keep ignoring this.

Overall network diagram showing all 8 VLANs
Fig 1 — Final network layout: 8 isolated VLANs on a single UniFi router

The Problem with Flat Networks

The threat model is simple: every device you add to your network is a potential entry point. IoT devices like smart plugs, smart bulbs, and cameras are among the least secure pieces of tech on the market — they often run outdated firmware, rarely receive patches, and can't be hardened by the end user. Printers and smart TVs are in the same boat, typically losing vendor support after one to two years.

EERO routers are a particularly stark example of this problem. Manufactured by Amazon — a company whose own IoT lineup (Alexa, Ring cameras, smart plugs) has a poor security track record — EERO offers no native VLAN support. If you're running an all-Amazon setup, you have no built-in way to separate those IoT devices from the rest of your network.

Tip: You can sidestep the outdated smart TV problem by replacing the TV's built-in OS with a streaming stick like a Fire Stick or Apple TV — these receive updates significantly longer than any smart TV firmware.

Options When VLANs Aren't Available

If your router doesn't support VLANs, there are two practical alternatives — both with real trade-offs.

Option 1: Guest Network Isolation

Most modern routers include a guest network feature. It's important to understand what this actually does: the guest SSID is not a separate network in the VLAN sense. It's a separate Wi-Fi connection that still routes through the same IP subnet — but with stricter firewall rules applied by the router. Guest networks typically block device-to-device communication and restrict access to local resources. This makes them a useful place to dump IoT devices — they can reach the internet but can't poke around your LAN. It's the bare minimum solution, and it costs nothing extra.

Guest network diagram showing firewall between guest and secure devices
Fig 2 — Guest network setup: firewall separates guest and secure devices sharing the same physical router

Option 2: Separate Physical Routers

If one router means one network, the straightforward fix is more routers. My old setup used a Nighthawk mesh system for main traffic and EERO routers for IoT, legacy devices, and anything untrusted. For an infected device on one router to reach a device on the other, it would need to escape its own router, pass through the modem, and compromise the second router — all without triggering detection. The downsides are cost, space, and potential Wi-Fi interference. When possible, assign different frequency bands: 5 GHz / 6 GHz for the main router, 2.4 GHz for IoT (which is all most IoT devices support anyway).

Separate router diagram showing ISP modem with two downstream routers
Fig 3 — Dual-router setup: ISP modem branches to separate routers for IoT and main traffic

The Real Solution: UniFi VLANs

For proper segmentation, you need a router that actually supports VLANs. UniFi's Dream and Express series are the best-known consumer options with enterprise-grade features. I used a UniFi router to build the following 8-VLAN architecture — sized to be comprehensive without becoming unmanageable.

VLAN diagram showing 8 VLANs connected to a single router
Fig 4 — 8 VLAN layout: each segment gets its own network, firewall zone, and Wi-Fi policy
ID Name IP Range Wi-Fi Isolated Purpose
1 Secure 10.0.1.1/24 WPA3 · 5/6 GHz No Primary trusted devices — laptops, phones, Mac
2 Management 10.0.2.1/24 No Wi-Fi Yes Router/switch admin access, limited device allowlist
3 Quarantine 10.0.3.1/24 WPA2/3 · All bands Yes Unknown or untrusted devices pending review
4 Server 10.0.4.1/24 No Wi-Fi Yes Pi cluster — wired only, selective port allowlist
5 IoT 10.0.5.1/24 WPA2 · 2.4 GHz only Yes Smart plugs, bulbs, printer — internet but no LAN
6 Legacy 10.0.6.1/24 WPA2/3 · 2.4/5 GHz Yes Old consoles, 3DS, devices without recent updates
7 VPN 10.0.7.1/24 No Wi-Fi Yes Remote access tunnel — configured in next project
8 Guest 10.0.8.1/24 WPA2/3 · All bands Yes Visitors — internet only, DNS via 9.9.9.9 / 1.1.1.1 / 8.8.8.8
IP Schema: All VLANs follow the pattern 10.0.[VLAN_ID].1/24, giving up to 255 devices per segment — more than enough for any home network, and easy to read at a glance.

Firewall Configuration

By default, UniFi VLANs are not isolated — inter-VLAN routing is on. Every network above (except Secure) was explicitly isolated using UniFi's firewall zone system. The interesting case is IoT: the printer lives on the IoT VLAN for security reasons, but my work computers on the Secure VLAN need to print. The solution is a targeted firewall rule that allows the printer's IP to communicate on specific ports only, with everything else dropped.

# Printer port allowlist (adjust based on your printer and OS)
TCP 631   — IPP (Internet Printing Protocol)
TCP 515   — LPD/LPR legacy printing
TCP 445   — SMB (Windows file sharing / scan-to-folder)
TCP 137-139 — NetBIOS (legacy Windows discovery)
TCP 9100  — RAW / JetDirect printing
Note: The ports required depend on your printer model and OS. Test with the minimum needed and add only what breaks. You can further harden IoT by routing device communication through Home Assistant — that's a separate project.

The remaining VLANs follow simpler rules:

Note: Setting Pi-hole as primary DNS with external backups is generally fine — your internal network responds faster than an external DNS round-trip, so Pi-hole will win the race in almost all cases.

What I Accomplished

Firewall Rules Zero-trust isolation on all 7 non-default VLANs with targeted printer allowlist
DNS Architecture Pi-hole on Secure VLAN with 1.1.1.1 & 9.9.9.9 fallback for network-wide ad blocking
IoT Segmentation All IoT devices isolated on 2.4 GHz-only WPA2 SSID, internet access only
IP Schema 10.0.[ID].1/24 across all VLANs — clean, readable, room for 255 devices each
Legacy Support Dedicated VLAN for old consoles and unpatched devices, fully isolated
Guest Access Isolated guest SSID supporting all bands and WPA2/3, no LAN visibility

Key Takeaways

The biggest lesson from this project is that network security at home isn't just about having a good password — it's about limiting blast radius. A compromised IoT device on a flat network can see everything. The same device on an isolated VLAN can reach the internet and nothing else. That difference is enormous.

UniFi makes this achievable at home without a networking degree, but it still requires deliberate planning: knowing which devices belong where, which ports actually need to be open, and which inter-VLAN communications are genuinely necessary versus just convenient. The firewall zone model makes those decisions explicit rather than hidden behind default behavior.

The next project will wire up the VPN VLAN for secure remote access, and a future project will explore using Home Assistant as an additional control layer for IoT traffic. Device naming is also worth doing as soon as the network is up — being able to see "Kieran's MacBook" instead of a MAC address makes detecting rogue devices significantly faster.

Tools & Resources

UniFi Dream / Express Router
Primary router; VLAN creation, firewall zones, and Wi-Fi SSID assignment all done through the UniFi console
Pi-hole
Running on the Pi cluster (Server VLAN); set as the DNS resolver for the Secure VLAN to block ads network-wide
UniFi Firewall Zones
Used for all inter-VLAN rules; visualizes traffic policies and makes rule ordering explicit
Nighthawk Mesh (legacy)
Previously used as the main network router in the dual-router setup before transitioning to UniFi
EERO (IoT-only)
Amazon EERO repurposed as a dedicated IoT router in the dual-router setup; no VLAN support
Cloudflare 1.1.1.1 / Quad9 9.9.9.9
Backup DNS resolvers used on isolated VLANs that don't route through Pi-hole