VLAN Segmentation: Isolating Your IoT Devices

· 2 min read · 276 words
Contents

Why Segment Your Network?

The average home today has dozens of connected devices — smart bulbs, cameras, thermostats, TVs. Most of these devices have poor security track records: default credentials, infrequent firmware updates, and sometimes outright malicious firmware from vendors.

Putting them on the same flat network as your laptop and NAS is an unnecessary risk. VLANs fix this.

What Is a VLAN?

A Virtual LAN (VLAN) is a logical partition of a physical network. Devices on different VLANs cannot communicate with each other unless you explicitly allow it through firewall rules — even if they share the same physical switch.

VLAN Design for a Home Network

A reasonable starting layout:

VLAN IDNamePurpose
1DefaultAvoid using this one for anything important
10TrustedLaptops, desktops, phones you own
20IoTSmart home devices, TVs, cameras
30GuestWi-Fi for visitors
40ServersNAS, self-hosted services
99ManagementSwitch/AP management interfaces

Prerequisites

  • A managed switch that supports 802.1Q tagging (e.g., Netgear GS308E, TP-Link TL-SG108E)
  • A router/firewall that supports VLANs (OPNsense, pfSense, Unifi, MikroTik)
  • A wireless access point that can broadcast multiple SSIDs with VLAN tagging

Basic Firewall Rules

The golden rule: deny by default, allow explicitly.

For the IoT VLAN, you typically want:

# IoT VLAN firewall rules (in order)
BLOCK  IoT → Trusted   (IoT cannot reach your laptops/NAS)
BLOCK  IoT → Servers   (IoT cannot reach internal services)
ALLOW  IoT → Internet  (IoT can reach the outside world)
BLOCK  IoT → *         (catch-all deny)

Next Steps

In the next post, we’ll walk through the actual configuration steps in OPNsense — creating the VLAN interfaces, setting up DHCP per VLAN, and writing the firewall rules.