Quote from: deanwebb on April 26, 2021, 03:42:13 PM
If there is no restriction on communication, there's no real reason to separate devices by VLAN except for administrative tracking purposes. In customer sites, we'll carve up networks for printers, security cameras, medical devices, and such, then put an ACL restriction on them so that there is no inbound/outbound traffic allowed except for the ports used for standard communications, and limited to authorized servers in the case of the cameras and med devices.
The restriction on communication would really only come into play if some IOT device was compromised somehow. It would then be on the VLAN that only allows for specific traffic related to the application. I realize this is unlikely to actually be effective at real security, but I don't see it hurting anything. Plus I do get the added benefit of some administrative organization.
Quote from: deanwebb on April 26, 2021, 03:42:13 PM
If the ISP modem opens a port to a specific IP, not much of a use case for segmentation of your inner network. If it opens a port to your whole network, then you'll want to segment things.
I always assumed (probably incorrectly) that a modem was a wide open pipe, port wise, to the internet. I'm not entirely sure what happens behind the scenes, but won't the modem typically blast all traffic to the router which then decides what to do with it based on port forwarding, etc...? How would I know if my ISP's modem opens a port to a specific IP, or if it opens a port to my whole network? Isn't that a router thing?
Quote from: deanwebb on April 26, 2021, 03:42:13 PM
One other way of thinking this through is to have Internet-facing devices in one network, the DMZ, and then a firewall between those and the rest of the home network. The firewall is there to put a hard stop on any traffic coming through the DMZ to your inner network, but to allow inner traffic to get out to the rest of the world - but only through the firewall. This is even more secure if you have no default route defined, so that botnet traffic that doesn't know to use your firewall as a way out will be unusable on your network.
Most if not all of my devices are internet facing devices. What would be a network device that is not internet facing? A NAS that I only want to access internally?
I think I am having the most trouble with selecting the actual hardware. I think I need a router in my closet, but then I am not sure what to do beyond that. I could put a wired router in there and run my ethernet lines around the house, including to wireless access points... or to a wifi router that I use as an AP? I appreciate the responses... looking forward to improving my network.