[CASE_STUDY] Secure Home Lab & Network Segmentation

Project: Secure Home Lab & Media Server

A comprehensive home lab built to reclaim data ownership from subscription services and create a secure, segmented network for IoT devices and security experiments.

OPNsense UnRAID Docker VLANs Jellyfin Unbound DNS

Security Challenge

Consumer-grade networks are typically "flat," meaning a single compromised IoT device can act as a beachhead for an attacker to compromise high-value targets like personal computers or file servers.

Solution

I implemented a multi-VLAN architecture using OPNsense to segment the network into four primary zones: Trusted, IoT, Guest, and Lab. Strict firewall rules block all inter-VLAN traffic by default, with specific exceptions for necessary communication.

+---------------------+
|    [Internet]      |
|      |             |
+------|-------------+
       |
+------v-------------+
|    OPNsense        |
|    Firewall        |
+--+--+--+--+--+-----+
   |  |  |  |  |
   |  |  |  |  +---> [ Trusted Network ]
   |  |  |  |         (VLAN 10)
   |  |  |  |
   |  |  |  +---> [ IoT Network ]
   |  |  |        (VLAN 20)
   |  |  |
   |  |  +---> [ Guest Network ]
   |  |         (VLAN 30)
   |  |
   |  +---> [ Lab Network ]
   |        (VLAN 40)
   |
   +---> [ UnRAID Server ]
          (Access Port: VLAN 40)
          

Implementation Details

  • OPNsense firewall with multi-WAN failover
  • VLAN segmentation for different device types
  • Strict firewall rules with default deny
  • UnRAID server with Docker containers for services
  • Jellyfin media server for local streaming
  • Unbound DNS with ad-blocking
  • WireGuard VPN for secure remote access

Results

  • Complete network segmentation for security
  • Eliminated reliance on cloud services
  • Improved network performance and reliability
  • Secure remote access to home network
  • Reduced attack surface for IoT devices