• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: October 16th, 2023

help-circle
  • bufandatl@alien.topBtoHomelab@selfhosted.forumHow to VLAN iot?
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 months ago

    You basically need a router between the networks. I would recommend pfsense or opnsense or if you like cli vyOS. I run a pfsense that has my ISP router on the WAN port and a network interface for all VLANs and then I configured the firewall to allow specific traffic to specific devices in specific VLANs. For example my PC can reach the smart home controller website but no other device. And the samrthome devices only can reach the DNS in the ISP network (my kinda DMZ) and the router to reach the internet. And for every VLAN there are own rules where goes what communication.

    You also can setup that on the managed switch which you would need for setting up VLANs.









  • The problem is a lot of people here are beginners and have no real clue about network security. And opening a port is opening a door. If you have a bouncer that clears people beforehand then you can keep the door open. But you will still need to keep your bouncer trained so he can take care of people you don’t want. Same with software. Keep it updated and have security enhancements in place like 2FA and analysis tools like crowdsec or fail2ban. And the open port might not an issue at all.

    But if you open a device like a NAS (cough QNAP cough) then you have a higher security risk.

    TLDR; if you know what you are doing it might not have implications.











  • Sure you can. The question is what are the exact specs and what do you want to self-host?

    I have two HP EliteDesk 800 Mini as a XCP-NG pool. Both with i5 6th gen only but with 64GB each and they run about 20 VMs distributed between both.

    Sure they won’t be able to perform large language model tasks but for most self-hosted services they are more than powerful enough.