Can you point me in the right direction to do some reading and research?
My goal is to segregate my home network to keep things I don't trust away from the things I need to have on a trusted network. Here's a first cut on loose requirements:
Area 1: Guest wifi. - works out of the box on my router. Only has outbound access. I don't need this to route back to my private network. Simply a guest, outbound network for family members that visit.
Area 2: A less trusted area; wired and WiFi. Contains "internet of things" things in my house that I'm not sure I want on my more trusted network. Home to a minecraft server that has inbound access via NAT / port forwarding on my current router.
Area 3: The more trusted area. I want my Win8 and Win7 and OSX Desktop/Laptops here. Most are wired. I need VPN inbound to at least one of the systems, and I need the ability to Wake On Lan one of the systems. I guess the HP printer/scanner could live in this area, but Area 2 would be better. If all the connections are host initiated then I'd prefer it in area 2.
I think I want all of our phone's in Area 2 when on WiFi so they can control the Blu-Ray's and turn on the coffee pot.
Why?
I don't trust the phones.
I don't trust the WiFi enabled DVR/BluRay/Wii/WashingMachine/CoffeeBot on the same LAN as my desktops.
I don't like the minecraft server for my kids NAT'd / Port forwarded inbound is on the same LAN as the rest of my systems. Maybe I'm paranoid. I think I have it locked down fairly well but since port forwarding is enabled to a close-sourced, now owned by M-Soft, and we run some mods, and, I'd like a wall between it and me
So back to my original question. What tech should I read up about?
Should I be looking for a layer 2 approach? or fire walled layer 3 approach or ???
An link to article or post to point me in the right direction would be awesome.
Thanks in advance.
ps: The CoffeeBot reference was sarcasm and a Freudian typo, but I expect to own one soon, so if nothing else I will know who takes the last cup and does not brew another pot.
My goal is to segregate my home network to keep things I don't trust away from the things I need to have on a trusted network. Here's a first cut on loose requirements:
Area 1: Guest wifi. - works out of the box on my router. Only has outbound access. I don't need this to route back to my private network. Simply a guest, outbound network for family members that visit.
Area 2: A less trusted area; wired and WiFi. Contains "internet of things" things in my house that I'm not sure I want on my more trusted network. Home to a minecraft server that has inbound access via NAT / port forwarding on my current router.
Area 3: The more trusted area. I want my Win8 and Win7 and OSX Desktop/Laptops here. Most are wired. I need VPN inbound to at least one of the systems, and I need the ability to Wake On Lan one of the systems. I guess the HP printer/scanner could live in this area, but Area 2 would be better. If all the connections are host initiated then I'd prefer it in area 2.
I think I want all of our phone's in Area 2 when on WiFi so they can control the Blu-Ray's and turn on the coffee pot.
Why?
I don't trust the phones.
I don't trust the WiFi enabled DVR/BluRay/Wii/WashingMachine/CoffeeBot on the same LAN as my desktops.
I don't like the minecraft server for my kids NAT'd / Port forwarded inbound is on the same LAN as the rest of my systems. Maybe I'm paranoid. I think I have it locked down fairly well but since port forwarding is enabled to a close-sourced, now owned by M-Soft, and we run some mods, and, I'd like a wall between it and me
So back to my original question. What tech should I read up about?
Should I be looking for a layer 2 approach? or fire walled layer 3 approach or ???
An link to article or post to point me in the right direction would be awesome.
Thanks in advance.
ps: The CoffeeBot reference was sarcasm and a Freudian typo, but I expect to own one soon, so if nothing else I will know who takes the last cup and does not brew another pot.