PrivacyGear.nl

Home network segmentation: VLANs, guest networks, and isolating IoT

Your smart TV, doorbell, and smart bulbs shouldn't be on the same network as your laptop and phone. We explain what VLANs are, when you need them, and how to set them up.

Home network segmentation: VLANs, guest networks, and isolating IoT

Home network segmentation: VLANs, guest networks, and isolating IoT

Your home network is probably one big flat network: router → everything connected to it. Laptop, phone, smart TV, IP camera, smart bulbs, and your guest’s phone all share the same space. If one device is compromised, it can see and attack everything else.

Network segmentation fixes this by dividing devices into separate zones that cannot communicate with each other.


The problem: one network for everything

Suppose your smart TV is compromised — through a vulnerable firmware update or a malicious app. On a flat network, that TV can:

  • Scan your NAS and read files
  • Intercept traffic from your laptop
  • Attempt to log into your router
  • Use your phone as an attack target

This sounds theoretical, but smart TVs, IP cameras, and other IoT devices often run outdated software without regular updates. They are the weakest links in your network.


The solutions: three options

Option 1: guest network (simplest)

A guest network is a separate Wi-Fi network alongside your main network. Devices on the guest network:

  • Have internet access
  • Cannot communicate with devices on the main network
  • Cannot reach each other either (if client isolation is enabled)

When to use: smart TV, streaming sticks, IoT devices, visitors.

Limitation: guest networks are binary — you have one main network and one guest network. You cannot create multiple separate zones with different rules.

Setup: almost every modern router supports this. Look for Guest Network in your router settings.


Option 2: VLAN (more flexible)

VLAN stands for Virtual Local Area Network. It is a way to split one physical network into multiple logically separate networks, each with its own rules.

The difference from a guest network:

  • A guest network is one fixed extra zone
  • With VLANs you create as many zones as you want, each with its own access rules

Example home setup:

VLANDevicesInternet access?Access to other VLANs?
VLAN 10 — HomeLaptop, phone
VLAN 20 — IoTSmart TV, bulbs, camera
VLAN 30 — GuestsVisitor phones
VLAN 40 — NASStorage, backup❌ (optional)VLAN 10 only

Each VLAN has its own Wi-Fi name (SSID) or cable port. Devices in VLAN 20 never see devices in VLAN 10 — even though they share the same router.

When to use: when you want more control than a guest network provides, or need multiple zones (work, IoT, guests, NAS).


Option 3: physically separate network (maximum isolation)

The TV or IoT device gets a completely separate router or access point with its own internet connection. No shared hardware, no shared software layer.

When to use: for devices you absolutely do not trust, or for high-risk users. Overkill for most home situations.


What do you need for VLANs?

A standard ISP-provided router does not support VLANs. You need a router that does:

RouterVLAN supportDifficulty
GL.iNet (Beryl AX, Flint 2/3)✅ Via OpenWrtMedium
OPNsense / pfSense✅ FullHigher
Ubiquiti UniFi✅ FullMedium–Higher
Standard ISP router❌ None or limited

For most home users, a GL.iNet router is the practical choice: OpenWrt is pre-installed, the interface is accessible, and the hardware is affordable.


Setting up VLANs on GL.iNet

GL.iNet routers run OpenWrt but also have their own management panel. For VLANs, use the OpenWrt interface (LuCI).

Step 1: open LuCI

Go to 192.168.8.1Advanced SettingsOpen LuCI. Log in with your router password.

Step 2: create a new VLAN interface

Go to NetworkInterfacesAdd new interface.

  • Name: e.g. iot
  • Protocol: Static address or DHCP client
  • IP range: use a separate subnet, e.g. 192.168.20.1/24 for VLAN 20

Step 3: create a separate Wi-Fi network for the VLAN

Go to NetworkWirelessAdd.

  • Give it a separate name (SSID): e.g. Home-IoT
  • Attach it to the new interface (e.g. iot)
  • Enable client isolation so devices cannot see each other

Step 4: set up firewall rules

Go to NetworkFirewallTraffic Rules.

Add a rule blocking traffic from the IoT VLAN to the main network:

  • Source zone: iot
  • Destination zone: lan
  • Action: Reject

The IoT network then has internet access but cannot reach your laptop or NAS.


Practical device assignment for home use

Main network (trusted): Laptop, desktop, phone, tablet, NAS

Guest network / VLAN: Smart TV, streaming sticks, smart bulbs, IP camera, doorbell, games console, visitor phones

Never on the same network as trusted devices:

  • Smart TV (ACR, trackers) — see Smart TV privacy guide
  • IP cameras (often poor firmware)
  • Smart bulbs and plugs (Tuya-based devices send data to China)
  • Games consoles (large attack surface, connect to external servers)

Summary

SolutionRequired hardwareDifficultyGood for
Guest networkAny modern routerLowSmart TV, IoT, guests
VLANRouter with OpenWrt/VyOS/UniFiMediumMultiple zones, more control
Physically separate networkExtra router or switchLow–MediumMaximum isolation

Start with a guest network for IoT devices — that already solves the biggest problem. VLANs are the next step when you want finer control.


See also: