WAN
Port forwarding
Firewall rules
In addition to default rules.
Name | Action | Source Zone | Destination Zone |
---|
Allow UniFi remote access | Allow | External | Gateway |
Local network
VLANs
Name | Subnet | Description | Isolate network |
---|
Default | 192.168.1.0/24 | Default local network for laptops, family phones and tablets | No |
Pub | 192.168.50.0/24 | An isolated VLAN for public services | No |
Guest | 192.168.5.0/24 | An isolated VLAN for guest WiFi access | No |
IoT | 192.168.6.0/24 | An isolated VLAN for connected home appliance | No |
- Device Isolation is disabled for all networks
Firewall zones
Zones access rules
Additional Firewall rules allowing or blocking zone-to-zone or subnet-to-subnet communications.
Source Zone | Destination Zone | Source | Destination | Action | Description |
---|
Internal | VLAN 50 | All | All | Allow with return | Allow all traffic from Default network to Pub |
Internal | VLAN 6 | All | All | Allow with return | Allow all traffic from Default network to IoT |
VPN | Internal | VPS subnet | All | Allow only return | Allow return traffic from VPS subnet to Default |
VPN | Internal | VPS subnet | All | Block | Block VPS VPN clients from accessing the Default network |
VPN | Hotspot | VPS subnet | All | Block | Block VPS VPN clients from accessing the Guest network |
VPN | DMZ | VPS subnet | All | Block | Block VPS VPN clients from accessing the DMZ zone |
VPN | VLAN 50 | All | Hearthstone | Allow all | Allow Hearthstone VPN clients access to Pub network |
VPN | VLAN 6 (IoT) | All | Hearthstone | Allow all | Block Hearthstone VPN clients access to IoT network |
VLAN 50 | VLAN 50 | All | All | Allow all | Allow Pub network clients accessing each other |
VPN
There are two Wireguard servers configured:
- Hearthstone. Subnet 192.168.3.0/24. For external access to all local networks.
- VPS. Subnet 192.168.4.0/24. For accessing VPS servers as local network devices.