𝔩𝔢𝔩𝕠𝔭𝔢𝔷
Theme

Homelab

VLAN Architecture

Implementing VLAN Segmentation in UniFi: Isolating Network Traffic by Security Tier

Overview

This article implements VLAN segmentation in UniFi to isolate network traffic by security tier. You'll create 10 VLANs organized into four tiers, configure WiFi SSIDs for each zone, set up switch port profiles for wired devices, and enable MAC filtering to prevent physical attacks. All changes are made in the UniFi console - no cluster modifications yet.

Before You Begin

Prerequisites

  • Home Lab V2 completed (working cluster)
  • Access to UniFi console (unifi.ui.com or local)

What We're Setting Up

ComponentCountPurpose
Firewall Zones4Custom zones for default-deny between tiers
VLANs10Network segments by security tier
WiFi SSIDs6Wireless access per VLAN
Port Profiles8VLAN assignments for wired devices

Why VLANs

V2's flat network means any device can reach any other device. A compromised game server pod can reach the UDM, NAS, and personal devices - no container escape required, just network access.

VLANs create layer 2 boundaries. Devices on different VLANs can only communicate if firewall rules explicitly allow it (configured in the next article).

How Zones Work

Custom zones provide default-deny security between network tiers1. Unlike the built-in Internal zone (which allows all traffic between VLANs), custom zones block all traffic by default.

Warning:Devices on different VLANs can't communicate until you create Allow policies - even VLANs within the same zone.
Source → DestExternalGatewayCoreLabTrustedIsolated
CoreAllow AllAllow AllBlock AllBlock AllBlock AllBlock All
LabAllow AllAllow AllBlock AllBlock AllBlock AllBlock All
TrustedAllow AllAllow AllBlock AllBlock AllBlock AllBlock All
IsolatedAllow AllAllow AllBlock AllBlock AllBlock AllBlock All

After creating intra-zone Allow policies (Core → Core, Lab → Lab, Trusted → Trusted), devices within the same zone can communicate. Isolated stays Block All for defense in depth. Cross-zone policies are added in article 02.

VLAN Configuration Notes

Toggle VLAN ID from Auto to Manual to unlock the checkbox settings2. Assign each VLAN to a custom zone1 and disable Auto-Scale3 when you need custom DHCP ranges.

Why Isolate on Isolated VLANs? Custom zones block traffic between zones. Isolate Network blocks traffic within the same VLAN (L2 isolation). For Isolated VLANs, both are needed.

Why mDNS on Trusted VLANs? AirPlay, HomeKit, Chromecast, and Matter use mDNS for device discovery4. Enable mDNS on VLANs with discoverable devices (Things-Trusted, Things-Isolated) and VLANs with devices that need to discover them (Unrestricted-Trusted). The mDNS Proxy forwards discovery traffic between VLANs. Things-Isolated devices like Philips Hue need mDNS so HomePods can discover them for Siri control - mDNS is multicast advertisement, not initiating connections, so isolation is preserved.

How mDNS/IGMP columns work: Enabling mDNS or IGMP per-VLAN automatically adds that VLAN to the Gateway mDNS Proxy and IGMP Snooping scope. UniFi sets Custom mode and only proxies between VLANs where you enabled these features - not globally.

Why 5 GHz for main/filtered? iPhones, Macs, and iPads all support 5 GHz5. Using 5 GHz only for primary networks frees up 2.4 GHz slots for IoT and restricted devices. Home uses dual-band for HomePod compatibility. Note that 5 GHz has shorter range through walls - ensure adequate AP coverage.

Why Internet on Drive but not Protect? UNAS Pro needs internet for external file sharing via drop.ui.com6. Protect cameras only communicate locally with the UDM controller - no internet required.

Why speed limits on Isolated networks? Isolated devices are untrusted by definition - guests, IoT, managed devices. Speed limits add another layer of defense. Trusted networks are your own devices and don't need limits.

Why 15 Mbps for Personal? 1080p streaming requires 5-8 Mbps7 and FaceTime needs 1-5 Mbps8. 15 Mbps down / 5 Mbps up supports both while preventing bandwidth hogging on guest and sandbox networks. WiFi Speed Limits apply per client9 - each device gets its own limit, not shared across the SSID.

Why 2 Mbps for IoT? Philips Hue Bridge uses 1-2 Mbps10, and smart plugs/sensors need even less. 2 Mbps covers legitimate use while ensuring compromised devices can't be useful for data exfiltration or botnet activity - defense in depth.

Why custom DHCP ranges? Network and Lab have Scale disabled to reserve IPs:

VLANReserved IPsPurpose
Network.1-.99UDM, infrastructure
Lab.30-.39, .40-.79Talos nodes, MetalLB pool

Keep other defaults: DHCP Server mode, Auto Default Gateway, Auto DNS Server, Lease Time 86400.

Create Firewall Zones

Navigate to Settings → Security → Zones → Create Zone for each zone.

Zone NameVLANsPurpose
CoreNetwork (1), Protect (3), Drive (5)UDM, cameras, NAS
LabLab (10)Kubernetes cluster
TrustedThings-Trusted (20), Unrestricted-Trusted (30), Restricted-Trusted (40)Personal and entertainment
IsolatedThings-Isolated (25), Unrestricted-Isolated (35), Restricted-Isolated (45)IoT and guest devices

Intra-Zone Policies

Navigate to Settings → Security → Zones → click the Block All cell → Create Policy.

PolicySourceDestinationAction
Core → CoreCoreCoreAllow All
Lab → LabLabLabAllow All
Trusted → TrustedTrustedTrustedAllow All

Leave Isolated → Isolated as Block All.

Create VLANs

Navigate to Settings → Networks → Create New Network for each VLAN.

Core Tier

NameZoneScaleSubnetVLANIsolateInternetIGMPmDNSDHCP
NetworkCore192.168.1.0/241.100-.254
ProtectCore192.168.3.0/243(auto)
DriveCore192.168.5.0/245(auto)

Exposed Tier

NameZoneScaleSubnetVLANIsolateInternetIGMPmDNSDHCP
LabLab192.168.10.0/2410.100-.199

Things Tier

NameZoneScaleSubnetVLANIsolateInternetIGMPmDNSDHCP
Things-TrustedTrusted192.168.20.0/2420(auto)
Things-IsolatedIsolated192.168.25.0/2425(auto)

Users Tier

NameZoneScaleSubnetVLANIsolateInternetIGMPmDNSDHCP
Unrestricted-TrustedTrusted192.168.30.0/2430(auto)
Unrestricted-IsolatedIsolated192.168.35.0/2435(auto)
Restricted-TrustedTrusted192.168.40.0/2440(auto)
Restricted-IsolatedIsolated192.168.45.0/2445(auto)

Navigate to Settings → Networks and verify 10 networks are listed.

Create WiFi Networks

Navigate to Settings → WiFi, scroll to the bottom, and click Create New under WiFi Speed Limit.

WiFi Speed Limits

NameDownloadUpload
Personal15 Mbps5 Mbps
IoT2 Mbps1 Mbps

WiFi Blackout Schedules

Blackout schedules are configured per-SSID. After creating each SSID, navigate to Advanced → WiFi Blackout Schedule → On and set the schedule.

NameSchedule
Downtime8 PM - 5 AM daily

Apply Downtime to guest, filtered, and sandbox SSIDs.

WiFi Configuration

Navigate to Settings → WiFi → Create New for each SSID11.

Warning:UniFi APs limit 4 SSIDs per band. This configuration uses all 4 slots on each.
SSIDNetworkApplicationBandAdvancedHiddenIsolationSteeringLimitBlackout
<prefix>-mainUnrestricted-TrustedStandard5Auto--
<prefix>-filteredRestricted-TrustedStandard5Manual--Downtime
<prefix>-guestUnrestricted-IsolatedHotspot2.4 + 5ManualPersonalDowntime
<prefix>-homeThings-TrustedStandard2.4 + 5Manual-
<prefix>-iotThings-IsolatedIoT2.4Manual-IoT
<prefix>-sandboxRestricted-IsolatedStandard2.4Manual-PersonalDowntime

Hidden networks are configured once on devices. IoT and sandbox use 2.4 GHz only - 5 GHz band is at capacity. Band Steering pushes dual-band devices to 5 GHz. Blackout schedules disable WiFi during set times for restricted networks.

Navigate to Settings → WiFi and verify 6 SSIDs exist with correct VLAN mappings.

Create Port Profiles

Navigate to Settings → Networks, scroll to the bottom, and click Create New under Ethernet Port Profiles.

Note:MAC filtering is not available on UDM built-in ports. It applies when devices connect through a managed switch.
ProfilePortAllowed MACsNative VLANTagged VLAN ManagementPoE
AP-TrunkActive-Network (1)Custom: 20, 25, 30, 35, 40, 45Auto
BastionRestrictedAdmin MACNetwork (1)Block AllOff
ProtectRestrictedAll camera MACsProtect (3)Block AllAuto
DriveRestrictedNAS MACDrive (5)Block AllOff
LabRestrictedAll node MACsLab (10)Block AllOff
Things-TrustedRestrictedDevice MACsThings-Trusted (20)Block AllOff
Things-IsolatedRestrictedDevice MACsThings-Isolated (25)Block AllOff
Unrestricted-TrustedRestrictedDevice MACsUnrestricted-Trusted (30)Block AllOff

AP-Trunk is Active because WiFi client traffic keeps its original source MAC - filtering would block all clients. All other profiles are Restricted with allowed MACs to prevent unauthorized devices.

Assign Port Profiles

Navigate to Devices → [Switch] → Ports, select a port, and set Port Profile.

ProfileDevices
AP-TrunkUniFi APs
BastionMac bastion
ProtectProtect cameras
DriveUNAS Pro
Things-TrustedEntertainment
Things-IsolatedIoT devices
Unrestricted-TrustedWorkstations
Note:Lab profile is not assigned yet. Homelab nodes remain on Default until Talos migration configures DHCP reservations.

Navigate to Settings → Networks → Ethernet Port Profiles and verify 8 profiles exist.

Next Steps

VLANs and zones are configured with default-deny between zones. Devices on different zones can't communicate until firewall rules allow it.

Expected: Cross-zone access is blocked - Unrestricted-Trusted (Users) cannot reach Drive (Core) until firewall rules are added.

See: Firewall Rules

Resources

Footnotes

  1. Ubiquiti, "Zone-Based Firewalls in UniFi," help.ui.com. Accessed: Feb. 18, 2026. [Online]. Available: https://help.ui.com/hc/en-us/articles/115003173168-Zone-Based-Firewalls-in-UniFi

  2. R. Mens, "How to Setup UniFi Network - Complete Guide 2026," LazyAdmin. Accessed: Feb. 18, 2026. [Online]. Available: https://lazyadmin.nl/home-network/unifi-network-complete-guide/

  3. W. Howe, "UniFi Auto Scale Network - Use Cases," Willie Howe Technology. Accessed: Feb. 18, 2026. [Online]. Available: https://williehowe.com/2025/12/16/unifi-auto-scale-network-use-cases/

  4. C. Deluisio, "How to Set Up mDNS in UniFi Network," deluisio.com. Accessed: Feb. 21, 2026. [Online]. Available: https://deluisio.com/networking/unifi/2025/08/09/how-to-set-up-mdns-in-unifi-network/

  5. The Interface, "The HomePod mini does work with 5GHz WiFi," theinterface.uk. Accessed: Feb. 21, 2026. [Online]. Available: https://theinterface.uk/blog-posts/the-homepod-mini-does-work-with-5ghz-wifi

  6. NASCompares, "UniFi UNAS Pro - Complete Setup Guide," nascompares.com. Accessed: Feb. 21, 2026. [Online]. Available: https://nascompares.com/2024/11/08/unifi-unas-pro-complete-setup-guide/

  7. Netflix, "Internet connection speed recommendations," help.netflix.com. Accessed: Feb. 21, 2026. [Online]. Available: https://help.netflix.com/en/node/306

  8. Make Tech Easier, "How Much Bandwidth Does Video Calling Use?," maketecheasier.com. Accessed: Feb. 21, 2026. [Online]. Available: https://www.maketecheasier.com/how-much-bandwidth-does-video-calling-use/

  9. Ubiquiti Community, "Bandwidth limit on individual SSID," community.ui.com. Accessed: Feb. 21, 2026. [Online]. Available: https://community.ui.com/questions/Bandwidth-limit-on-individual-ssid/bfa152b9-9928-401e-8227-c2ec9f560285

  10. Super Home Pursuits, "How Much Bandwidth Does Philips Hue Use?," superhomepursuits.com. Accessed: Feb. 21, 2026. [Online]. Available: https://superhomepursuits.com/how-much-bandwidth-does-philips-hue-use/

  11. Ubiquiti, "UniFi WiFi SSID and AP Settings Overview," help.ui.com. Accessed: Feb. 20, 2026. [Online]. Available: https://help.ui.com/hc/en-us/articles/32065480092951-UniFi-WiFi-SSID-and-AP-Settings-Overview

Previous
Security Hardening Series