Intro
For this project, it’s essential to have a highly configurable firewall and gateway that supports advanced networking features. Specifically, the lab requires:
VLAN support for network segmentation
Advanced routing and NAT rules
Internal DNS resolution
Traffic filtering and monitoring capabilities
There are many firewalls that meet these criteria, including OPNsense, VyOS, and enterprise-grade hardware solutions. However, I’m most familiar with pfSense, a mature and feature-rich open-source firewall built on FreeBSD. It offers a robust web interface, extensive community support, and deep configuration options.
That said, as I continue to build out my homelab environment, I plan to experiment with alternative solutions in controlled scenarios. This project begins with pfSense, but it’s part of a broader effort to explore and compare tools in real-world setups.
Hardware Considerations
When selecting hardware for a firewall, it’s important to balance external bandwidth needs (your ISP connection) with internal throughput (the traffic between devices on your network).
In my case:
My expected internet connection is 400 Mbps down, which is a common mid-range residential speed
However, my internal network will use Gigabit Ethernet (1000 Mbps) hardware, allowing much faster communication between devices within the lab
This means that while external downloads are limited to 400 Mbps, internal operations like file transfers, backups, and logging between VMs or hosts can run at full gigabit speed — independent of the internet.
A note on terminology (often a source of confusion):
Gigabit (Gb) and Megabit (Mb) measure network bandwidth
Gigabyte (GB) and Megabyte (MB) measure file sizes or storage
1 byte = 8 bits, so a 1000 Mbps network can theoretically transfer ~125 MB per second
This distinction helps explain why an internet connection labeled as “400 Mbps” won’t download files at “400 megabytes per second” — it’s a difference in units, not speed inconsistency.
Core Network Hardware
To support this lab’s needs for VLANs, routing, and internal traffic analysis, I’ve selected the following core hardware:
Router: Protectli Vault FW4B-0-8-120
An affordable, compact mini PC purpose-built for firewall deployments.Equipped with 4 Intel NICs, RJ45 console port, USB 3.0, and HDMI output
Ideal for running pfSense, with enough horsepower to handle IDS/IPS workloads, VLAN routing, and VPN throughput
Switch: TP-Link TL-SG1024DE (24-Port Gigabit Easy Smart Switch)
A budget-friendly, VLAN-capable switch with a good port count.Supports 802.1Q VLAN tagging, port mirroring, and basic traffic monitoring
Not a full Layer 3 managed switch, but sufficient for homelab segmentation and testing
These choices reflect a balance between cost, capability, and power efficiency. Both are key considerations for long-running home infrastructure. This also happens to be hardware I already had on hand from previous lab iterations.
Integrating the Switch with pfSense
Although the TP-Link TL-SG1024DE is not a fully managed Layer 3 switch, it supports 802.1Q VLAN tagging, which is essential for network segmentation in this lab. Later in the project, pfSense will be configured with multiple VLAN interfaces, and this switch will relay that segmentation across physical ports.
The switch’s configuration will be kept intentionally minimal — enough to mirror VLAN assignments from pfSense and ensure tagged traffic is properly segmented across connected hosts. This strikes a balance between practical homelab capability and the kind of structured isolation seen in production networks.
VLAN creation and tagging will be covered in the next post where pfSense interface assignments and switch configuration are aligned.
Home vs. Industry: What’s Different?
While this project aims to replicate many aspects of a production network, it’s important to understand where a residential homelab environment differs from a true enterprise deployment:
Area | Homelab Setup | Industrial Network |
---|---|---|
Hardware | Low-power appliances (Protectli, TP-Link) | Enterprise-grade appliances (Cisco, Juniper, Fortinet) |
Switching | Basic VLAN support, limited QoS/ACLs | Full Layer 3 switching, redundant paths, PoE, QoS |
Power & Cooling | Standard power supply, minimal cooling | UPS-backed redundant power, climate control |
Uptime/SLAs | Occasional reboots/upgrades acceptable | High availability, failover, 24/7 reliability |
Scale | < 10 devices or VMs | 100s–1000s of clients, racks of gear |
Despite these limitations, a homelab can closely approximate the structure and workflows of a production network. With the right VLAN configuration, firewall policies, and service layering, the lab will replicate key architectural and security concepts used in professional environments.
By designing with modularity, segmentation, and observability in mind, this project builds meaningful, real-world experience — even if the equipment is scaled down.
pfSense Installation Summary
With hardware selected and goals defined, I installed pfSense CE on the Protectli Vault using the standard USB Memstick installer. The setup process involved:
- Flashing the pfSense ISO to a USB drive
- Booting via HDMI and keyboard
- Installing to the internal SSD and assigning interfaces via console
Initial layout:
igb0
→ WAN (modem)igb1
→ LAN (managed switch)
After setting a static LAN IP, I accessed the web UI to:
- Run the setup wizard
- Configure admin credentials and hostname
- Verify WAN/LAN routing
- Set custom DNS servers (I currently prefer Google’s 8.8.8.8 and 8.8.4.4)
With connectivity verified, the firewall was ready for advanced configuration: VLANs, firewall rules, IDS, and DNS overrides.
In the next post, I’ll walk through configuring VLAN interfaces on pfSense and aligning the switch port assignments to match.