Skip to main content
Lesson 3 of 5 5 min read

Network Segmentation for IoT Devices

Why You Should Separate Your Smart Devices

Imagine your home network as an apartment building. Right now, all your devices are living in one big open room: your laptop with your banking information, your phone with your photos and email, your smart TV, your security cameras, and that cheap smart plug you bought on sale. If anyone breaks into that room, they have access to everything.

Network segmentation is like giving each group of devices their own apartment with locked doors between them. Your smart home devices can still reach the internet (they need it for updates and some cloud features), but they cannot see or access your computers, phones, and other sensitive devices. If a smart device is compromised, the attacker is contained in that segment and cannot reach your personal data.

The Simple Approach: Guest Network Isolation

The easiest way to segment your network requires no additional hardware and is available on most modern routers. Simply put all your IoT devices on your router's guest network. Here is how it works:

  1. Log into your router's admin panel.
  2. Find the guest network settings (usually under Wireless or Wi-Fi settings).
  3. Enable the guest network and give it a name like "SmartHome-IoT" with a strong password.
  4. Enable "client isolation" or "AP isolation" if available. This prevents devices on the guest network from communicating with each other, adding an extra layer of protection.
  5. Connect all your smart home devices to this guest network.
  6. Keep your computers, phones, and tablets on your main network.

This approach works well for Wi-Fi smart home devices that primarily communicate with cloud servers. The limitation is that some devices need to communicate with controllers on your main network (like a Philips Hue bridge communicating with your phone), so you may need to keep certain hub devices on your main network.

The Better Approach: VLANs

If your router supports VLANs (Virtual Local Area Networks), you can create more sophisticated segmentation with fine-grained control over what traffic is allowed between segments. A VLAN is essentially a virtual network within your physical network, with its own IP address range and firewall rules.

A typical VLAN setup for a smart home might look like this:

  • VLAN 1 (Trusted): Your computers, phones, tablets, and NAS. This is your primary network with full internet access and the ability to reach IoT devices for control.
  • VLAN 2 (IoT): Smart home devices like lights, plugs, sensors, and switches. These can reach the internet for cloud features and updates, and they can be reached from VLAN 1 for local control, but they cannot initiate connections to VLAN 1.
  • VLAN 3 (Cameras): Security cameras on their own segment. These might have internet access blocked entirely (for local-only recording) or limited to specific servers for cloud storage.
  • VLAN 4 (Guest): A separate network for visitors with internet access only and no access to any other VLAN.

Setting up VLANs requires a router that supports them. Consumer mesh systems generally do not offer full VLAN support. You would need a more advanced router from brands like Ubiquiti (UniFi), MikroTik, or pfSense, or a router running open-source firmware like OpenWrt. This is an intermediate to advanced configuration, but the security benefit is substantial.

Firewall Rules Between Segments

The real power of segmentation comes from the firewall rules you set between segments. The key principle is: your trusted devices should be able to control your IoT devices, but IoT devices should not be able to access your trusted devices. In firewall terms:

  • Allow traffic from Trusted to IoT (so your phone can control lights).
  • Block traffic from IoT to Trusted (so a compromised light bulb cannot access your laptop).
  • Allow IoT to reach the internet (for updates and cloud features).
  • Allow established/related connections from IoT back to Trusted (so your phone receives responses to its control commands).

If you are using a smart home hub like Home Assistant, place it on the trusted network and allow it to reach the IoT VLAN. The hub acts as a secure intermediary between your personal devices and your smart home devices.

Practical Considerations

Network segmentation introduces some complexity that you should be aware of. Device discovery protocols like mDNS and UPnP often do not work across VLANs by default. This means your phone on the trusted network might not automatically discover smart home devices on the IoT VLAN. You may need to enable mDNS reflection or an Avahi relay on your router to allow discovery traffic to cross VLAN boundaries while still blocking other traffic.

Some smart home platforms handle this better than others. HomeKit, for instance, uses mDNS extensively for device discovery. If you segment your network, you will need to make sure mDNS traffic can flow between your phone's VLAN and your IoT VLAN, or keep your HomeKit controller (HomePod or Apple TV) on a network that bridges both.

Thread devices add another consideration. Thread border routers need to be on a network segment that can reach both the Thread mesh and your controller app. In practice, placing border routers on the trusted network usually works well, since they act as secure gateways to the Thread mesh.

Start simple. The guest network approach gives you 80 percent of the security benefit with 20 percent of the effort. You can always move to VLANs later as your network grows and your comfort level increases.

Lesson Complete