this post was submitted on 26 Jul 2024
236 points (99.6% liked)

Privacy

4183 readers
3 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] haulyard@lemmy.world 4 points 3 months ago (2 children)

Serious question here as I’ve been debating moving all smart home stuff to either its own vlan (never done this before) or a different wireless network. I’ve got some POE cams that run through Scryoted on my nas to get into homekit. Is this all possible if the NAS is on a different network? Would I then have to move all my HomeKit hub devices (Apple TV, HomePod mini, etc) then also have to move?

[–] TexMexBazooka@lemm.ee 4 points 3 months ago* (last edited 3 months ago) (1 children)

So, the way you would do this is creating separate VLANs, then using firewall rules to filter what communication is allowed between them.

In my home for example, I use a few smart devices that are controlled over the LAN from your phone. Think like a chrome cast. I would rather those devices be on my IoT network than my main, but they break if devices from my primary network can’t find them.

So I allow only those specific devices to communicate across my VLANs, with other devices (cameras, lights, etc) being dropped at the firewall.

That’s the basics and can be accomplished with any semi-decent router/firewall. If you have any more specific questions regarding what hardware you have available shoot me a message and we can talk through it

[–] sep@lemmy.world 1 points 3 months ago (1 children)

Depends a bit on the device. But dor many it should be possible if you run a mdns repeater / proxy on the firewall.

[–] TexMexBazooka@lemm.ee 1 points 3 months ago

That’s way over complicating things for what ip is trying to accomplish

[–] Fillicia@sh.itjust.works 2 points 3 months ago

Depending what's you router you can usually open communication between different VLAN for specific ip/port. So let's say your camera use rtsp to send video data to your NVR you could allow for port 554 to be opened between your camera ip and the NVR.

This means that even if someone has access to your camera they couldn't do an ssh (port 22) or http/https (80/443) requests to your internal network.

For PoE cams installed outside, creating a separate VLAN is an absolute must. Otherwise anyone could use the Ethernet cable to access your network and steal your data.