Setup:
Cisco DPC3010 modem
WRT54GL Router
dd-wrt firmware
Pertinent facts:
Using the ddwrt firmware, Ive recently revamped my home/home office network to create multiple isolated vlan networks
in the IP range 192.168.(1-5).xxx. Ive created a vlan for each LAN port on the wrt.
I have done this to isolate my business, wireless, wifes system, a TV with netfilx and Amazon fire (will have a media pc in future). I also have a guest network that will be used to clean up virus infected systems (outside systems brought in)
There are 5 vlans (including the wireless network) They are all unbridged and can access only the internet but not each other. All of these networks are working fine and able to access the internet and able to see and access other machines on the same vlan.
I have further protected these networks from each other with the following firewall rules (entered into Administration\commands in ddwrt):
[FONT="]iptables -I FORWARD -i vlan+ -o vlan+ -j DROP[/FONT]
[FONT="]iptables -I FORWARD -i vlan+ -o vlan1 -j ACCEPT[/FONT]
[FONT="]iptables -I FORWARD -i vlan1 -o vlan+ -j ACCEPT[/FONT]
[FONT="] [/FONT]
[FONT="]So I think Ive pretty much protected my business network, but I also, on occasion, might need to access machines on the other networks. I could move cables around to place various machines on the same network, but Im thinking there may be a more elegant solution than that.[/FONT]
[FONT="] [/FONT]
[FONT="]Questions:[/FONT]
[FONT="] [/FONT]
[FONT="]1.[/FONT][FONT="] Is the above described method a viable way to protect these networks from each other?[/FONT]
[FONT="] [/FONT]
[FONT="]2.[/FONT][FONT="]What is the best and most secure way to accomplish this occasional access? Will I need to use a remote software (RDC, UltraVNC, etc)? A vpn? Not sure how to handle this securely?[/FONT]
[FONT="] [/FONT]
[FONT="]Thanks for any help.[/FONT]
Cisco DPC3010 modem
WRT54GL Router
dd-wrt firmware
Pertinent facts:
Using the ddwrt firmware, Ive recently revamped my home/home office network to create multiple isolated vlan networks
in the IP range 192.168.(1-5).xxx. Ive created a vlan for each LAN port on the wrt.
I have done this to isolate my business, wireless, wifes system, a TV with netfilx and Amazon fire (will have a media pc in future). I also have a guest network that will be used to clean up virus infected systems (outside systems brought in)
There are 5 vlans (including the wireless network) They are all unbridged and can access only the internet but not each other. All of these networks are working fine and able to access the internet and able to see and access other machines on the same vlan.
I have further protected these networks from each other with the following firewall rules (entered into Administration\commands in ddwrt):
[FONT="]iptables -I FORWARD -i vlan+ -o vlan+ -j DROP[/FONT]
[FONT="]iptables -I FORWARD -i vlan+ -o vlan1 -j ACCEPT[/FONT]
[FONT="]iptables -I FORWARD -i vlan1 -o vlan+ -j ACCEPT[/FONT]
[FONT="] [/FONT]
[FONT="]So I think Ive pretty much protected my business network, but I also, on occasion, might need to access machines on the other networks. I could move cables around to place various machines on the same network, but Im thinking there may be a more elegant solution than that.[/FONT]
[FONT="] [/FONT]
[FONT="]Questions:[/FONT]
[FONT="] [/FONT]
[FONT="]1.[/FONT][FONT="] Is the above described method a viable way to protect these networks from each other?[/FONT]
[FONT="] [/FONT]
[FONT="]2.[/FONT][FONT="]What is the best and most secure way to accomplish this occasional access? Will I need to use a remote software (RDC, UltraVNC, etc)? A vpn? Not sure how to handle this securely?[/FONT]
[FONT="] [/FONT]
[FONT="]Thanks for any help.[/FONT]
