How I Designed My UniFi Network for Performance, Privacy, and Peace of Mind

A behind-the-scenes look at how I designed and segmented my UniFi network—covering VLANs, Wi-Fi strategy, firewall rules, and how each subnet fits into my homelab and home life.

How I Designed My UniFi Network for Performance, Privacy, and Peace of Mind
Photo by Thomas Jensen / Unsplash

It’s one thing to have Wi-Fi that works. It’s another to know exactly how your network is structured—and to design it in a way that reflects how you actually use your home and homelab.

I’m running a UniFi Dream Machine Special Edition (UDM SE) as the core of my home network, and after multiple iterations, I’ve landed on a design that balances performance, segmentation, and sanity. This post breaks down my VLANs, routing rules, multicast setup, and Wi-Fi layout, with the goal of giving every device what it needs—without opening unnecessary doors.


🧱 VLANs: Segmenting Everything

I use 7 VLANs across my network, each scoped to its own /24 subnet and controlled by custom firewall rules.

Name VLAN ID Subnet Purpose
Default 1 10.10.10.0/24 Default fallback, rarely used
Homelab 2 10.10.11.0/24 Proxmox nodes, K8s cluster, Overseer
Cameras 3 10.10.12.0/24 IP cams and NVR feeds
Work 4 10.10.13.0/24 My work laptops/devices (isolated from personal traffic)
Public 5 10.10.14.0/24 Guest Wi-Fi
SecretNet 6 10.10.18.0/24 Isolated lab for sensitive testing
JonanLab 7 10.10.19.0/24 VLAN for my son’s Pi/ESP tinkering

🔐 Firewall Rules and Traffic Flow

Everything is built on the principle of default deny, explicit allow. Here's how I route:

  • Homelab ↔ SecretNet: Mostly blocked, with only specific ports open for testing API integrations.
  • Work ↔ Internet only: Keep work at work and home at home.
  • Cameras ↔ LAN: Uni-directional flow to Home Assistant and Frigate.
  • JonanLab ↔ Internet only: Isolated except for MQTT broker access.
  • Public → LAN: Fully blocked (just internet)

I use mDNS forwarding selectively for the Public VLAN and enable IGMP Snooping on SecretNet and JonanLab to reduce broadcast noise.


📶 Wi-Fi SSID Mapping

Each VLAN is assigned to its own SSID for clarity and isolation:

SSID VLAN Band Notes
STAR Labs Public (5) 2.4 GHz Guest network
Work WiFi Work (4) 5 GHz Laptops + productivity devices
DeathWatch Homelab (2) 5 GHz Admin-only infrastructure
JonansLab JonanLab (7) 2.4 GHz Kid’s ESP and dev projects
IOT Homelab (2) 2.4 GHz Smart home gear

All SSIDs are broadcast from all access points, with band steering enabled to prioritize 5 GHz where available. DFS channels are excluded and the channel plan is manually tuned to avoid interference.


⚙️ Global Switch Settings

  • Spanning Tree Protocol: RSTP enabled
  • Rogue DHCP Detection: Enabled
  • Flow Control: Off
  • Jumbo Frames: Disabled

🧠 Design Philosophy

  • Segment early, troubleshoot less
    Putting IoT, guests, and cameras on their own VLANs keeps them from interfering or listening where they shouldn’t.
  • Let DNS be your friend
    I use internal .petie.local domains for services like Home Assistant, Frigate, and Grafana, resolved by my homelab DNS.
  • Empower safe exploration
    JonanLab is a safe playground for my son to experiment with ESP32s, microcontrollers, and Pi-based projects—without risking my production services.

📌 What I’d Still Like to Improve

  • Add VLAN-aware DNS rules for context-sensitive resolution
  • Move mDNS off public VLAN entirely and tunnel through Home Assistant
  • Build out full WireGuard + site-to-site VPN for roaming access

✅ Summary

A well-structured network isn’t just functional—it’s intentional. Every device has a defined role, clear boundaries, and just enough access to do its job. UniFi gives you the tools, but the real value comes from how you design and deploy it.

This setup works well for a hybrid of homelab tinkering, remote work, family use, and experimentation—and with solid backups in place, it’s built to last.