There are a number of reasons why someone might want to set up isolated LANs within their home network. For the average consumer, the most common use of IsoLANs is to cordon IoT devices off from the main network. With the IoT devices in their own network, the firewall can be configured to prevent the often poorly secured devices from being able to interact with the more sensitive devices on the main LAN. As with all security controls, it's important to balance usability with security, so we want to ensure that devices located on the main LAN can still interact with IoT devices when required.

In further articles, I will also expand on using this method to support the secure, isolated communication between devices hosted in an Unraid Virtual Lab, a Raspberry Pi swarm, and select devices on the LAN.
Setting up a IoT IsoLAN on a UniFi Security Gateway
- Login to the UniFi Management Interface and open the
Settings
menu - First, we want to create a new Local Area Network (LAN) for our IoT devices, configure our wireless APs to broadcast that IoT LAN, and then enable Multicast DNS to support DNS lookups across LANs.
- Select
Networks
- Select
Create New Network
- Name the new Network
- Ensure
Corporate
is selected as the Purpose - Set the
VLAN
variable to your desired VLAN ID - Set the
Gateway IP/Subnet
to your desired IP Address range - Set the DHCP Range within the Network IP Range for your Subnet configuration
- Click
Save
- Select
- Select
Wireless Networks
- Select
Create New Wireless Network
- Name the new Wireless Network
- Expand the
Advanced Options
section - Check
Use VLAN
and provide the corresponding VLAN ID from Step 2.1.4 - Personally, I turn on the
Prevent this SSID from being broadcast
option
- Select
- Select
Services
- Select
MDNS
- Enable Multicast DNS
- Select
Apply
- Select
- Select
- Next, we'll create the Firewall Rules to allow devices on the main LAN to establish communication with devices on the IoT LAN, but not allow devices from the IoT LAN to start conversations the other way.
- Select
Routing and Firewall
- Select
Firewall
from the top menu - Select
LAN LOCAL
- Select
Create New Rule
- Name the Rule `IoT->LAN: Deny All
- Ensure
Before predefined rules
is selected - Set the Action to
Drop
- For IPv4 Protocol, we want
All
selected - Set the Source Type to
Network
and select your IoT LAN from the drop-down - Set the Destination Type to
Network
and select your LAN from the drop-down - Select
Save
- Select
Create New Rule
- Name the Rule
IoT->LAN: Allow Established/Related
- Ensure
Before predefined rules
is selected - Set the Action to
Accept
- For IPv4 Protocol, we want
All
selected - Set the Source Type to
Network
and select your IoT LAN from the drop-down - Set the Destination Type to
Network
and select your LAN from the drop-down - Select
Save
- Name the Rule
- Select
- Ensure the "Allow" rule is higher up than the "Deny All" rule. This will ensure that traffic that meets the conditions set in the "Allow" rule go through, and all others are denied.
- Select