Choosing WireGuard over self-hosted firewalls for home use, home VPN setup
A home VPN setup is the boring answer that keeps working when you leave the drive and need remote access that does not make you babysit firewall rules.
For a weekend away, I would run WireGuard and stop there. It gives you a small attack surface, simple key-based access, and one job to do. A self-hosted firewall can be useful, but it adds moving parts that do not help much when the goal is to reach a few services safely from outside the house. Every extra rule is another place to make a mistake, and mistakes are where the fun starts.
WireGuard is a cleaner fit for privacy and home lab security because the tunnel is explicit. You know which device is allowed in, and you can lock it down to a single peer or a short list of peers. That matters when you only need remote access to a NAS, a jump host, or a management VLAN. A firewall platform can do more, but more is not the same as safer. If the extra features do not reduce risk for this use case, they are just more config to keep in your head.
I would also keep the firewall outside the path unless there is a clear need for deep inspection or policy control. For most home use, the firewall should pass traffic, not become the thing you have to trust to stay perfect while you are miles away. If the VPN is down, you want to know it is the tunnel, not a half-baked rule set that swallowed your packets and your afternoon. That is not a dramatic failure. It is just tedious.
The practical setup is plain. Run WireGuard on the router, a small VM, or a low-power box on the LAN. Set a single UDP port, usually 51820, generate one key pair per device, and restrict the allowed IPs to only what each peer needs. If you want remote access to a single admin subnet, route only that subnet. If you want access to one service, keep the route narrow. Wide-open tunnels are how people end up with “temporary” access that never gets removed.
Firewall rules still matter, just not in a sprawling, over-clever way. Allow the WireGuard port from the internet to the host that runs the tunnel. Permit traffic from the WireGuard interface into the exact internal ranges you need. Block everything else by default. Test it from outside your house on mobile data, then check that you can reach the intended host and nothing wider. If the test reaches more than planned, tighten the rules before you trust it.
For a weekend drive, the real win is simplicity. WireGuard gives you the minimum path from your laptop or phone back into your home network without dragging in a pile of policy logic. A fancy self-hosted firewall can be a fine project, but for this job it is often the wrong kind of clever.



