Tag: Firewall Rules

7 May 2026
Blocking AI traffic with DNS filtering

Blocking AI traffic starts at the resolver, not the firewall. I’d rather break a query cleanly with DNS filtering than watch it slip through a public resolver and look ordinary, which is exactly why Pi-hole, Unbound, and a few blunt rules do most of the work.

Read more
27 April 2026
Network segmentation for vehicle telemetry in Home Assistant

Modern cars are noisy little computers, and vehicle telemetry isolation only works if you treat them that way from the start. I put the car on its own VLAN, lock the firewall down, then let Home Assistant see only the data I actually want, nothing more.

Read more
26 April 2026
Isolating Android on a VLAN with firewall rules and DNS split

I would not migrate an Android phone into my homelab blind. A clean Android homelab firewall DNS split, with VLAN isolation and hard DNS rules, keeps the phone useful without letting it sniff around the rest of the network.

Read more
24 April 2026
Network segmentation with VLANs, DNS and firewall rules

A proper network blueprint is mostly unglamorous discipline, VLANs with a job, DNS that stays in its lane, firewall rules that mean something, and DHCP reservations that do not rely on memory. Get that wrong, and the first odd device will expose it.

Read more
15 April 2026
ACL permission models that break as infrastructure grows

I’ve lost enough evenings to home lab automation pitfalls to know the real trouble starts with small defaults, not big failures. ACL permission models that break as infrastructure grows are usually a sign I should have kept names, rules, and restores much simpler from the start.

Read more
3 April 2026
Using IP Reputation Data from Operation Synergia in Your Botnet Firewall Rules

Operation Synergia III sinkholed 45,000 botnet and malware IPs across 72 countries with law enforcement backing. That chain of custody makes the data worth blocking at your firewall; the catch is that C2 operators rotate fast, so treat it as a high-confidence historical list, not a live feed.

Read more
25 February 2026
Assessing AI integration with Nvidia Windows SoC

Unlock the full potential of Nvidia's Windows SoC with our guide on optimising network configurations for AI workloads, ensuring low latency and high security.

Read more
19 February 2026
Firewall rules for model extraction attempts

Firewall rules for model extraction attempts AI models exposed over APIs get probed. A lot. Sometimes that is just noisy curiosity. Sometimes it is patterned traffic meant to map out model behaviour and pull it apart. The useful bit is not pretending a firewall solves the lot. It does not. It does cut down the […]

Read more
1 February 2026
Mitigation strategies for SSH denial of service attacks

Secure your homelab by mitigating SSH Denial of Service risks. Discover practical steps to enhance SSH configuration and implement effective network controls today.

Read more
19 January 2026
Migrating from VMware to Proxmox

Migrating from VMware to Proxmox? This practical guide shows the Proxmox configuration choices that matter. You get step-by-step commands for KVM setup, network and VLAN mapping, storage imports, backup patterns and firewall rules. Use your checklist and verify restores to make the migration repeatable and auditable.

Read more
1 January 2026
VoIP settings for reliable calls on Sophos XGS

Sophos XGS Firewall: optimise VoIP settings for reliable calls. Start by mapping your NAT, public IPs, VLANs, and ports. Lock firewall rules and allow only required SIP and RTP ranges. Mark media traffic for priority and set QoS with fixed bandwidth for voice. Test registrations, capture RTP and monitor latency, jitter and packet loss.

Read more
30 December 2025
Configuring firewall rules in Sophos Firewall v22

Prepare before you upgrade. Check device support and free disk space, back up configs and snapshots. Use clear rule names, narrow objects and specific service ports. Enable logging and review hit counts. Test changes with connectivity, policy and regression checks. Automate exports and rule updates via the Sophos REST API for Sophos Firewall v22...

Read more
25 December 2025
Implementing automated updates for Next.js security

Next.js security starts with automated updates. Automate OS patches and dependency PRs for your next and Node modules. Run npm audit in CI and block merges for high-severity alerts. Monitor CPU and processes. Reduce public exposure by serving static builds or using a proxy and firewall.

Read more
8 December 2025
Troubleshooting Let’s Encrypt certificates on a Sophos firewall

Troubleshoot Lets Encrypt certificate failures on a Sophos firewall. You confirm DNS A records, port 80 reachability and that the ACME HTTP-01 token URL returns HTTP 200. Use dig and curl to test the exact token path. Fix NAT, firewall rules or proxies that block or rewrite /.well-known/acme-challenge.

Read more
7 December 2025
Best practices for Sophos XGS HA cluster configurations

Peer Administration on a Sophos XGS HA cluster only behaves if the network layout is thought through first. Keep client traffic, the HA heartbeat and management on separate paths where you can. A dedicated HA link is the cleanest option. I would use a small heartbeat subnet, such as 172.16.100.0/30 between the primary and auxiliary. […]

Read more
14 November 2025
Routing VLAN traffic through IPSec tunnels

Route VLAN traffic through an IPSec Tunnel via head office to a client. You get commands, routing and NAT rules, and test steps to confirm your return paths. Keep configs small; test each change. Monitor MTU and phase 2 selectors to prevent stalls.

Read more
13 November 2025
Ensuring secure access via SSL VPN for dual-stack users

SSL VPN Dual Stack can let IPv6 bypass the tunnel and break IP based controls. This guide shows how you can force IPv4, use split DNS, or add IPv6 egress so your remote clients present the office IP and your security checks remain consistent.

Read more
25 October 2025
Implementing VLANs in your home lab setup

VLANs let you segment your home lab network. You reduce attack surface and cut broadcast noise. This guide gives step by step setup with VLAN IDs, subnets, switch and router commands, DHCP scopes and firewall rules. Follow the tests and examples to deploy VLANs securely and restore configurations after changes.

Read more