Networks, VPNs & Firewalls
This page collects knowledge about home networking, routers, VPNs, and firewall setups that appeared in the group.
WireGuard vs OpenVPN
WireGuard is frequently recommended as the default VPN choice:
WireGuard:
Very small codebase and modern cryptography.
Excellent performance and low latency.
Easy to configure: each peer has a private/public key pair and an allowed IP range.
General pattern:
For your own infrastructure (home server, lab, family access): prefer WireGuard.
Use OpenVPN only where compatibility or policy demands it.
Example minimal WireGuard server configuration snippet:
[Interface]
Address = 10.0.0.1/24
ListenPort = 51820
PrivateKey = <server_private_key>
[Peer]
# laptop
PublicKey = <laptop_public_key>
AllowedIPs = 10.0.0.2/32
Home VPN Use Cases
Common scenarios discussed:
Typical recommendation:
Routers & OPNsense
Advanced home users often move from ISP-provided routers to something more capable:
OPNsense (and pfSense) appear as common firewall/router
OS choices:
Stateful firewall, NAT, traffic shaping, VPNs, VLANs, captive portals.
Run on small x86 hardware (fanless boxes, old PCs).
Key ideas:
Network Security Basics
Guiding principles evident from discussions:
Prefer “default deny”:
WAN →
LAN: block everything except what is explicitly needed.
LAN → WAN: restrict sensitive servers if they do not need outgoing internet.
Log and monitor:
Enable firewall logging for dropped packets on WAN.
Use tools like `vnstat`, `nload` or router-integrated graphs to catch anomalies.
A recurring theme is that simpler network topologies are easier to secure. Extra complexity must justify itself.