Recommendations for improvement. Diagram included.
Recommendations for improvement. Diagram included.
Preparing for my new Mikrotik router tomorrow involves reorganizing the network, installing cables for all cameras, setting up a wireless access point, and finding the safest way to secure everything. I’ve already reviewed the basic setup on MikroTik, which looks straightforward. Any suggestions for improvements? I plan to include a switch with PoE for the two cameras and the AP, as they’re currently using external power. A guest network for visitors on the AP is also on my list. Have you heard of virtual networks in routers? It could help separate the network further if needed.
This was my initial reaction too. I favor using IP groups on my firewall since it simplifies controlling access for individual devices, though VLANs also function well. Excited to see increased focus on securing physical devices against online threats—great progress!
I'll set up three separate VLANs: one for guest access, another for IoT devices and sensors, and a third for computers, future SAN equipment, and media servers.
I needed to clarify since this wasn’t the first time someone mentioned "The IoT SSID will be a different subnet" without planning VLANs. Usually, VLANs provide clear signs—like router and AP labels indicating native or trunk ports, or tagged/untagged configurations. It looks like no distinct CIDR for IoT is specified. For example, the Zigbee Hub IP falls within 192.168.88.0/24.