Remote Work Tools

The Problem: Home Networks Are Security Weak Points

Your company’s VPN protects your traffic. But:

A compromised IoT device on your WiFi can see unencrypted traffic. A malware-infected roommate’s device can spread to yours. Your company infrastructure is only as secure as your home network.

This guide shows how to segment, isolate, and secure home networks for remote work.


Layer 1: Router Hardening (Prerequisite)

Before VLANs, DNS filtering, or any advanced setup, start here.

Basic Router Security Checklist

Step 1: Change Default Credentials

# Access router admin panel
# Login: admin / admin (default)

# Immediately change to strong password
# Use: 32-character random string
# Store in 1Password/Bitwarden

# Tools:
# 1Password: $4.99/month (includes password generator)
# Bitwarden: Free (open source)

Step 2: Update Firmware

# Router admin panel > System > Firmware Update
# Check for updates monthly

# Why: Patches WiFi vulnerabilities
# Critical: Some routers allow remote access without patching

# Common routers and update frequency:
# Ubiquiti: Monthly
# Netgear: Quarterly
# TP-Link: Quarterly
# Linksys: Bi-annual (slower)

Step 3: Disable Remote Access

# Router admin panel > Advanced > Remote Management
# DISABLE all of these:
# - Remote Management
# - UPnP (Universal Plug and Play)
# - Port Forwarding (unless specifically needed)

# Why: Prevents attackers from accessing router from internet

Step 4: Enable WiFi Encryption

# Router admin panel > Wireless > Security

# Required encryption: WPA3 (if available)
# Fallback: WPA2 (WPA3 not yet universal)
# NEVER use: WEP or WPA (deprecated, crackable in minutes)

# WPA3 password requirements:
# - 20+ characters
# - Mixed case, numbers, symbols
# Example: T#x9mK$pL2@nQ7yW4bV8&Rs

# Store in password manager

Step 5: Disable WPS (WiFi Protected Setup)

# Router admin panel > Wireless > Security
# Disable: WPS
# Why: Vulnerable to brute-force attacks (8-digit PIN)
# Attacker can crack WPS in <4 hours with common tools

Layer 2: VLAN Segmentation (Isolate IoT/Guests)

VLANs create virtual networks on the same physical router. Different VLANs can’t communicate unless explicitly allowed.

VLAN Design for Remote Work

Router with VLANs:

VLAN 1 - Work (Your Laptop + Desktop)
  Security: Highest
  Access: Only to company infrastructure
  Devices: Work laptop, work phone
  Encryption: WPA3
  DHCP: 192.168.1.0/24

VLAN 2 - Trusted (Family Devices)
  Security: High
  Access: To internet, home servers
  Devices: Family phones, tablets
  Encryption: WPA3
  DHCP: 192.168.2.0/24

VLAN 3 - IoT (Smart Home Devices)
  Security: Medium
  Access: To internet only (no local network)
  Devices: Alexa, Google Home, cameras
  Encryption: WPA2 (might not support WPA3)
  DHCP: 192.168.3.0/24

VLAN 4 - Guest (Temporary Visitors)
  Security: Low
  Access: Internet only
  Devices: Friend's laptop, visitor's phone
  Encryption: WPA3
  DHCP: 192.168.4.0/24
  Isolation: Can't access any other VLAN

Which Routers Support VLAN Setup?

Router VLAN Support Cost Setup Difficulty
Ubiquiti Dream Machine Yes (excellent) $379 Medium (web UI)
Netgear Nighthawk with OpenWrt Yes $150-300 Hard (Linux knowledge)
TP-Link Archer with DD-WRT Yes (via firmware) $100-200 Hard (custom firmware)
Linksys MR9600 (WiFi 6) Limited (not recommended) $300 Medium
Apple AirPort (discontinued) Limited N/A N/A
Standard ISP Router No $0 (included) N/A (not possible)

Recommendation: Ubiquiti Dream Machine Pro

Setting Up VLANs on Ubiquiti Dream Machine

# Access: https://192.168.1.1 (admin panel)
# Username/Password: Set during setup

# Step 1: Create VLANs
# Unifi > Settings > Networks > Create New Network
# Name: "Work"
# VLAN ID: 1
# Subnet: 192.168.1.0/24
# Security: WPA3 Enterprise (optional)

# Step 2: Create WiFi Networks
# Unifi > Protect > WiFi Networks > Create
# Name: "Home-Work"
# Network: Work (VLAN 1)
# Security: WPA3
# Password: [32-char random]

# Repeat for IoT, Guest networks

# Step 3: Create Firewall Rules
# Unifi > Settings > Routing & Firewall > Firewall Rules
# Rule 1: IoT → Internet (allow)
# Rule 2: IoT → Work (deny)
# Rule 3: Work → IoT (deny)
# Result: Complete isolation

Cost Breakdown:

Ubiquiti Dream Machine Pro: $379 (one-time)
Amortized over 5 years: $76/year ($6.30/month)
vs. replacement of compromised work laptop: $1200+

Layer 3: DNS Filtering (Block Malware at Query Level)

DNS filtering intercepts domain lookups and blocks known malicious sites before connection happens.

How DNS Filtering Works

Normal DNS:
Device → Router → ISP DNS (8.8.8.8) → Malicious site
       (unfiltered, no protection)

With DNS Filtering:
Device → Router → Filtering DNS (Cloudflare) → Blocks malware domain
                      (checks against blocklist)
       (protected before connection)

Top DNS Filtering Services

Option 1: Cloudflare 1.1.1.1 for Families (Free)

# Configuration on router
# Router admin > DNS > Primary: 1.1.1.2 (malware blocking)
# Secondary: 1.0.0.2 (fallback)

# Features:
# - Blocks malware domains (free)
# - Blocks adult content (optional)
# - DNSSEC validation
# - No logging (privacy)

# Cost: $0
# Setup: 2 minutes
# Coverage: ~92% of known malware domains

Option 2: NextDNS (Recommended for Advanced Users)

# Setup: https://nextdns.io
# Create account: $0-19.99/month depending on tier

# Configuration on router
# Router DNS > 45.90.28.0 (or custom IP)
# Or: Router > DoH (DNS over HTTPS) for encrypted queries

# Features:
# - Blocks malware, phishing, adult content
# - Per-device whitelisting/blacklisting
# - Usage analytics (see what was blocked)
# - Parental controls (block YouTube by time)
# - 9 domain blocklists to choose from

# Pricing:
# Free: 300k requests/month (fine for small home)
# $1.99/month: Unlimited, full features
# $3.99/month: Additional blocklists

# Coverage: ~98% of known malware domains

# Setup example:
# Step 1: https://nextdns.io > Sign up
# Step 2: Create profile "Home Network"
# Step 3: Enable: Malware Blocking, Security
# Step 4: Router admin > DNS > 45.90.28.0

Option 3: Quad9 (Privacy-Focused)

# DNS: 9.9.9.9 and 149.112.112.112

# Features:
# - Blocks malware domains
# - DNSSEC validation
# - No user profiling (privacy)
# - No logging
# - Works with encrypted DNS

# Cost: $0
# Coverage: ~95% of known malware

Recommendation

Use Cloudflare 1.1.1.2 (free) as default, upgrade to NextDNS ($1.99/month) if you want:


Layer 4: VPN for Work Devices (Defense in Depth)

Even with network segmentation, your work laptop should have a VPN. This provides encryption for work traffic.

Two VPN Approaches

Approach A: Company VPN (Required by Most Employers)

# Your company likely mandates VPN for all remote work
# Common VPN clients:
# - Cisco AnyConnect
# - Palo Alto Networks GlobalProtect
# - Fortinet FortiClient
# - OpenVPN

# Setup: Download from company, install, login

# Benefit: All work traffic encrypted to company
# Cost: $0 (provided by employer)

Approach B: Personal VPN (Additional Layer)

# Using a personal VPN provides:
# - Encryption to VPN provider (not to company directly)
# - IP masking (hide home IP from websites)
# - Protection on public WiFi (if you work from coffee shops)

# Note: Check company policy before installing
# Most companies prohibit personal VPNs (policy enforcement)

VPN Pricing Comparison (If Allowed)

VPN Cost Speed Privacy Encryption
ProtonVPN $10/mo Good Excellent AES-256
Mullvad $5/mo Good Excellent WireGuard
IVPN $10/mo Good Excellent IKEv2/WireGuard
Surfshark $3/mo Good Good AES-256
ExpressVPN $7/mo Excellent Good AES-256

Recommendation: Ask your company first


Layer 5: Guest Network (Isolate Visitors)

Most routers have guest networks. Enable it.

Guest Network Configuration

On Standard Router (Netgear/TP-Link):

# Router admin > Wireless > Guest Network
# Enable: Yes
# SSID: "Home-Guest"
# Security: WPA3
# Password: Different from main network
# Isolation: Enable (guest can't see main network)

On Ubiquiti Dream Machine:

# Unifi > Networks > Create New Network
# Type: Guest
# SSID: "Home-Guest"
# Firewall: Deny to LAN
# Result: Guests can access internet, nothing else

Best Practices:

Guest Network Password Rotation:
- Change password monthly (prevents permanent sharing)
- Or rotate password before each guest arrives
- Store in password manager for easy lookup

Password generation:
# Use 12-character alphanumeric password
# Easy for guests to remember
# Hard for attackers to guess
# Example: TxK9mL2bVp7s

Layer 6: Firewall Rules (Block Unnecessary Connections)

Modern routers have built-in firewalls. Configure them properly.

Firewall Rules for Work Network (VLAN 1)

Rule Set for Work VLAN:

Allow: Work → Internet (required)
Allow: Work → Company DNS (required)
Allow: Work → Company VPN (required)
Deny:  Work → IoT Network (prevents lateral movement)
Deny:  Work → Guest Network (prevents lateral movement)
Deny:  Work → Trusted Network (unless specific service)
Deny:  IoT → Work (prevents malware from IoT reaching work)
Deny:  Guest → Work (prevents visitor device attacks)

Implementation on Ubiquiti Dream Machine

# Unifi > Settings > Routing & Firewall > Firewall Rules

# Rule 1: Block IoT from accessing Work
# Source: IoT VLAN (192.168.3.0/24)
# Destination: Work VLAN (192.168.1.0/24)
# Action: Drop
# Logging: Enabled (see blocked attempts)

# Rule 2: Block Work from IoT (return traffic allowed)
# Source: Work VLAN (192.168.1.0/24)
# Destination: IoT VLAN (192.168.3.0/24)
# Action: Drop

# Rule 3: Allow Work to Internet
# Source: Work VLAN
# Destination: 0.0.0.0/0 (any)
# Action: Accept
# (This is default, but make it explicit)

Complete Setup Costs

Budget Option (Using Existing Router)

Cloudflare DNS filtering:    $0/month
Company VPN:                 $0/month
Guest Network (built-in):    $0/month
Total:                       $0/month

Limitations:

TP-Link Archer AX6000:       $150 (one-time)
Firmware (DD-WRT/OpenWrt):   $0
NextDNS:                     $2/month
Company VPN:                 $0/month
Total:                       $150 + $2/month

Setup complexity: Medium (requires Linux knowledge)

Benefits:

Premium (Ubiquiti Dream Machine Pro)

Ubiquiti Dream Machine Pro:  $379 (one-time)
NextDNS:                     $2/month
Company VPN:                 $0/month
Total:                       $379 + $2/month

Setup complexity: Easy (web UI)

Benefits:


Implementation Checklist

Week 1: Basic Hardening

Week 2: Advanced Segmentation (If New Router)

Week 3: Ongoing Maintenance


Troubleshooting Common Issues

Issue 1: “My IoT device can’t reach the server”

Cause: VLAN firewall rule blocking connection
Solution:
1. Check firewall rule (allow if necessary)
2. Or: Move device to Trusted VLAN (less secure)
3. Or: Create specific allow rule (best)

Issue 2: “Website not loading on guest network”

Cause: DNS filtering blocking domain
Solution:
1. Check NextDNS logs (if using)
2. Whitelist domain in DNS filter
3. Or: Check WiFi isolation (should allow internet)

Issue 3: “Work laptop can’t reach local NAS”

Cause: VLAN isolation prevents local access
Solution:
1. Create firewall rule: Work → Trusted VLAN
2. Or: Move NAS to Work VLAN (less secure)
3. Recommended: Use rule with specific destination IP

Monitoring and Maintenance

Monthly Tasks

# Check for firmware updates
# Router admin > System > Firmware
# Review DNS filter logs (if using NextDNS)
# Check for new WiFi security advisories

Quarterly Tasks

# Review firewall rule logs
# Update WiFi password (if policy requires)
# Check for new malware domains in blocklist

Annually

# Full security audit
# Change all passwords (router admin, WiFi)
# Review VLAN configuration
# Update all firmware

Security Best Practices

1. Physical Security

- Keep router in locked cabinet (if possible)
- Prevent guests from accessing router ports
- Use cable locks for valuable equipment

2. Monitoring

- Enable logging on firewall rules
- Review logs monthly for suspicious activity
- Set alerts for failed login attempts

3. Updates

- Enable auto-updates on router (if available)
- Check firmware monthly
- Don't ignore security patches

4. Documentation

- Write down network SSIDs
- Store WiFi passwords in password manager
- Document VLAN purposes and IP ranges
- Keep emergency access method (physical reset)

Bottom Line

A well-configured home network is critical for remote work security:

  1. Start with basics: Change password, enable WPA3, update firmware ($0)
  2. Add segmentation: VLANs isolate IoT/guests from work devices ($150-379)
  3. Enable filtering: DNS filtering blocks malware domains ($0-2/month)
  4. Use VPN: Company-provided VPN encrypts work traffic ($0)
  5. Maintain: Monthly firmware checks and password rotation (15 min/month)

Total investment: $150-379 one-time + $2/month

Your company likely spends $10,000+ per year protecting the office network. Your home network deserves 1% of that investment.


Tool Quick Reference

Tool Purpose Cost Setup
Ubiquiti Dream Machine Pro Router with VLAN support $379 30 min
Cloudflare 1.1.1.2 DNS filtering (malware) $0 5 min
NextDNS Advanced DNS filtering $2/mo 10 min
1Password Password management $5/mo 15 min
Company VPN Work traffic encryption $0 10 min

Start with Layer 1 and 3 (free, immediate protection), upgrade to Layer 2 (VLANs) when you can afford better router.

Built by theluckystrike — More at zovo.one