Home Network Control

Notice: Page may contain affiliate links for which we may earn a small commission through services like Amazon Affiliates or Skimlinks.

halfelite

Member
Oct 10, 2014
62
17
8
40
Not the usual type of content here but is worth a shot. So as my kids get older I figure its time I start to monitor/block some things on that big bad web. I know no amount of blocking will block everything and teaching my kids is the way to go but a little deterrent can go a long way.

My current setup is a Asus R7000 handling the WAN connection for my FIOS connection then going into a microtik CRS125-24g-2s-in.

Thinking and switching out the Asus r7000 to something running pfsense with squidguard anyone have anything they have tried in this area. MY only worry with running pfsense is I do have a 300/300 connection at home and I dont want to build a power hungry pc to handle that speed with pfsense.
 

whitey

Moderator
Jun 30, 2014
2,766
868
113
41
Man, to tell ya the truth I have been having similar (almost identical) thoughts and had numerous conversations between the wifie and I. I have 9, 6, and 4 year olds and an isolated vlan/wlan may be in the works w/ DansGuardian plugin on pfsense or whatever others may recommend here.

What strategies/methods/tools are people here using to do this? May have to bump up on project list.
 

Patrick

Administrator
Staff member
Dec 21, 2010
12,513
5,804
113
If someone wants to make a guide for the main site or a forum resource, I do want more of this kind of content.
 

PigLover

Moderator
Jan 26, 2011
3,186
1,545
113
You don't have to build a power-hungry pfSense box to support this. Not cheap - but not overly power hungry. Something based on a C2358 will get the job done at well under 20W all-in, idling well below that. Of course building it will set you back $300... :(
 

cesmith9999

Well-Known Member
Mar 26, 2013
1,421
470
83
There is the hardware part. then the configuration part. I think Patrick wants the configuration part.

I am thinking of adding IDS (separate topic) to my pfsense box (along with a 3rd nic for a 2nd physical vlan). just have to schedule the downtime with my wife/kids.

Chris
 

CreoleLakerFan

Active Member
Oct 29, 2013
485
180
43
You don't need a lot of power to run pfSense. Here is the link to the pfSense branded appliances. If you don't want to purchase directly and/or are adventurous you can build a firewall based on the components they have selected, or you can choose one of theirs. They are built on very power efficient platforms.

Hardware Requirements and Appliances for pfSense
 

halfelite

Member
Oct 10, 2014
62
17
8
40
Lets break this topic out into two different parts. First lets discuss hardware

Is it better to go with on of the prebuilt boxes pfsense has for order or custom built. I see pfsense does not recommend running the wireless AP off the pfsense box. So that means a separate AP will also be needed which then I think if you want to keep an "Adult" network and a "Kid" network do you need two AP's ?
 

Chuckleb

Moderator
Mar 5, 2013
1,017
331
83
Minnesota
So I have the SG-2220 which seems to work pretty well as a pfSense appliance. I run it with the Ubiquiti APs to build the network. If you were talking wireless only, you could do multiple SSIDs with a single AP, each dropping into their own tagged VLAN. My APs run a guest VLAN and a regular network.

I'm also interested in the software side of the parental controls. I used to tell my neighbors to use OpenDNS which did free protection of certain sites. I should reactivate my account there and see how well that works.

OpenDNS Store > Free Parental Controls Sign-Up
 
  • Like
Reactions: Jon Massey

whitey

Moderator
Jun 30, 2014
2,766
868
113
41
I am interested mostly in the tools/techniques/architecture bits and pieces, I believe my virtualizaed pfSense is up to the task!

I'd imagine the wifi could be addressed via another bssid/wlan and slap both on new 'secured/hardened/filtered' network segment with pfSense still providing routing for both vlan's/networks using 1 ISP and pfSense WAN GW still and a pakcage like Dans Guardian or whatever pfSense uses (think that's it) these days for this type of functionality. I used to do it back in the day w/ squid/squidguard but it was manual and kinda a PITA creating blacklists.
 
Last edited:

Patrick

Administrator
Staff member
Dec 21, 2010
12,513
5,804
113

markarr

Active Member
Oct 31, 2013
421
122
43
Another option is the free version of Sophos. It will give you the whole suite of sophos fw apps for free, and they removed the 50 ip limit with the new one.
 

Fritz

Well-Known Member
Apr 6, 2015
3,386
1,386
113
70
I remember my grandpa telling me about the time his pa caught him with some porn. After a trip to the wood shed, he couldn't sit down for a week. Times sure have changed.
 

T_Minus

Build. Break. Fix. Repeat
Feb 15, 2015
7,641
2,058
113
I remember my grandpa telling me about the time his pa caught him with some porn. After a trip to the wood shed, he couldn't sit down for a week. Times sure have changed.
I was reading this after being to the Doctors the last s 2 days in a row with sick kids the first thing that came to my mind was: Why is your grand fathers physicians assistant taking your dad.... ohhhh.... wait... Pa!!!

LOL!!
 

halfelite

Member
Oct 10, 2014
62
17
8
40
Ok guess its time to put together a shopping list

Hardware
Netgate RCC-VE 2440 - 349.00 - Only reason I bumped up to a bit more money is thinking if in the future I can get 1GB's connection
AP needed for multiple SSID's both unrestricted and restricted access. This puts you in the high dollar range not sure there is a budget AP that supports vlan tagging by SSID. I know the meraki line of cisco does and the Ubiquiti line but you are now talking $200-$300+ range for a single AP a little pricey for home use.
 

Jon Massey

Active Member
Nov 11, 2015
339
82
28
37
AP needed for multiple SSID's both unrestricted and restricted access. This puts you in the high dollar range not sure there is a budget AP that supports vlan tagging by SSID.
Linksys LAPAC1750 does this and is reasonably priced, LAPAC1200 even cheaper (is there much point in AC1750 when the uplink is only gigabit, dare I ask?). I use VLAN/SSID separation on these for guest network


(edit: s/SSIS/SSID damn I spend to much time with SQL Server...)
 

Gary Gapinski

New Member
Oct 24, 2015
17
3
3
73
Not the usual type of content here but is worth a shot. So as my kids get older I figure its time I start to monitor/block some things on that big bad web. I know no amount of blocking will block everything and teaching my kids is the way to go but a little deterrent can go a long way.
For outbound (i.e., traffic initiated by systems on the local network):

A fundamental aspect is a reputation service. They exist (OpenDNS is one example). I don't think it is possible to do it (reputation list maintenance) on one's own.

The DNS approach is simple and can be achieved using existing equipment. However, not all devices will use the DNS service offered by local DHCP (e.g., Chromecast, Amazon TV, kids who discover DNS evasion techniques). It's a reasonable place to start. One may or may not get metrics depending on the service chosen.

Past that, a lot more is needed. For partial control (absolute control is elusive), one must observe and/or control as much outbound traffic as possible. Techniques vary across protocols (and a reputation service is still needed), and encrypted protocols cannot easily be inspected (QUIC is a good example). Minimally, if one wishes to have a record of traffic, one must log all outbound "connections" (i.e., new conntrack sessions) for later analysis, which means a primary router that can log such and a (possibly separate) system to aggregate logs and provide analysis. All traffic of interest is not restricted to TCP, and some is best summarily blocked (e.g., Teredo).

Related, ad/tracker blocking may also be of interest.

For inbound (i.e., unsolicited traffic):

Start with passive measures. Block all unsolicited traffic as a start. This can easily be done with consumer or better routers (and UPnP is not a Good Idea).

If unsolicited traffic of any sort is allowed in, undesirable traffic must be culled. Did I mention a reputation service? Reasonable blocklists are readily available (e.g.). Use of such requires more than just a typical consumer router.

Active measures require more than a typical consumer router.

Miscellany:

Some of the above can be done using your existing equipment. Your CRS125 has a CALEA feature, btw. Explain it to the kids.

Security Onion is (but) one example of a reasonably comprehensive SIEM. It, or any of the components comprising it, would be places to start.

I have a small home network front-ended by a low-cost Ubiquiti EdgeRouter. It's quite adequate for passive measures. It has a reasonable traffic analysis feature, though that feature is not entirely appropriate for your intended purpose. It logs all inbound and outbound connections. I use a Supermicro 5017A-EF for log capture and analysis (and other always-on duties). It watches (Suricata in IDS mode) a mirror of aggregate local network traffic heading towards the edge router. I do not use (no kids) any outbound blocking (except for Teredo at the moment). If I did, I'd want something like a Supermicro 5018A-TN4 or better to handle that and other SIEM-related duties. I also have a CRS125, though it is serving just as a switch, but its OS can also be used for some of the above functions.

Unfortunately, home network control is not much different than enterprise network control.
 

mstone

Active Member
Mar 11, 2015
505
118
43
46
Linksys LAPAC1750 does this and is reasonably priced, LAPAC1200 even cheaper (is there much point in AC1750 when the uplink is only gigabit, dare I ask?).
Better radios should hold, e.g., a 200Mbps connection from further away. If someone is buying an AP with the expectation that they'll be using all the theoretical bandwidth, they're probably confused (and disappointed).

Multiple SSID+VLAN support is pretty normal on standalone APs. It'll definitely cost more than a consumer "router", but it'll also probably be supported for more than 3 months or the next minor hardware revision that saves 15 cents in parts.
 

Deslok

Well-Known Member
Jul 15, 2015
1,122
125
63
34
deslok.dyndns.org
interestingly ArsTechnica just did a write up on building their own equipment Numbers don’t lie—it’s time to build your own router I'm curious if his openvpn limitation was cpu related though it would have been nice to include resource usage along with his testing.
How power hungry the pc is really is limited by your willingness to spend money on it up front, Avoton and Xeon-D sets with network acceleration would likely be fastest but cost more than say a pentium j1900 or i3(heck even a core2 system) although it might be a chance to virtualize things and put several appliances on one box to consolidate which helps both price concerns overall.
 
  • Like
Reactions: T_Minus