Show us your Firewalla, and Win BIG!
Our contest "Show us your Firewalla" ending 11:58 PM December 2nd (US Pacific Time) is now closed.
We love this contest! We are going to make this a monthly event! We will pick (one) winner per month for a random gift (a firewalla product). The next one will be in January 2022! So update yours or add new ones!
Winners December 2nd 2021 (Pacific Time)
- https://help.firewalla.com/hc/en-us/community/posts/4410590732179/comments/4410664913555
- https://help.firewalla.com/hc/en-us/community/posts/4410590732179/comments/4410584107155
- https://help.firewalla.com/hc/en-us/community/posts/4410590732179-Show-us-your-Firewalla-and-Win-BIG-?page=2#community_comment_4410641483923
- https://help.firewalla.com/hc/en-us/community/posts/4410590732179/comments/4410593327379
- (tied as a fourth place) https://help.firewalla.com/hc/en-us/community/posts/4410590732179/comments/4410840331795
As we gear up for the release of Purple, we want to see Firewalla's in the wild. So we are running a photo contest, to demonstrate small network is fun, exciting, and NOT boring!
Here's how it works.
- Post photos here, in this thread, of your network set up including at least one Firewalla. No need to be pretty, sometimes functionality will win!
- Include what mode you are running (Router, DHCP, Simple, or Bridge).
- Optionally, add a network diagram showing your network topology.
- Optionally, if you are doing anything cool, let us know too.
If you are just browsing, please find the best (you define what's best, and can vote more than one) and then vote it up by clicking on the up arrow next to the image. (down arrow also work to downvote)
If you are voting make sure you scroll to the next page, there are lots more awesome designs.
Login is required for voting.
Based on the number of votes received from the community:
The first prize will win a Firewalla Gold.
The second prize will win a Firewalla Purple.
The third prize will win a Firewalla Blue Plus.
The fourth prize will win a Firewalla Red.
The contest will run from now until December 2, 2021 11:59PM Pacific Time.
Important: Please do not post any sensitive information. Any submissions require that you agree to allow us to use your photos in any future marketing materials.
Please only post your network here.
-
Here is my glorious mess. I promise it was pretty at one time. As networks change, test need to be made, things get changed, messes are made and until we stop and clean up the messes they look like this.. But "if it isn't broken, don't mess with the network" is one of my fav I.T. phrases..
Cable modem > Cisco ASA 5506 > Firewalla > LAN > Wifi
Still using the ASA because the Firewalla doesn't support Multiple Public Static WAN IP with NAT. ( but soon, if I read the early access info correctly), plus work VPN but I think that can be migrated as well.
The D-Link Wifi and DNH-100 were my sad attempt to use business class wifi to create stellar home wifi. After 2+ years of poor wifi because of "sticky clients" I moved to google Nest Mesh Wifi. Thanks to the firewalla team on putting together the how to make Google Nest Wifi act like a WAP. It took some time to get google nest wifi to work correctly afterwards but all part of the journey.
Cisco Switch is PoE and powers VOIP phones, security Cameras, and various other remote tech. All TVs are hardwired because streaming 4K over wifi is for noobs who don't understand how radio spectrums work.
RasPi with PoE splitter for Home Automation hassio with Zwave lights, locks.
OTA Tv encoder for PLEX DVR.
In another closet MacMini for security NAS, plex server, and various other things.
Its a mess.. Maybe I'll clean it up this holiday season.. na, the kids will be home, God forbid the Wifi go down while they are home.
Enjoy!
-
My simple setup:
- Spectrum provided modem
- FWG as main router
- Synology NAS goes to port 3 on FWG
- Netgear Wireless router (now in AP mode) for hardwired PC and wireless other trusted devices (Apple stuff)
- TPL Switch connecting to another TPL wireless AP for IoT devices that I don't trust (IP cams, printer, outlets, light switches, etc.)
- TPL wireless AP is segmented into multiple SSIDs/VLANs and show up in FWG as different networks, useful when creating rules. Traffic from some VLANs are blocked from connecting to internal networks.
- I also use FWG VPN feature (1-click setup) to access NAS from remote locations, and ofc secured browsing from public wifi.
- Bonus: DIY ESP8266 temperature sensor to monitor the heat around this area, it'll alert me if this place gets too hot.
-
This photo shows only the FWG and a couple of switches. Other important components are elsewhere in the house. Note the 8 ethernet ports on a panel on the back wall.
FWG is in router mode with three separate subnets, physically separated by port.
Working from the bottom privilege up, Subnet 3 contains just one device, the ethernet-connected Network Video Recorder with wired cameras subnetted below the NVR as host. The NVR has no access to any other subnet nor to the internet. This is a good thing because it tries phoning home to China about 40 times per hour, accounting for maybe 98% of all traffic blocked.
Subnet 2 contains all other IoT devices, connected via a wired 2.4 GHz AP, and which can talk to the internet but not to other subnets.
Subnet 1 contains servers and another router and wireless AP (5 GHz) below which are trusted personal devices which are invisible to the FWG except in aggregate. Later I will be replacing the existing sub-router with a FW Purple to view trusted devices individually. Trusted personal devices have free access to anywhere including to all subnets from within the network or via the VPN server configured on the FWG for when I am away from home.
A possibly cool thing is that this installation is, um, kept cool. The cabinet in the picture has a thick door closing over it with gaps of just a few mm top and bottom for ventilation by convection. The room itself is unconditioned though on the shady side of the house, and we get 40°C here in Summer so I was concerned about cooling (actually, I might just be maniacal about cooling electronics). You can see the FWG has a heatsink on top of it with an AC Infinity fan atop that. The two switches on the left are separated by a heatsink with another atop, and an AC Infinity fan positioned at the far end to blow through the two heatsinks. A temperature sensor turns on the fans when cabinet temperature exceeds 29°C (power supplies also contribute heat).
I do not believe the fans have ever come on except in testing, though last Summer was a cool one. -
Not as fancy as some of you gents awesome set-ups (Im having a bit of tech envy!)
My ISP Virgin Media router in modem mode (not in pictures) feeds into my Asus GS-AX5400 router with a Firewalla Blue + running in DHCP Mode connected, handling about 30 devices. Blue is also running VPN Server for remote access when we are away :)
As its in the living room I've had orders from the wife to keep the "geeky" stuff to a minimum so its all hidden at the back of unit! Other bits in the pics are a hive hub which runs the alarm system and heating plus a usb hard drive connected to the router which is shared over the network
-
Firewalla Gold, Router mode; 5 VLANs; 2x Managed switches (1x 16-port here, 1x 5 port in Office); 5x UniFi UAP-AC-M WAPs (PoE injectors slightly visible in the back); Synology NAS; WD Elements USB3.0 Backup drive tethered to NAS; CyberPower UPS; MacPro5,1 running ESXi 6.5; Lutron Hub.
All in basement Mechanicals room, so mounted to the ceiling to be protected out of the way. -
Hello all from Melbourne Australia. This brilliant tiny devices that helps me in controlling and monitoring my children devices to ensure our family are protected and safe. Worth the investment and this was the 1st firewalla generation that I bought and still being used till now.
I have compared other similar devices and this is the best of the best and can control up to individual or group of device and you can setup rules as well. Firewalla is not only best protection for family and affordable but best of all there is no subscription fee and very easy to use. Well done
-
Running in bridge mode on home network. Firewalla sits between router and switch serves as an excellent IPS. Had a few scenarios where Firewalla detected and blocked suspicious IPs in the middle of the night.
Love the WiFi quarantine feature and network monitoring tools. And the compact design fits perfectly in my rack.
-
Firewalla Gold in router mode and ISP load balancing.
ISP 1: Starlink ->
Firewalla Gold -> Eero Mesh in Bridge Mode
ISP 2: T-Mobile Home Internet ->
Also included in the network: Synology NAS, Assorted computers, tablets, and IOT devices adding up to 68 total devices on the network.
-
Current Home Setup:
Navepoint Rack (Amazon)
Firewalla Purple, transitioned from USG3 + Firewalla Blue
- Router Mode
- Three VLAN's (Non-IoT, IoT, and Work Projects)
- Configured with iPhone Tethering for Spectrum outages
- 200/20 Internet connection
- Multiple Rules for Teenager Internet limitations
Ubiquiti UniFi:
- CloudKey 1
- Five Port Flex Switch in Office for desk and Work Projects
- Two AC-IW Access Points
- One AC Pro
- PoE injectors
Buffalo Networks Gigabit Switch, passes VLAN info
Synology DS412, attached via USB to UPS, additional USB backup drives
18 Meross SmartHome Electrical Devices
APC 1500W UPS, all devices in rack are backed up
Whole-House Generator
-
A Gigabit connection coming in through my Arris SurfBoard SB8200 going to my Firewalla Gold running in router mode. Primary network to the Asus AT-GX11000 and through that to an unmanaged 8-port GigE switch for full gig speed to those few devices that really need it (like my RPi NAS), IoT and Guest network running through the TP-Link TL-WA801ND. Everything on a UPS to keep me going through short power disruptions.
-
I am humbled by the configurations I see in this thread!
here is mine, a simple DSL modem => Router with Firewalla blue+ hooked to it.
The blue+ is handling 29 devices on my network.
I have a couple of devices to make the WIFI a mesh network.
I quickly found out that monitoring on the mesh devices need to be turned off for normal performance and was actually making double the work unnecessarily.
-
It all just works great. 3 kids, > 40 devices. Every time I think about upgrading I ask myself "why?". If I get a gold I may go dual ISP, that's about the only thing I'd do at this point.
(bonus - those RJ-45 receptacles you see terminating some of those cables are from my days at Lucent Technologies in the late 90's where I worked in the group that literally invented Cat 5, followed by 5e and 6).
-
- Firewalla Gold: router mode
- 1G ethernet internet
- Netgear cell backup, next to a Phillips Hue
- 3d printed 1u cases for Firewalla, Hue and Netgear LM1200 by Print3DSteve
- Linksys switch (link aggregation)
- Netgear wifi "access point" on top
-
Nothing too fancy going on here. Just a Firewalla Gold running in router mode connected to a Ruckus ICX 7150-12P. A Ruckus R710 Unleashed provides wireless access throughout the house. I have a separate physical network on the Firewalla that segments IoT devices and HomeKit devices. The other ethernet port is used for virtual segmentation for the multiple networks I run internally. The only things wired into the switch at this time are the LAG to the R710, a RaspberryPi running PiHole, an AeoTec SmartThings Hub, a Starling Home Hub for Nest integration into HomeKit, a Drobo and a spare wired connection for a PC.
With about 40 devices on the network, most being wireless, the R710 is segmented into about 8-10 SSIDs for various things. I have an onboarding SSID, a guest SSID, a mobile SSID that family members mobile devices go on. An IoT SSID, a HomeKit SSID, an STD SSID for devices I bring in from clients to work on, a game SSID for Playstations, a video SSID for streaming TV's a VPN SSID that routes all traffic out over VPN and an unfiltered hidden SSID.
-
Set up in Router mode. Rather than using VLANs I subnetted and used seperate physical wireless routers to ease wireless congestion on one device and my powerful wireless router for my personal devices that roam more. It also means I have more processing power than a single wireless router. It meant I could test Firewall LAN blocking between the physical devices. I have set up scheduled Internet blocking for my media LAN that is not used during the silent hours to reduce exposure. All IoT is on a seperate subnet and blocked from my personal subnet to keep those little nasties away from the good stuff. I have enabled extensive geo blocking from any country that I feel I don't need a service from. All media devices such as TVs, NAS and media server are own their own subnet and blocked from my personal devices.
-
I use my Firewalla as the edge. I run multiple servers on my blade there at the bottom and my Synology NAS that allows external clients. Cisco switch connecting quite a few devices physically (still gotta run conduit to clean that up and make it look good). Power all ran to a UPS for Firewalla, Switch and Blade. VLAN'd off Wireless, and IoT devices, VPN setup, Site to Site setup (parents setup to me). Firewalla gold was the solution I needed for sure. Could use another frankly :P Best device I have had in a long while.
-
Firewalla Gold in Bridge Mode (Lots of Profiles, such as Kid, IOT, etc)
3 VLAN
1 Guest Network
30 Unifi Devices
~220 Active Clients (Wired and Wireless)
Lots of Pi's (HomeBridge, HomeAssistant, Camera Monitors, etc...) running many SmartHome devices (in and out)
"FIREWALLA Gold is working like a race horse, keeping up with everything I throw at it."
-
All these peeps with such nice setups here is mine.
My Firewalla blue is mixed in with all the cables fighting the good fight!
Running in simple mode with my Linksys Velop Mesh, I did have a Tp-Link Mesh but the Firewalla Blue didn't work that great with it, returned it and got the Linksys had no problems at all
-
Well here is my attempt. As I live in Norway I utilised a classic Scandinavian glass fronted cabinet (something I got from IKEA for ornaments😄). Drilled some cable holes and ventilation holes in the back and there you go.
Running Port LAG to the switch with VLANS for the IOT devices.
Still in the process of tidying the cables, as the equipment arrived today
Equipment:
1.ISP modem
2. firewalla Gold (with a USB fan for cooling) with Pihole Docker
3 UniFi switch 8 port 60W POE with new controller Cloud key 2
4. One Intel NUC extreme running Proxmox server for work
5. Two Unfi WI-FI 6 AP.
6. UPS
Please sign in to leave a comment.
Comments
165 comments