Show us your Firewalla, and Win BIG!

Comments

165 comments

  • Avatar
    Jeremy Wesley

    Here is my glorious mess. I promise it was pretty at one time. As networks change, test need to be made, things get changed, messes are made and until we stop and clean up the messes they look like this.. But "if it isn't broken, don't mess with the network" is one of my fav I.T. phrases..

    Cable modem > Cisco ASA 5506 > Firewalla > LAN > Wifi

    Still using the ASA because the Firewalla doesn't support Multiple Public Static WAN IP with NAT. ( but soon, if I read the early access info correctly), plus work VPN but I think that can be migrated as well.

    The D-Link Wifi and DNH-100 were my sad attempt to use business class wifi to create stellar home wifi. After 2+ years of poor wifi because of "sticky clients" I moved to google Nest Mesh Wifi. Thanks to the firewalla team on putting together the how to make Google Nest Wifi act like a WAP. It took some time to get google nest wifi to work correctly afterwards but all part of the journey.

    Cisco Switch is PoE and powers VOIP phones, security Cameras, and various other remote tech. All TVs are hardwired because streaming 4K over wifi is for noobs who don't understand how radio spectrums work.

    RasPi with PoE splitter for Home Automation hassio with Zwave lights, locks.

    OTA Tv encoder for PLEX DVR.

    In another closet MacMini for security NAS, plex server, and various other things.

    Its a mess.. Maybe I'll clean it up this holiday season.. na, the kids will be home, God forbid the Wifi go down while they are home.

    Enjoy!

    -1
    Comment actions Permalink
  • Avatar
    Casper

    My simple setup:

    - Spectrum provided modem

    - FWG as main router

    - Synology NAS goes to port 3 on FWG

    - Netgear Wireless router (now in AP mode) for hardwired PC and wireless other trusted devices (Apple stuff)

    - TPL Switch connecting to another TPL wireless AP for IoT devices that I don't trust (IP cams, printer, outlets, light switches, etc.)

    - TPL wireless AP is segmented into multiple SSIDs/VLANs and show up in FWG as different networks, useful when creating rules. Traffic from some VLANs are blocked from connecting to internal networks.

    - I also use FWG VPN feature (1-click setup) to access NAS from remote locations, and ofc secured browsing from public wifi.

    - Bonus: DIY ESP8266 temperature sensor to monitor the heat around this area, it'll alert me if this place gets too hot.

     

     

    0
    Comment actions Permalink
  • Avatar
    Lbogard05

    Here is my Gold working hard in my home

     

    -2
    Comment actions Permalink
  • Avatar
    David Vaughan

    This photo shows only the FWG and a couple of switches. Other important components are elsewhere in the house. Note the 8 ethernet ports on a panel on the back wall.
    FWG is in router mode with three separate subnets, physically separated by port.
    Working from the bottom privilege up, Subnet 3 contains just one device, the ethernet-connected Network Video Recorder with wired cameras subnetted below the NVR as host. The NVR has no access to any other subnet nor to the internet. This is a good thing because it tries phoning home to China about 40 times per hour, accounting for maybe 98% of all traffic blocked.
    Subnet 2 contains all other IoT devices, connected via a wired 2.4 GHz AP, and which can talk to the internet but not to other subnets.
    Subnet 1 contains servers and another router and wireless AP (5 GHz) below which are trusted personal devices which are invisible to the FWG except in aggregate. Later I will be replacing the existing sub-router with a FW Purple to view trusted devices individually. Trusted personal devices have free access to anywhere including to all subnets from within the network or via the VPN server configured on the FWG for when I am away from home.
    A possibly cool thing is that this installation is, um, kept cool. The cabinet in the picture has a thick door closing over it with gaps of just a few mm top and bottom for ventilation by convection. The room itself is unconditioned though on the shady side of the house, and we get 40°C here in Summer so I was concerned about cooling (actually, I might just be maniacal about cooling electronics). You can see the FWG has a heatsink on top of it with an AC Infinity fan atop that. The two switches on the left are separated by a heatsink with another atop, and an AC Infinity fan positioned at the far end to blow through the two heatsinks. A temperature sensor turns on the fans when cabinet temperature exceeds 29°C (power supplies also contribute heat).
    I do not believe the fans have ever come on except in testing, though last Summer was a cool one.

    -2
    Comment actions Permalink
  • Avatar
    Mcx

    Hi there,

    Not tech savvy but since i got FW I am learning more about cybersecurity.

    Runing FW red simple mode.

    Thank you for such a good device. Keep it up!

    Cheers!

     

     

    -1
    Comment actions Permalink
  • Avatar
    RichC

    Not as fancy as some of you gents awesome set-ups (Im having a bit of tech envy!)

    My ISP Virgin Media router in modem mode (not in pictures) feeds into my Asus GS-AX5400 router with a Firewalla Blue + running in DHCP Mode connected, handling about 30 devices. Blue is also running VPN Server for remote access when we are away :) 

    As its in the living room I've had orders from the wife to keep the "geeky" stuff to a minimum so its all hidden at the back of unit! Other bits in the pics are a hive hub which runs the alarm system and heating plus a usb hard drive connected to the router which is shared over the network

     

    0
    Comment actions Permalink
  • Avatar
    Brian Davis

    I always believe in defense in-depth to security.

    0
    Comment actions Permalink
  • Avatar
    Bertrand Nkakanou

    Here mine,

     

    Router mode

    With a managed Cisco , 2 Asus as AP, 4 Vlans, Work, IoT, Guest and Home

    -1
    Comment actions Permalink
  • Avatar
    Russ Scahill

    Firewalla Gold, Router mode; 5 VLANs; 2x Managed switches (1x 16-port here, 1x 5 port in Office); 5x UniFi UAP-AC-M WAPs (PoE injectors slightly visible in the back); Synology NAS; WD Elements USB3.0 Backup drive tethered to NAS; CyberPower UPS; MacPro5,1 running ESXi 6.5; Lutron Hub.
    All in basement Mechanicals room, so mounted to the ceiling to be protected out of the way.

    0
    Comment actions Permalink
  • Avatar
    John Calabro

    Little blue, checking in!

    WE run a super simple system — ISP router feeding wifi to all our peeps as well as cat6 through to a 16-port D-link router. And hells yeah, we're all ways doing cool stuff (best just check out our insta, @tvfhstudio). Thanks!

    1
    Comment actions Permalink
  • Avatar
    Philippe Champagne Tremblay

    Firewalla Gold in router mode

    over 100 devices connected

    0
    Comment actions Permalink
  • Avatar
    blcu_76

    Hello all from Melbourne Australia. This brilliant tiny devices that helps me in controlling and monitoring my children devices to ensure our family are protected and safe. Worth the investment and this was the 1st firewalla generation that I bought and still being used till now.

    I have compared other similar devices and this is the best of the best and can control up to individual or group of device and you can setup rules as well. Firewalla is not only best protection for family and affordable but best of all there is no subscription fee and very easy to use. Well done

     

    -1
    Comment actions Permalink
  • Avatar
    Brandon Marburger

    Running in bridge mode on home network. Firewalla sits between router and switch serves as an excellent IPS. Had a few scenarios where Firewalla detected and blocked suspicious IPs in the middle of the night.

    Love the WiFi quarantine feature and network monitoring tools. And the compact design fits perfectly in my rack.

    2
    Comment actions Permalink
  • Avatar
    Tobey Coffman

    Firewalla Gold in router mode and ISP load balancing. 

    ISP 1: Starlink ->

                                                          Firewalla Gold -> Eero Mesh in Bridge Mode

    ISP 2: T-Mobile Home Internet ->

    Also included in the network: Synology NAS, Assorted computers, tablets, and IOT devices adding up to 68 total devices on the network.

    -1
    Comment actions Permalink
  • Avatar
    Shawn Jones

    Current Home Setup:

    Navepoint Rack (Amazon)

    Firewalla Purple, transitioned from USG3 + Firewalla Blue

    • Router Mode
    • Three VLAN's (Non-IoT, IoT, and Work Projects)
    • Configured with iPhone Tethering for Spectrum outages
    • 200/20 Internet connection
    • Multiple Rules for Teenager Internet limitations

    Ubiquiti UniFi:

    • CloudKey 1
    • Five Port Flex Switch in Office for desk and Work Projects
    • Two AC-IW Access Points
    • One AC Pro
    • PoE injectors

    Buffalo Networks Gigabit Switch, passes VLAN info

    Synology DS412, attached via USB to UPS, additional USB backup drives

    18 Meross SmartHome Electrical Devices

    APC 1500W UPS, all devices in rack are backed up

    Whole-House Generator

    5
    Comment actions Permalink
  • Avatar
    tknox

    A Gigabit connection coming in through my Arris SurfBoard SB8200 going to my Firewalla Gold running in router mode. Primary network to the Asus AT-GX11000 and through that to an unmanaged 8-port GigE switch for full gig speed to those few devices that really need it (like my RPi NAS), IoT and Guest network running through the TP-Link TL-WA801ND. Everything on a UPS to keep me going through short power disruptions.

    -1
    Comment actions Permalink
  • Avatar
    Marcus Thümmler

    That's my small little, but very well performing setup.

    You see:

    AmpliFi HD Mesh Router

    Philips HUE Bridge

    Firewalla Blue (in simple mode)

    Gigaset landline phone (not really used anymore tbh)

    0
    Comment actions Permalink
  • Avatar
    Arnaud Balat

    I am humbled by the configurations I see in this thread!

    here is mine, a simple DSL modem => Router with Firewalla blue+ hooked to it.

     

     

    The blue+ is handling 29 devices on my network.

    I have a couple of devices to make the WIFI a mesh network.

    I quickly found out that monitoring on the mesh devices need to be turned off for normal performance and was actually making double the work unnecessarily.

    -1
    Comment actions Permalink
  • Avatar
    Kyle Hollasch

    It all just works great.  3 kids, > 40 devices.  Every time I think about upgrading I ask myself "why?".  If I get a gold I may go dual ISP, that's about the only thing I'd do at this point.

    (bonus - those RJ-45 receptacles you see terminating some of those cables are from my days at Lucent Technologies in the late 90's where I worked in the group that literally invented Cat 5, followed by 5e and 6).

    -1
    Comment actions Permalink
  • Avatar
    Tyson Prescott
    • Firewalla Gold: router mode
    • 1G ethernet internet
    • Netgear cell backup, next to a Phillips Hue
    • 3d printed 1u cases for Firewalla, Hue and Netgear LM1200 by Print3DSteve
    • Linksys switch (link aggregation)
    • Netgear wifi "access point" on top

    1
    Comment actions Permalink
  • Avatar
    Tommy Webb

    Nothing too fancy going on here.  Just a Firewalla Gold running in router mode connected to a Ruckus ICX 7150-12P.  A Ruckus R710 Unleashed provides wireless access throughout the house.  I have a separate physical network on the Firewalla that segments IoT devices and HomeKit devices.  The other ethernet port is used for virtual segmentation for the multiple networks I run internally.  The only things wired into the switch at this time are the LAG to the R710, a RaspberryPi running PiHole, an AeoTec SmartThings Hub, a Starling Home Hub for Nest integration into HomeKit, a Drobo and a spare wired connection for a PC. 

    With about 40 devices on the network, most being wireless, the R710 is segmented into about 8-10 SSIDs for various things.  I have an onboarding SSID, a guest SSID, a mobile SSID that family members mobile devices go on. An IoT SSID, a HomeKit SSID, an STD SSID for devices I bring in from clients to work on, a game SSID for Playstations, a video SSID for streaming TV's a VPN SSID that routes all traffic out over VPN and an unfiltered hidden SSID.

     

    -1
    Comment actions Permalink
  • Avatar
    Jon C

    Set up in Router mode.  Rather than using VLANs I subnetted and used seperate physical wireless routers to ease wireless congestion on one device and my powerful wireless router for my personal devices that roam more.  It also means I have more processing power than a single wireless router.  It meant I could test Firewall LAN blocking between the physical devices.  I have set up scheduled Internet blocking for my media LAN that is not used during the silent hours to reduce exposure.  All IoT is on a seperate subnet and blocked from my personal subnet to keep those little nasties away from the good stuff.  I have enabled extensive geo blocking from any country that I feel I don't need a service from.  All media devices such as TVs, NAS and media server are own their own subnet and blocked from my personal devices.

    3
    Comment actions Permalink
  • Avatar
    Wslc15

    Mine sits in its hole and runs the show. With the new features of the Gold its about time to change things up and remove the TP-Link Router all together.

    -1
    Comment actions Permalink
  • Avatar
    Christian Massie

    I use my Firewalla as the edge. I run multiple servers on my blade there at the bottom and my Synology NAS that allows external clients. Cisco switch connecting quite a few devices physically (still gotta run conduit to clean that up and make it look good). Power all ran to a UPS for Firewalla, Switch and Blade. VLAN'd off Wireless, and IoT devices, VPN setup, Site to Site setup (parents setup to me). Firewalla gold was the solution I needed for sure. Could use another frankly :P Best device I have had in a long while. 

     

    0
    Comment actions Permalink
  • Avatar
    Doron Kramarczyk

    Firewalla Gold in Bridge Mode (Lots of Profiles, such as Kid, IOT, etc)

    3 VLAN

    1 Guest Network

    30 Unifi Devices

    ~220 Active Clients (Wired and Wireless)

    Lots of Pi's (HomeBridge, HomeAssistant, Camera Monitors, etc...) running many SmartHome devices (in and out)

    "FIREWALLA Gold is working like a race horse, keeping up with everything I throw at it."

    0
    Comment actions Permalink
  • Avatar
    Paul Munk

    Firewalla Purple running in router mode. Most of my devices are split into several 'networks ' via Plume Wi-Fi. Separate logins and controlling which devices can connect to each other.

    -3
    Comment actions Permalink
  • Avatar
    Claudio Schaad

    Firewalla Gold Router Mode with 3 subnets

    -2
    Comment actions Permalink
  • Avatar
    Aravind Kumar Pabbisetty

    Here is the network design of my home network and a picture of the Firewalla

    -1
    Comment actions Permalink
  • Avatar
    Bilal Ahmed

    All these peeps with such nice setups here is mine.

    My Firewalla blue is mixed in with all the cables fighting the good fight!

     

    Running in simple mode with my Linksys Velop Mesh, I did have a Tp-Link Mesh but the Firewalla Blue didn't work that great with it, returned it and got the Linksys had no problems at all

    -1
    Comment actions Permalink
  • Avatar
    Andy brown

    Well here is my attempt.  As I live in Norway I utilised a classic Scandinavian glass fronted cabinet (something I got from IKEA for ornaments😄). Drilled some cable holes and ventilation holes in the back and there you go.

    Running Port LAG to the switch with VLANS for the IOT devices.

    Still in the process of tidying the cables, as the equipment arrived today

    Equipment:

     1.ISP modem

     2. firewalla Gold (with a USB fan for cooling) with Pihole Docker

    3 UniFi switch 8  port 60W POE with new controller Cloud key 2

    4. One Intel NUC extreme running Proxmox server for work

    5. Two Unfi WI-FI 6 AP.

    6. UPS

    1
    Comment actions Permalink

Please sign in to leave a comment.