Installing a hardware firewall/DHCP/Wireguard Server

doctorzeromd@sopuli.xyz to Selfhosted@lemmy.world – 12 points –

Hello All!

I just purchased a Intel Celeron box from AliExpress to replace (and hopefully improve) the functions of my raspberry pi running wg-easy and pihole. I'd like this new box to handle DHCP, firewalling/ad blocking, and act as my wireguard server.

Currently I'm connecting my Internet modem (thankfully not a router, so no NAT) to my TPlink Archer AX21's WAN port and then using the LAN ports to connect to my devices. I see that I can turn off NAT on the TPLink, but I assume I wouldn't be able to use the new device as a DHCP server if I do, right? I could put the TPLink in AP mode but I'm not sure if that shuts off the WAN or LAN ports.

Is the best move to leave the TPLink in router mode (I'm not sure this matters) and plug the firewall into one of the LAN ports? I can do this but it'll require some re-running of cables so I wanted to check first.

21

You are viewing a single comment

That would be great, and if the WAN port becomes a LAN port, even better. I don't see anything about that in the manual, but I'll cross my fingers

You could try OpenWRT

Edit: its not supported. You would need to go buy a device with support.

Worst case I'll just use the 4 LAN ports on the TPLink and leave the WAN on the TPLink unused

How will you get internet?

another roart of the thread suggested using the Celeron box as an OPNsense router

Modem to WAN port of firewall, LAN port of firewall to wireless router in AP mode, other lan ports to other devices?

It works so long as you're not trying to create separate networks. When/if you decide to start with some vlan madness and such the AP likely won't work for that, unless it's fancy and can do multiple SSID on separate clans, but most WiFi/router combos don't go that far.

Basically the new firewall/router box becomes the boss of everything done ng DHCP, likely DNS relaying, and all the monitoring. Simple and efficient, just wouldn't go hosting public services with the setup since there's no 'DMZ' to keep it separate from you personal devices.

Cool, that's exactly what my plan is currently. I will eventually run all the cables but I want to drop in this firewall and start learning it in the meantime.

I may even go the route of some managed switches and WANs that do support multiple SSIDs on different VLANs, but first I want to get comfortable with my new single network.