I manage the networking for our (very!) small church as a volunteer. Currently everything is set up on a single /24 IPv4 subnet. I'm wanting to break these out into VLANs for increased security, and also implement IPv6 at the same time.
Our hardware is a MikroTik commercial-grade router (behind an AT&T gateway with 5 static WAN IPs), a secondhand Netvanta 1534P PoE switch (plus a Unifi PoE switch some distance away), and some Unifi Wi-fi access points with Unifi Controller running on a Raspberry Pi. We have a Synology NAS which is exposed to the Internet and which serves as our email server and master DNS server. Users are two Windows PCs in secure locations (offices), two more PCs in non-secured locations (sound booth), and guest users on our guest access Wi-fi. We also have security cameras, a few IoT devices (thermostats), and VoIP telephones. Most everything is on wired Cat 5e cabling to a fairly secure server closet.
I have identified the following classes of devices, along with what access I think they should have. I'm asking for advice as to how to implement this setup, or recommendations to improve it:
- Devices with direct access from WAN: Email, DNS, & Web server. Also Video station and similar on the NAS. This subnet should not be able to access other LAN subnets.
- Control and management devices: Management ports for switches, routers, Unifi controller, and similar devices. Should be able to be accessed from secured PCs, but not from WAN (unless at some later date I implement a VPN...fingers crossed).
- File sharing devices: All PCs, networked printers, and the NAS (it has 2 LAN ports which can be segregated). Should be able to share files and access as needed.
- Secured PCs: Should be able to access any device on the LAN.
- Non-secured PCs: Should be able to access the NAS as well as printers, etc., but should not be able to access control and management devices.
- IoT devices: Should have access to WAN only; should not see any other network traffic.
- Guest Wi-fi users: Should have access to WAN only; any access to NAS would be through the WAN-accessible port.
- VoIP Phones: Should have their own subnet.
- Security cameras: Should only be able to see the local port for the NAS, which acts as our camera controller and recorder. I don't want them phoning home to China every night.
I'm not a professional by any means; I'm learning by doing. (The church is my training lab!) I'd like to know how to give as much protection as possible, especially in implementing IPv6...there are lots of people who'd like to hack a church (I could show you my mail server logs...). Any helpful information will be appreciated.