Heheh! Monster unleashed!@katie279 Just found this thread. Looks like i have a lot of reading to do!
Heheh! Monster unleashed!@katie279 Just found this thread. Looks like i have a lot of reading to do!
Heheh! Monster unleashed!
This is a question of setting up the second network to only allow certain traffic usually. Either just local traffic if none of your smart stuff needs internet access (my goal), or you could allow specific traffic through to the internet. Typically this would be set up in your router and either all WiFi networks hosted from one access point/mesh, or sometimes a separate AP for smart stuff (kinda unnecessary).Haha for sure!
One thing i'm just going to ask now. I've seen a few things suggesting a separate wifi network should be used for all the IOT devices, bulbs etc. However how does that work for controlling them with your phone if they're on another wireless network?
Haha for sure!
One thing i'm just going to ask now. I've seen a few things suggesting a separate wifi network should be used for all the IOT devices, bulbs etc. However how does that work for controlling them with your phone if they're on another wireless network?
I have a separate IoT VLAN that can’t talk to my main network. I put as many IoT devices as I can on there without breaking things. It’s unintuitive but cloud devices are easier to separate out. Local devices that need to talk directly to Home Assistant mean they need to be on the same network or at least require specific firewall rules setting up to allow only the minimum required amount of communication.
It’s good cybersecurity practice to do so but it’s not absolutely essential and I wouldn’t worry about it at first. Just be sensible about what kind of devices you are buying (some I trust more than others) and you can put other controls in place if you are concerned. For example, I block any form of WAN access to local devices that don’t require it, especially if I don’t 100% trust them!
Another option you could explore is putting HA and all your devices on a separate VLAN and then subscribe to home assistants nabu casa which provides secure remote access via WAN. That would (I think) remove the problem of not having your main devices (e.g. phone, PC) being on the same network as HA. There’s a subscription fee but it isn’t much and it directly supports the open source project that is HA. I don’t use it as I have a VPN running allowing me to connect to my home network whilst out of the house.
An interesting conundrum as it depends what you're trying to protect. It could be argued that you'd want Home Assistant either on your main network, or away from untrusted IoT devices, because if that network is compromised and someone has access to HA - then playing havoc with your house wouldn't be fun (I know this can be negated by having 2FA enabled).
Has anyone else had issues with HA causing premature SSD failure? I think because of the continuous writes to the database it hammers them, I had quite frequent failures when running on an RPi4 but haven’t had any since switching to a Proxmox VM on a HP Mini PC, so fingers crossed…