My Homelab in 2026: Architecture, Goals, and Design Rules


What problem I was solving

I wanted a home setup that’s reliable for family use, secure by default, and easy to expand without everything turning into spaghetti.

Constraints

  • Family services need to “just work” (Jellyfin, DNS, general internet)
  • I don’t want random apps exposed to the public internet
  • Backups must be testable and restorable, not just “I have a copy somewhere”
  • I want segmented networks (VLANs) so IoT/guest stuff can’t wander

The design

At a high level:

  • OPNsense as the router/firewall with VLANs
  • Pi-hole for filtering + a VIP for resilience
  • Unbound for local DNS / overrides
  • Proxmox for VMs/LXCs (apps live here, not on random boxes)
  • PBS + off-site for backups
  • Media stack (Jellyfin + *arr) with VPN-routed downloads

Network / diagram

VLANs (simplified):

VLAN 10 – Admin
Management devices + my main clients

VLAN 20 – Family
Family devices

VLAN 30 – Servers
Proxmox, LXCs, VMs, infrastructure

VLAN 40 – IoT
TVs, smart devices, anything untrusted

VLAN 50 – Mgmt
Network gear / AP management

VLAN 99 – Guest
Guest access to internet only

(Next: I’ll add a proper diagram and a service map.)

Key config

My “rules of the road”:

  • Default deny between VLANs; allow only what’s needed
  • DNS is a critical dependency, so it gets redundancy
  • Anything exposed remotely goes through a tunnel + authentication
  • Backups are only real if I can restore them

What went wrong

Plenty — I’ll document the mistakes as separate posts because they’re usually the most useful part.

How I tested it

  • Failover tests (DNS VIP)
  • Network isolation checks between VLANs
  • Restore drills for critical data

Lessons learned

Simple beats clever. Build the network and DNS foundations first — apps are the easy part.

What I’d improve next

  • Publish the full diagram + list of hosted services
  • Write up the Pi-hole VIP setup
  • Document remote access (tunnels + SSO) properly