Introduction

The goal of this project was to build a compact and functional home network while gaining hands-on experience in configuring and managing network infrastructure. Throughout this process, I enhanced my understanding of network topology, segmentation, and hardware integration.

Objectives

  • Gain practical experience in deploying and managing network infrastructure.
  • Improve security and efficiency with Pi-hole + Unbound DNS for ad and tracker blocking.
  • Design and assemble a custom space-efficient networking rack using 3D-printed parts.

Hardware

ComponentDescription
Patch PanelImproves cable management and provides structured wiring
Patch Coupler2 x Keystone RJ45 CAT6A shielded couplers
TP-Link TL-SG108PEManaged 8-port Gigabit switch with PoE & VLAN support
Raspberry Pi 4 (8GB)Runs Pi-hole (DNS filtering) + Unbound (recursive DNS)
16x2 LCD DisplayDisplays real-time Pi-hole stats (DNS queries, uptime, etc.)
3D Printed MountsCustom-designed brackets for component mounting
Metal FrameProvides structural support for the rack
CAT6A SFTP CablesVarious lengths (6-inch, 16-ft, and 82-ft)

Rack Diagram

Networking Rack
Networking Rack

Raspberry Pi Setup

  • OS: Raspberry Pi OS
  1. Static IP: Configure a static IP for the Raspberry Pi.
  2. Pi-hole installation: Install Pi-hole using their one-step script.
    • Access the dashboard at: http://<pi-ip-address>/admin
    • Change the password with:
    pihole -a -p -new_password
    
  3. Recursive DNS with Unbound: Follow the official Pi-hole + Unbound guide to configure Unbound as the upstream resolver. This removes reliance on external DNS providers and enhances privacy.
  4. LCD Statistics Display: Attach a 16x2 LCD display to monitor Pi-hole stats in real-time. Use this script.
    • To run it persistently in the background:
    screen -S pihole_lcd
    
    • The script will start. Press Ctrl+A, then D do detach from the session.

Network Segmentation

Since my router lacks VLAN support, segmentation was implemented on the managed switch:

  • VLAN 10 (Main): Trusted devices (PCs, phones, TV)
  • VLAN 20 (IoT/Media): Isolated devices (smart devices, cameras)
  • VLAN 30 (Guests): Guest network for untrusted devices

This setup improves security by isolating IoT and guest traffic, preventing lateral movement in case of compromise.

Enhancements

  • IoT Isolation → Limits exposure from less secure devices.
  • DNS-Level Protection → Pi-hole blocks ads, trackers and malicious domains.
  • Firewall Rules → Additional filtering.

Challenges & Solutions

ChallengeSolution
Router lacks VLAN supportUsed switch-only VLAN for segmentation
Pi-hole installation issuesPi-hole prompted an error when installing, and it needed a fresh OS install on a new SD card
LCD script not persistingUsed screen to keep the display script running in the background

Future Improvements

  • Upgrade to a VLAN capable router.
  • Add a UPS for power stability.
  • Implement network monitoring.
  • Add PoE powered security cameras.
  • Add a mini-PC to host VMs and containers for homelab experiments.

Results and Conclusion

Performance: Faster browsing and ad-free experience.

  • Security: DNS-level filtering blocks trackers and malicious domains.
  • Learning outcomes: Gained hands-on experience with:
    • VLAN configuration and network segmentation
    • Pi-hole + Unbound setup for secure DNS
    • CAD design and 3D printing for rack components

This project successfully combined practical networking, DIY, and security-focused design. It serves as a strong foundation for future homelab and enterprise-grade network experiments.

Networking Rack