OPNsense on Protectli hardware with Intel ME disabled via HAP bit. 8 isolated networks, Suricata IDS/IPS, Unbound DNS filtering, DNS over TLS, Monit monitoring, self-hosted blocklists. Every config on Forgejo.
*Updated nightly while you sleep. Your security stays current automatically.
A complete OPNsense deployment on Protectli Vault hardware: 8 isolated networks, Suricata IDS/IPS with ~200K signatures, Unbound DNS with self-hosted blocklists covering 1M+ domains, DNS over TLS, Monit monitoring, and pre-configured WireGuard integration for SafeNet VPN. Coreboot firmware with Intel ME neutralized via the HAP bit. Everything preloaded by Protectli engineers from OSS-authored configurations before it ships.
You plug it in, baseline security is already active. The 25-minute onboarding call customizes it for your ISP, your home, and your device inventory.

SecureNet implements 8 separate networks: 3 physical (full access) and 5 virtual VLANs (restricted). Each network isolates devices by trust level and use case.
Primary trusted devices with full access. Your computers, phones, tablets. Can access firewall GUI and all other networks.
Hardware failover network. If Port 1 fails, plug into Port 4. Internet restored in 30 seconds.
Security cameras, doorbells, motion sensors. Internet-only access: can't reach your computers or NAS if compromised.
Smart TVs, Sonos speakers, robot vacuums. Isolated from internal networks: TV spyware can't access your work laptop.
Visitor WiFi. Zero internal visibility: guests can't see other guests, can't discover internal services, can't reach firewall GUI.
Children's devices with DNS filtering. Blocks adult content, gambling, drugs. Network isolation + content filtering.
WiFi VPN tunnel. All traffic routes through a SafeNet server. For privacy-focused browsing.
Wired VPN on Port 3. Plug in ethernet devices that need VPN: home office setup, devices without VPN clients.
SecureNet uses deliberate IP patterns so routing path is visible at a glance:
| IP Pattern | Meaning | Routing |
|---|---|---|
192.168.x.x | Standard networks | Direct to ISP (untunneled) |
10.x.x.x | SafeNet networks | Through WireGuard tunnel |
| Port | Interface | Purpose |
|---|---|---|
| Port 1 (Left) | LAN + VLAN Trunk | Tagged 802.1Q trunk to WiFi AP: LAN1 untagged, IoT/Smart/Guest/Kids/SafeNet tagged |
| Port 2 | WAN | Internet gateway (connects to ISP modem) |
| Port 3 | SafeNet Port | Wired VPN for ethernet devices (untagged, tunneled) |
| Port 4 (Right) | LAN2 Backup | Hardware failover if Port 1 fails (untagged, no VLANs) |
OPNsense runs on FreeBSD's pf packet filter. Every restricted VLAN uses an identical 3-rule pattern applied as interface rules (processed after floating rules in OPNsense's rule order).
A device on the IoT VLAN can reach the internet and talk to other IoT devices, but it cannot reach your computers, your NAS, your admin network, or any other VLAN. Period.
Simplified Rule Management: The RFC1918 alias covers all private address space in a single entry. Isolation rules reference this alias, so adding a new VLAN doesn't require updating every existing rule set.
Suricata is the first layer of our two-layer packet inspection architecture. It sits on the WAN interface, inspecting all internet traffic before it reaches your internal networks.
| Parameter | Value |
|---|---|
| Interface | WAN (perimeter defense) |
| Mode | IPS: blocking, not just alerting |
| Pattern Matcher | Hyperscan (Intel's open-source high-performance regex library, near-wire-speed matching) |
| Total Signatures | ~200K active rules* |
| Updates | Nightly automatic (2 AM CST cron) |
| Rule Tuning | Known false-positive SIDs disabled after SPL validation |
Rulesets selected to maximize home network protection without false positives:
| Source | Signatures | What It Catches |
|---|---|---|
| Abuse.ch ThreatFox | 147,379+ | Active campaign indicators of compromise (IOCs) |
| Abuse.ch URLhaus | 28,451+ | Malicious URLs, phishing, exploit kits |
| Abuse.ch SSL Fingerprint | 9,192+ | Malicious SSL/TLS certificates |
| ET emerging-malware | 17,797+ | Trojans, ransomware, spyware |
| ET emerging-phishing | 2,800+ | Credential theft, fake login pages |
| ET emerging-exploit | 1,676+ | CVE exploits, buffer overflows, RCE |
| ET emerging-scan | 285+ | Port scanning, reconnaissance |
| Feodo Tracker + others | ~125+ | Botnet C&C, worms, DoS, current events |
*Signature counts update nightly as new threats are discovered and old ones expire.
All performance numbers validated in our Security Performance Lab with real traffic patterns:
| Hardware | Throughput | Packet Loss | Added Latency |
|---|---|---|---|
| Protectli V1410 | ~1.2 Gbps | 0% | <5ms |
| Protectli VP2430 | ~1.7 Gbps | 0% | <5ms |
Unbound DNS runs locally on your SecureNet firewall, resolving queries faster than remote servers while blocking malicious domains and ads before any connection is made. DNSSEC validation is enabled for all upstream responses.
We aggregate multiple trusted sources into a single, deduplicated blocklist hosted on our own infrastructure at oss-blocklist.net. Refresh runs nightly at 2 AM CST so your security updates while you sleep.
Why Self-Hosted? We control uptime (not dependent on third-party hosting). Dead feeds get replaced transparently. Customer firewalls always receive updated lists. Format is guaranteed consistent.
| Source | Focus |
|---|---|
| Hagezi Pro++ | Aggressive malware, tracking, and ads (~800K domains) |
| OISD Big | Balanced coverage with low false positives |
| Steven Black Unified | Conservative malware and adware |
| 1Hosts Pro | Malware, tracking, and suspicious domains |
| OSS Community | Customer-reported malicious domains and ads |
| Source | Focus |
|---|---|
| Spamhaus DROP | Hijacked networks, criminal operations |
| DShield Top 20 | Active attackers from real-world data |
| Hagezi TIF | C2 servers, malware hosting |
| OSS Community | Customer-reported malicious IPs |
*Counts update nightly as sources refresh and community reports are added.
See an ad that slipped through? Find a malicious site we missed? Report it and we'll add it to the OSS Community list. Your feedback improves protection for everyone.
If a legitimate site gets blocked (false positive):
DNS filtering and IP blocking work together to catch threats that slip through one layer:
| Threat Scenario | DNS Layer | IP Layer |
|---|---|---|
| New domain + new IP | Misses | Misses |
| New domain + known bad IP | Misses | Blocked |
| Known bad domain + new IP | Blocked | Misses |
| Known bad domain + known bad IP | Blocked | Blocked |
All DNS queries from your network are encrypted before leaving your home. Your ISP cannot see what websites you're visiting.
| Setting | Value | Why |
|---|---|---|
| Primary | Quad9 (9.9.9.9:853) | Non-profit, Swiss jurisdiction, no query logging |
| Backup | Cloudflare (1.1.1.1:853) | Fastest public DNS, KPMG-audited privacy |
| Encryption | TLS 1.3 | Latest standard |
ISP sees every domain you query: netflix.com, bankofamerica.com, webmd.com...
They can build a complete profile of your browsing habits, sell it to advertisers, or comply with requests without your knowledge.
ISP sees: encrypted connection to 9.9.9.9:853
They know you're making DNS queries. They cannot see what domains you're querying.
Why Not Google DNS? SecureNet prioritizes DNS providers whose incentives align with user privacy. Quad9 is a non-profit with no logging. Cloudflare has audited privacy practices and no advertising business. Google's core business is advertising.
Monit watches your firewall hardware 24/7 and sends email alerts before problems become crises.
If Port 1 NIC fails (you receive Monit alert):
Zenarmor is the second layer of our two-layer packet inspection architecture. While Suricata inspects traffic at the WAN perimeter, Zenarmor monitors LAN traffic and identifies applications regardless of encryption.

| Scenario | Suricata (WAN) | Zenarmor (LAN) |
|---|---|---|
| Compromised device scanning internal network | Can't see (internal traffic) | Detects abnormal scanning |
| HTTPS malware from legitimate CDN | Sees valid HTTPS, passes | Detects behavioral anomaly |
| Bandwidth abuse (torrenting) | Sees encrypted traffic | Identifies BitTorrent application |
| Policy violations (TikTok on Kids VLAN) | Can't distinguish apps | Identifies and can block application |
OSS provides: Installation, configuration, and brief dashboard tutorial during onboarding.
Zenarmor provides: Ongoing support, feature training, policy creation help, troubleshooting.
SecureNet includes pre-configured WireGuard integration for SafeNet VPN subscribers. Traffic from SafeNet networks routes through our servers automatically via policy-based routing.
| Parameter | Value |
|---|---|
| Protocol | WireGuard |
| MTU | 1420 (standard) |
| Persistent Keepalive | 25 seconds |
| AllowedIPs (default) | 0.0.0.0/0 (full tunnel) |
| AllowedIPs (Apple split tunnel) | 0.0.0.0/0 except 17.0.0.0/8 (APNS) |
| Network | Routing |
|---|---|
| Home, IoT, Smart, Guest, Kids | Direct to ISP (no VPN) |
| SafeNet VLAN (10.60.60.0/24) | Through WireGuard tunnel |
| SafeNet Port (10.70.70.0/24) | Through WireGuard tunnel |
Apple Split Tunnel: Households with Apple devices get a customized AllowedIPs config that excludes Apple's 17.0.0.0/8 block. This preserves APNS (Apple Push Notification Service) delivery for iMessage, FaceTime, and app notifications while still tunneling all other traffic.
Connect to SafeNet WiFi when you want private browsing. Connect to your regular network for everything else. No apps to install, no settings to change. It's automatic.
Learn More: SafeNet VPN is covered in detail on the SafeNet page →
Protectli Vaults ship with Protectli's coreboot firmware and Intel ME disabled via the HAP bit. This is the single most important firmware-level differentiator on this page, and no other home firewall vendor can legitimately claim it.
Intel's Management Engine is a secondary CPU embedded in nearly every Intel processor shipped since 2008. It runs its own closed-source firmware, has its own network stack, operates below the operating system, and cannot be inspected, audited, or disabled by standard means. It has full access to system memory, network interfaces, and storage. It runs whether your computer appears to be on or off.
Intel ME has had multiple documented critical vulnerabilities over the years, including remote code execution bugs discovered by researchers long after the affected hardware shipped. Because the ME runs below the OS, OS-level security tools can't see it and can't protect against it.
Intel ME runs on nearly every consumer firewall on the market. Firewalla Gold Plus. Netgate 2100. Ubiquiti UDM. Any Intel-based mini PC running pfSense or OPNsense without coreboot+HAP modifications. The ME is running. You cannot turn it off through standard firmware settings. Your firewall has a second, unauditable computer inside it with network access.
Protectli Vaults are the only home firewall appliances on the market that ship with Intel ME neutralized via HAP.
The HAP (High Assurance Platform) bit is a configuration flag originally created for US government High Assurance Platform program customers. Setting HAP=1 causes the Intel ME to halt its firmware execution immediately after the bring-up phase. The ME is still present on the die (it's physically integrated into the chipset and can't be removed), but it stops running code after boot. No network stack. No listening services. No persistent execution.
Protectli ships all Vaults with coreboot firmware that sets HAP=1 and additionally cleans the ME firmware region to minimize the attack surface during the brief pre-HAP bring-up phase. This is the most thorough ME neutralization method publicly available and is used in production by security-focused organizations that require high-assurance hardware.
| Layer | Component | Open Source? |
|---|---|---|
| Hidden management CPU | Intel ME (disabled via HAP) | Neutralized |
| Firmware | Coreboot | Yes |
| Operating System | OPNsense (FreeBSD) | Yes |
| Configuration | SecureNet Configuration | Yes (Forgejo) |
| VPN Protocol | WireGuard | Yes |
From chipset through VPN tunnel, every configurable component is publicly reviewable and independently auditable. The one component we can't open-source (Intel ME's physical presence on the die) is the one we neutralize.
For the skeptical: You can verify Intel ME is disabled on a Protectli Vault yourself. Tools like intelmetool and me_cleaner can inspect ME status post-boot. Protectli's coreboot source is publicly available.
OSS offers an optional enterprise-grade Omada EAP720 wireless access point, professionally configured in Stand Alone mode: no cloud dependency, no subscriptions, full VLAN support.
| Feature | Value |
|---|---|
| WiFi Standard | WiFi 7 (802.11be) with MLO |
| 2.4GHz Speed | Up to 344 Mbps |
| 5GHz Speed | Up to 2,882 Mbps |
| SSIDs | 6 per band (one per VLAN) |
| VLAN Support | Full 802.1Q tagging |
| Coverage | ~1,500 sq ft per AP |
| Management | Stand Alone (local web interface) |
Expansion: Homes over 1,500 sq ft can add additional Omada EAP720 access points. Wired backhaul recommended for best performance.
No subscriptions required. The firewall provides complete security functionality without SafeNet or Zenarmor. These are optional enhancements, not requirements.
Honest about who SecureNet is, and isn't, designed for.
Want to DIY? Our configurations are published on Forgejo. OPNsense is free and open source. You can absolutely replicate this yourself, but expect 20-30 hours for a first-time build if you already understand the stack, plus 4-6 hours/month ongoing maintenance to keep rulesets tuned and blocklists healthy. SecureNet is for people who want the result without the project.
Everything is published. Verify every claim we make.
Schedule a free 10-minute introduction call. We'll verify ISP compatibility, answer questions, and make sure SecureNet is right for you.