Locking down router for ULTIMATE privacy/protection

So I’ve decided to lock-down my consumer ASUS AX86U router and need some advice/thoughts on what I’m planning to do. Router has already been upgraded to the latest Asuswrt Merlin and I’m using ControlD DNS-Over-TLS with the Hegazi Pro block list.

5ghz - All of my trusted devices are on the 5ghz band (Apple devices, computers, Amazon FireTV sticks (Kodi sideloaded which accesses media files on a computer)) with WPA3

5ghz (Guest network) - Internet only devices such as TV and Spectrum XUMO streaming boxes with WPA3 intranet access disabled

2ghz - Four wireless security cameras with WPA3 (I use an app on the Apple TV which is connected by Ethernet to view the camera streams)

2ghz (Guest network 1) - Internet only old laptop and tv with WPA2 intranet disabled

2ghz (Guest network 2) - Internet only devices (Amazon Alexa Echo Dot, Smart clock, lots of iot lights) WPA3 intranet disabled

  1. Should I move the security cameras to a 2ghz [Guest network 3] WPA3 with intranet enabled so I can access the streams on my Apple TV? Intranet disabled won’t work for accessing the streams,

  2. Should I enable MAC Filter for the 2ghz and guest networks band for all devices so only those devices can access the internet? Better security?

  3. Should I enable AP Isolation on the 2ghz band to tighten security even more?

**My entire network is for personal devices and actual humans besides me won’t be accessing my network.

Doesn’t answer or verify what I’m planning but I did add additional info to the top of my post for clarification.

First of all, you should install Merlin.

Router has already been upgraded to the latest Asuswrt Merlin and I’m using ControlD DNS-Over-TLS with the Hegazi Pro block list. I also went through the documentaion and didn’t find any details on guest networks, MAC filtering or AP isolation plus any other details on how I’m setting this up. I’m basicly trying to use the guest networks like VLANs but without the specific rules that VLANs provide.

1 Like

Okay. Turn on HaGeZi’s Threat Intelligence Feeds from ControlD too — that will noticeably improve security. For the Wi‑Fi, there’s not much else to do besides enabling WPA3 on devices that support it and having solid passwords.

1 Like

I’d also recommend moving up from Pro to Pro++.

1 Like

Not sure that 5Ghz improves the security by a lot as a whole.
You could also give a try to a Radius server for WPA3 Enterprise.
But there is plenty of stuff to bulk the security besides that I think. :+1:t2:

This could be a decent checklist: Site Index - RouterSecurity.org

1 Like

If your router has the option, decrease the Wi‑Fi range to the lowest strength possible while still having the devices you need connected.

Decreasing the router power ( or ‘range’ has you said) will also decreased the bandwith link.

You can port forward them

No.

This is an unrealistic threat model for sure.

DNS filtering doesn’t improve security in any way whatsoever. Heavy blocklists slow down your internet for no reason.

???

This thread is full of strange advises

from a performance perspective alone, some of these should be moved to wired ethernet if possible

big no.
cameras should be on their own network, the only device that should be able to access them is an nvr effectively as a bastion host.

eg. your regular network <> nvr <> separate isolated network with cameras

ensure 802.11w is enabled, it is mandatory for WPA3

this has the benefit of providing PFS for WPA2, it can be a headache to maintain however

have you verified that the separation is actually enforced?

it can in theory increase performance, due to the time sharing mechanism of wifi

Protective DNS does have tangible benefits and should be used.
eg. https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-Selecting-a-Protective-DNS-Service-v1.3.PDF

This entirely depends on implementation and doesn’t haven’t be slow at all.

3 Likes

No idea what is hard to understand about reducing the range of your Wi‑Fi so it becomes less accessible to other bad actors.

I am not familiar with this particular device, but I would definitely suggest that you isolate from the Internet all Internet-of-Shit devices including cameras, “smart” TVs and other gadgets.

I would also completely isolate WiFi from the wired network. The way I went about it is to create a separate WiFi subnet. I only allow a few select devices (by MAC) to access the rest of the network.

or get rid of them entirely :rofl:

Yup! Some interesting advice. Kissu posted a great link on router security which is mega useful. Unless I’m told differently, looks like using the Mac Filter to only allow my devices and nothing else on the network has no additional benefit which I thought might add some security. Also AP Isolation is also not necessary. Kinda makes since if I’m using only my devices with WPA3 for everything and only two devices on WPA2.

I do have PMF (Protected Management Frames) enabled for WPA3 on the 5ghz band but not on the 2ghz band which I’ll enable today to see if anything breaks. I’ll also use my laptop to connect to each network and see what can and can’t be accessed. So pinging devices should give me an idea what’s actually isolated.

No, port forwarding allows bidirectional communication to the said hosts while disallowing them to communicate with anything else by SNATing via masquerade. Cameras still will be able to talk only with the gateway. This doesn’t mix isolated networks.

I don’t understand what mechanism you’re implying. It’s always better to have a dedicated channel. By decreasing power, you’re losing some channels in the 5ghz due to higher power transmit requirements, so no 160 MHz wide channels, and probably all the DFS channels because of the fact router will go below 250 mW per the recommendation to go as low a possible. non-dfs channels are also allowed to be operated at a higher power levels, so every other AP around the area will interfere.

Maximum distance at which a device can connect is almost always determined by output of the client device. What threat model are you implying anyway? How does it strengthen “security“ when an attacker has an exploit for an SoC?? This is so stupid lol

Yes, since MAC is spoofable and there are better ways to isolate clients.

One way to discourage neighbors from focusing on your Wi-Fi network is to weaken the signal leaving your home.

Wi-Fi uses two different frequency bands, 2.4GHz and 5GHz. Walls and furniture block the higher frequency more than the lower one, so try limiting the Wi-Fi in your home to the 5Ghz band. This will limit your access to own network too, as your walls and furniture become bigger barriers, but it’s worth a shot.

Another way to keep your Wi-Fi signal from leaking outside your home is to limit the transmission power of your router. Some routers offer this as an option, some do not. If yours does, experiment with it, lowering the power up to the point that it interferes with your use of your network(s).

Great way to reply without giving an answer.

Focusing by doing what?

This website is full of bogus advises as was discussed in another thread btw.

Maybe, but should it be as big as hagezi? Doesn’t it also include blocklists for inbound connections for subscriptions for DNS filtering? Can we really say such badness enumeration has tangible security benefits when every threat actor employs dynamic infrastructure? I wouldn’t choose to sacrifice internet speed in favor DNS content filtering. The only good point out of this document is domain squatting and phishing campaigns, but then again password managers solve this problem.

So you are implying that the broader the range is does not increase the potential number of bad actors who are able to attack your router.