In this project, I implemented FreeRADIUS with EAP-TLS authentication and dynamic VLAN assignment in my home Wi-Fi network.The goal was to increase security and learn how enterprise-level Wi-Fi authentication works in practice.
This solution is commonly used in companies, universities, and secure environments, but it can also be used at home.
Network Environment and Used Hardware
Below I present only the essential information needed to understand the network design and how FreeRADIUS with EAP-TLS fits into the overall architecture.
Used Hardware and Systems
The network is built using a mix of enterprise-grade and home-lab hardware, which allows realistic testing of advanced security features.
Firewall
- pfSense installed on a custom mini-PC
- Acts as the main firewall and router
RADIUS and Management Server
- Dell Wyse 5070 mini-PC
- Operating system: Debian Linux
- Services running:
FreeRADIUS (EAP-TLS authentication)
UniFi Controller, migrated to UniFi OS Server
Network Devices
- Ubiquiti UniFi US-8-60W switch
- Ubiquiti UniFi UAP-AC-PRO access point
Network Segmentation and VLANs
The network is fully segmented using VLANs to separate traffic and improve security.
The VLAN 40 is dynamically assigned by FreeRADIUS after successful EAP-TLS authentication.
Network Design Philosophy- strong authentication instead of shared passwords
- clear separation of devices and users
- minimal trust between network segments
- Central authentication with FreeRADIUS
- Strong encryption using TLS certificates
- Dynamic VLAN assignment
- Easy scalability for new devices
- Clear security boundaries between networks






















































