{"id":273,"date":"2026-04-14T00:10:49","date_gmt":"2026-04-14T00:10:49","guid":{"rendered":"https:\/\/beginnerprojects.com\/cms\/?p=273"},"modified":"2026-04-14T03:50:27","modified_gmt":"2026-04-14T03:50:27","slug":"why-i-airgapped-my-home-lab-and-why-you-should-too","status":"publish","type":"post","link":"https:\/\/beginnerprojects.com\/cms\/why-i-airgapped-my-home-lab-and-why-you-should-too\/","title":{"rendered":"Why I Airgapped My Home Lab (And Why You Should Too)"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Airgapping (n.):<\/strong>&nbsp;<em>The practice of ensuring a computer network is physically isolated from all other networks, most notably the public internet. An airgapped system has no physical or wireless connection to the outside world, creating a literal &#8220;gap&#8221; of air that data cannot cross without physical intervention.<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>In the world of cybersecurity, we are often told that a good firewall and a VPN are enough. But as someone who spends my time experimenting with AI and custom software, I&#8217;ve started to view the internet differently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The AI Arms Race and the &#8220;Everlasting Bug&#8221;<\/h2>\n\n\n\n<p>AI is an incredible elevator\u2014it\u2019s helping us write code faster than ever before. But the elevator goes both ways. While we use AI to learn and build, others could be using the same power to automate the creation of dangerous, polymorphic software.<\/p>\n\n\n\n<p>Coupled with the fact that a critical &#8220;Zero-Day&#8221; bug is discovered almost daily\u2014some of which have been lurking in our systems for a decade\u2014the traditional &#8220;perimeter&#8221; of security feels thin.<\/p>\n\n\n\n<p>Now, let me be clear:&nbsp;<strong>I don&#8217;t believe in the illusion of &#8220;perfect security.&#8221;<\/strong>&nbsp;Security is often a marketing term. I use Linux because it gives me&nbsp;<strong>control<\/strong>, not because it&#8217;s an impenetrable fortress. However, there is a massive difference between&nbsp;<em>software<\/em>&nbsp;security (which can be bypassed) and&nbsp;<em>physical<\/em>&nbsp;isolation.<\/p>\n\n\n\n<p>Because there is no end in sight to the AI-driven vulnerability race, I decided to airgap my local area network (LAN).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Look Over My Shoulder: How I Built My Isolation Zone<\/h2>\n\n\n\n<p>I didn&#8217;t want a complex enterprise setup; I wanted something simple, cheap, and physical. Here is how I structured my environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Physical Hub<\/h3>\n\n\n\n<p>To isolate my home lab, I started with a cheap, 5-port Netgear hub from Amazon. I plugged all three of my computers into this hub. Crucially,&nbsp;<strong>the hub is not connected to my ISP modem.<\/strong>&nbsp;There is no cable running from my local switch to the outside world.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Logic: Static IP Addresses<\/h3>\n\n\n\n<p>Since there is no router in this loop to hand out IP addresses automatically (via DHCP), I had to assign&nbsp;<strong>Static IP addresses<\/strong>&nbsp;to each machine.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><strong>Quick Note:<\/strong>&nbsp;A&nbsp;Static IP&nbsp;is like a permanent home address for your computer. Instead of the network assigning a temporary address that might change, you manually tell the computer:&nbsp;&#8220;Your address is 192.168.1.10, and it will always be 192.168.1.10.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Once this was set, my three machines could talk to each other and share files perfectly, but none of them had a path to the internet.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><strong>A quick note on file sharing:<\/strong>&nbsp;While all three machines are networked, my Mac can&#8217;t natively &#8220;see&#8221; the Linux computers. However, it works perfectly the other way\u2014my Linux nodes can read and write to the Mac. For me, this is a non-issue; using Thunar, I can move files from the Mac to Linux and vice-versa without any friction.<\/em><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">The &#8220;Controlled Gate&#8221; (The Internet Node)<\/h3>\n\n\n\n<p>Of course, I still need the internet for research and updates. To solve this without compromising the whole network, I dedicated my Dell PC (running MX Linux) as my primary internet node.<\/p>\n\n\n\n<p>I added a cheap USB Ethernet dongle to the Dell. This second Network Interface Card (NIC) is plugged directly into my ISP modem. This creates a &#8220;dual-homed&#8221; system:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>One cable goes to the&nbsp;<strong>Isolated LAN<\/strong>&nbsp;(The Hub).<\/li>\n\n\n\n<li>One cable goes to the&nbsp;<strong>Wild West<\/strong>&nbsp;(The Modem).<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Handling the Other Machines<\/h3>\n\n\n\n<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"250\" src=\"https:\/\/beginnerprojects.com\/cms\/wp-content\/uploads\/2026\/04\/xfce-network-ipv4-routes-configuration.webp\" alt=\"Configuring static IPv4 routes in XFCE Linux to manage network traffic between a local airgapped hub and the internet.\" class=\"wp-image-274\" srcset=\"https:\/\/beginnerprojects.com\/cms\/wp-content\/uploads\/2026\/04\/xfce-network-ipv4-routes-configuration.webp 450w, https:\/\/beginnerprojects.com\/cms\/wp-content\/uploads\/2026\/04\/xfce-network-ipv4-routes-configuration-300x167.webp 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption class=\"wp-element-caption\">A quick look at where to find the Route settings in XFCE\u2014this is where I tweak how my Dell node handles the two different network paths.<\/figcaption><\/figure>\n\n\n\n<p>For my Mac and laptop, I rely on the &#8220;On\/Off&#8221; method. If I need a system update, I temporarily enable the WiFi, run the update, and immediately flip the switch to&nbsp;<strong>OFF<\/strong>. Both macOS and MX Linux remember this state across reboots, so they stay offline by default.<\/p>\n\n\n\n<p>The beauty of MX Linux (and the XFCE desktop environment) is the handy network toggle. It allows me to easily manage my connections, ensuring I can use local network resources while keeping the external interface disabled.<\/p>\n\n\n\n<p>The Mac was slightly more stubborn with dual-network priority, but after a quick session with Copilot to tweak the network service order, I managed to get it to handle the dual-connection logic similarly.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Closing Thoughts: Control Over Illusion<\/h2>\n\n\n\n<p>I implemented this setup about a month ago, and the peace of mind is tangible. I have no plans to revert to a fully connected home.<\/p>\n\n\n\n<p>This is especially important now that <a href=\"https:\/\/beginnerprojects.com\/cms\/deploying-hermes-agent-for-system-admin-and-web-scraping\/\" data-type=\"post\" data-id=\"173\">I am experimenting with&nbsp;<strong>Hermes Agent<\/strong><\/a>. When you are running autonomous AI agents that can execute code, the last thing you want is for that agent to have an open line to the internet while you aren&#8217;t watching.<\/p>\n\n\n\n<p>By moving the &#8220;security&#8221; from a software setting to a physical cable, I&#8217;ve replaced a fragile illusion with a concrete reality. I&#8217;m not claiming to be unhackable\u2014I&#8217;m just making sure the hacker has to physically walk into my room to get in.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Airgapping (n.):&nbsp;The practice of ensuring a computer network is physically isolated from all other networks, most notably the public internet. An airgapped system has no physical or wireless connection to the outside world, creating a literal &#8220;gap&#8221; of air that data cannot cross without physical intervention. In the world of cybersecurity, we are often told [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-273","post","type-post","status-publish","format-standard","hentry","category-guides"],"blocksy_meta":{"page_structure_type":"default","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/posts\/273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":2,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/posts\/273\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/posts\/273\/revisions\/280"}],"wp:attachment":[{"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/media?parent=273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/categories?post=273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beginnerprojects.com\/cms\/wp-json\/wp\/v2\/tags?post=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}