Hello
@Sampei Nihira
thank you for sharing your topic / config. found some interesting programs and extensions you use.
In terms of Network security I would go a step farther and try to segment the network (Example):
Old Windows 192.168.0.1 /30 if there is only one PC that subnet allows a range of two IPs (PC NIC and Router Interface)
New Windows/Linux 192.168.1.1 /30 and up if you have more then one device try to keep the subnet as small as possible
IoT/WiFi Devices 192.168.2.1 /30 and up
That is basic subnet segmentation and adds a good amount of protection on the network side. Of course you can add another layer on top VLAN IDs. Easiest way is port based VLAN Example:
VLAN: 100 Old Windows 192.168.0.2 /30 for Router Interface LAN 1
VLAN: 200 New Windows 192.168.1.2 /30 for Router Interface LAN 2
VLAN 300 IoT / WiFi Devices 192.168.2.2 /30 for Router Interface LAN3 / WiFi
What segmentation does in that way is that you can setup a Rule-Set on the Router Firewall for each individual segment and makes maintaining it easier. The other part is that you can Route Traffic to specific Hosts in your network -Example: PC1 to PC2 and not PC3
Another side effect is performance - Since you have segments of enclosed networks the broadcast overhead is smaller and gains more responsiveness. The other part is if one is infected it can not reach the others that easily!
If you need more assistance in networking ill be glad to help you out and develop a schismatic for your needs.
Another part is a Firewall appliance on that part ill recommend Sophos XG Home (easy to setup and very powerfull) ->
Free Firewall - Home Edition | Sophos Firewall for Home
Best regards
Val.