Setting up a really SOLID, SECURE network?

I’ve had SOOooooo many problems with my home network in the past and finally came to the conclusion that “consumer-grade wifi” wasn’t going to cut it. My most recent iteration (Google/TP-Link Onhub router + Google Wifi puck at the other end of the house)went really haywire and started assigning 192.168.x.x IP addresses (even though it was configured to assign 10.x.x.x addresses) so I pulled it out and put the previous router (a TP-Link wired router which supports VLANs) back in place and bought a used Ubiquiti Unifi access point with the intention of buying a 2nd one for the other end of the house.

Although I’m trying to flash everything over to Tasmota and minimize cloud usage, my thinking was that I would setup a dedicated (2.4GHz) SSID for all the IoT devices then somehow figure out a way for my smartphones/tablets (on my “main” network) to talk to the HA server without a (potentially hacked) IoT device being able to access other devices on the “main” network. I would also like to setup a 3rd SSID as a guest network - again, with no access to the “main” or “IoT” networks and maybe even with limited bandwidth (or at least with a lower QoS priority.

The more I got to looking at the Unifi ecosystem, the more I was inclined toward a USG and Unifi managed switches - but that stuff is expensive and I’m not a wealthy guy. So I started at looking at maybe building a pfSense router and buying older, managed switches on eBay…

If you have a similar setup (and/or you’ve been contemplating one), I’d really LOVE to know your thoughts, comments, lessons learned, etc.

THANKS!

I block IOT device access to WAN and new connections out on LAN. I allow servers connect IN LAN. This was setup using vlan.

If you have all unifi (router,switch,AP) guest is automatically seperated but cannot connect other devices only WAN