Layered remediation steps that add protection over time

Start with the free controls first. Each level below adds another layer, so families can move from basic DNS blocking to inline enforcement and continuous validation.

Home networks

Build the network first

These steps focus on improving filtering and verification at the router and network edge.

Level 1 Free

Move your router DNS to Cisco Family Shield

Update your home router DNS settings to use Cisco Family Shield DNS so your network blocks pornography by default.

Level 2

Add a Firewalla Purple inline with a dedicated access point

Place a Firewalla Purple inline on the home network and move household traffic onto a wireless access point behind it so all traffic passes through the new enforcement point.

Level 3

Deploy a NetHound endpoint probe

Add a NetHound endpoint probe to continuously validate that the improved home network is still enforcing the protections you expect.

Kids phones

Reduce bypass routes on mobile devices

Phone controls are weaker than a hardened network, so the goal here is to remove easy workarounds and force traffic into systems you control.

Level 4 Free

Use strict device rules and household controls

  • Completely lock down any browser on the phone.
  • Do not rely on default child protections alone; they are too weak.
  • Do not allow more than one device, which reduces tethering and other bypass options.
  • Keep phones out of bedrooms and require them to stay in common areas.
Level 5

Buy kid-focused phones such as Bark

Purpose-built devices can arrive more tightly locked down than general consumer phones. Use NetHound to test the network path used by any third-party device you bring into the home.

Level 6

Supervise iPhones and force all traffic through your VPN

For iPhones, you can place the device in supervised mode, disable hotspot, and force an always-on VPN so traffic routes back through infrastructure you control at home.

  • HomeCyber’s guide requires wiping the iPhone first so supervision can be enabled with Apple Configurator on a Mac.
  • The VPN profile uses an always-on configuration and can be paired with restrictions that stop users from changing VPN settings or adding unapproved profiles.
  • Hotspot can be disabled to reduce tethering bypass.
  • This setup requires a VPN endpoint on your home network and another VPN-capable router or appliance to handle the IPSec or equivalent tunnel termination.

Reference: HomeCyber’s supervised iPhone VPN guide.