Well...I dont know. Thanks anyway
I'm been fooling around like crazy here and I think I'm onto how its supposed to be.
I'm setting the physical interface to some small /30 that will never be used, just some random 192.168.x.x.
The physical net will NEVER be used....disable its DHCP-server, disable all its firewall rules etc.
Instead, use the subinterfaces (two in my cases), and of course have those two on different networks, choose two different after your own taste, maybe one in 172 and one in 192 or whatever.
Then on the switch I dont use the VLAN1 anywhere, I dont even add that subinterface in the router, instead I creat two additional VLANs and assign ports after my liking, then I make sure the PVID (default VLAN for each port) are changed to the VLAN the port belongs to (non-VLAN-aware clients). That way I can be sure noone can in any way exploit my native VLAN1, since none of my used VLANs use it at all.
THATS how I'm on my way of setting it up now and it SEEMS this is working....gonna lab a lot and make sure the firewall/routing works as intended between my regular VLAN and what is supposed to be the isolated guest-VLAN.