Vlan Routing\static routing\dhcp relaying performance is often a lot of what you're paying for on an 元 enterprise router to take the load off of a central router. ![]() But that port could have thousands of VLANs flow in and out through the single connection. So in a lot of situations your router might be connected to the network through a single trunk. Your router would have a trunk link to the router\security appliance in which all of the tagged traffic flows to the router and it can route based on vlan then tag the sorted traffic appropriately and kicks it back to the managed switch over the trunk link and the managed switch divvies up the packets based on their vlan tag. You don't need a port for every VLAN on the router unless you're directly attaching each machine to the router. Maybe a PFSense or OPNsense box at the least. I would invest in a good security appliance\router\gateway and save the switch for the switching. Even an enterprise 元 switch's firewall is going to be both underwhelming in performance and features. all the more reason to deploy a separate firewall\security appliance\router with Deep Packet Inspection/Intrusion Protection. ![]() If you're an attractive security target and not needing high bandwidth. Any models with quality firewalls built in? Should I have another machine and vlan for running a third party firewall? How many ports would you recommend I get? This switch is going to be what's directly connecting to my modem, and acting as a firewall too. How does this compare to their more expensive models? What features am I lacking for that severe price drop? Having support for a sixth vlan just seems like a good idea for growth of the network.Ĭurrently, looking at Netgear. On the fifth vlan I’ll have at least one raspberry pie running a node for a search engine, and might expand that up to multiple Raspberry Pies or even a server eventually. Network performance needs low latency for these machines. ![]() I might split the ten computers into multiple vlans depending on what each gets used for. The fourth vlan will have at least two computers, but probably up to ten eventually. The second VLAN is for a honey pot running on a Raspberry Pie. I have a cheap switch connected to the router for expanding to more devices that don't need all that much bandwidth. I’m splitting up to ten computers into different vlans, (maybe more) and will have a GT-AX11000 behind one of the vlans with my personal computer and entertainment stuff connected through it. I might want to use a few for distcc, but I don’t believe going above gigabit would improve performance for that. These machines don’t need to communicate between each other mostly, though. I’ll have gigabit internet, and probably upgrade that. I would like jumbo frames support, and the ability to bond two ethernet connections on a few. I also don't completely trust Cisco, as they've had issues with back doors.Īll of the computers behind it need at least gigabit. (FireFox 5.0.1 was not fully supported) I'm fine in the command line, but would prefer a webgui for getting the switch up and running, and then go to CLI for more advanced features, and locking security down. Wasn't aware it was ten years old, and the web gui was so lacking. I had picked up one of these, and found it a bit lacking for the price. I’m looking to lock down my network by segregating all of my computers in case someone gets in.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |