F5F Stay Refreshed Power Users Networks Configuring network connections

Configuring network connections

Configuring network connections

N
NoodleLips
Member
160
09-11-2023, 08:42 PM
#1
Set up a single internet connection across six apartments using an ISP modem, a switch (TL-SG108E), and six separate Wi-Fi routers. Each apartment gets its own router, isolated for security. The switch supports QoS and VLAN features. This configuration meets the requirements for security and bandwidth management.
N
NoodleLips
09-11-2023, 08:42 PM #1

Set up a single internet connection across six apartments using an ISP modem, a switch (TL-SG108E), and six separate Wi-Fi routers. Each apartment gets its own router, isolated for security. The switch supports QoS and VLAN features. This configuration meets the requirements for security and bandwidth management.

S
SrKaner
Member
222
09-16-2023, 03:47 AM
#2
NAT helps link several local devices to one ISP connection unless you assign multiple IP addresses on a single line. It’s usually handled by the router, meaning the router should come before the switch. You can set up separate VLANs on the switch for different network segments, allowing each part to function independently. Each apartment needs its own access point for WiFi, but since everything is routed through the switch, network traffic stays divided. Only the router serves as a shared point for communication between all segments.
S
SrKaner
09-16-2023, 03:47 AM #2

NAT helps link several local devices to one ISP connection unless you assign multiple IP addresses on a single line. It’s usually handled by the router, meaning the router should come before the switch. You can set up separate VLANs on the switch for different network segments, allowing each part to function independently. Each apartment needs its own access point for WiFi, but since everything is routed through the switch, network traffic stays divided. Only the router serves as a shared point for communication between all segments.

G
211
09-16-2023, 11:02 AM
#3
In reality you'd need a router (ISP modem/router combo). However, a straightforward fix exists to prevent ports from communicating with each other. The TL-SG108E offers these capabilities: MTU, VLAN, 802.1Q QoS. Shouldn't that cover your needs? I'm new to configuring similar setups. Also, it should minimize the number of ports in use.
G
george_griveas
09-16-2023, 11:02 AM #3

In reality you'd need a router (ISP modem/router combo). However, a straightforward fix exists to prevent ports from communicating with each other. The TL-SG108E offers these capabilities: MTU, VLAN, 802.1Q QoS. Shouldn't that cover your needs? I'm new to configuring similar setups. Also, it should minimize the number of ports in use.

L
LukeRocks159
Junior Member
39
09-21-2023, 06:19 PM
#4
It’s important to include traffic control features. Honestly, finding an affordable server with eight Ethernet ports running Linux would probably suffice. A budget PC equipped with two solid network cards works too, especially with routers that support VLANs, though the configuration becomes more involved.
L
LukeRocks159
09-21-2023, 06:19 PM #4

It’s important to include traffic control features. Honestly, finding an affordable server with eight Ethernet ports running Linux would probably suffice. A budget PC equipped with two solid network cards works too, especially with routers that support VLANs, though the configuration becomes more involved.

W
WaterLily2003
Senior Member
648
09-28-2023, 07:15 PM
#5
This approach would help you understand VLANs better. You'd assign each apartment a dedicated VLAN—like apartment 1 in VLAN 1, apartment 2 in VLAN 2, and so on—and connect all ports to a shared hub or router. This setup lets everyone reach the internet while keeping them isolated from other networks not on the same VLAN. It’s like giving each apartment its own entrance to the building, allowing expansion without extra complexity. For separating WiFi traffic, you’d need one access point per apartment, which likely means at least a small switch for each space. These switches can be basic and unmanaged since VLAN management is handled centrally. A 10.x.x.x/8 address range would suffice, though a 192.168.x.x/24 might seem sufficient but can quickly run out of IPs with devices like smart scales or coffee machines. For budget reasons, opting for affordable gigabit gear is wise, as switches at this level cost around $600. However, setting up such a network still involves significant expenses due to the number of devices and connectivity needs.
W
WaterLily2003
09-28-2023, 07:15 PM #5

This approach would help you understand VLANs better. You'd assign each apartment a dedicated VLAN—like apartment 1 in VLAN 1, apartment 2 in VLAN 2, and so on—and connect all ports to a shared hub or router. This setup lets everyone reach the internet while keeping them isolated from other networks not on the same VLAN. It’s like giving each apartment its own entrance to the building, allowing expansion without extra complexity. For separating WiFi traffic, you’d need one access point per apartment, which likely means at least a small switch for each space. These switches can be basic and unmanaged since VLAN management is handled centrally. A 10.x.x.x/8 address range would suffice, though a 192.168.x.x/24 might seem sufficient but can quickly run out of IPs with devices like smart scales or coffee machines. For budget reasons, opting for affordable gigabit gear is wise, as switches at this level cost around $600. However, setting up such a network still involves significant expenses due to the number of devices and connectivity needs.

I
ItzFireMLG
Member
215
09-28-2023, 07:58 PM
#6
Based on what you've described, the expense would mainly come from installing the cabling—Cat 5e works fine for 240Mbps—and the TL-SG108E switch. This should get everything up and running. Appreciate your guidance!
I
ItzFireMLG
09-28-2023, 07:58 PM #6

Based on what you've described, the expense would mainly come from installing the cabling—Cat 5e works fine for 240Mbps—and the TL-SG108E switch. This should get everything up and running. Appreciate your guidance!

J
JuliBr0
Senior Member
495
09-29-2023, 03:27 AM
#7
Be mindful that when using wireless routers in each unit, they must be configured for access point operation. If they lack this setting, disable NAT and DHCP to prevent conflicts with the primary router. Cat5e works well for 1Gbps over up to 100 meters (device to device). I recommend Cat6 or Cat6a for more stable performance; it supports 1Gbps consistently and enables a smooth upgrade to 10Gbps without rewiring. The cost difference is usually minimal, so choose the highest quality cable that fits your budget.
J
JuliBr0
09-29-2023, 03:27 AM #7

Be mindful that when using wireless routers in each unit, they must be configured for access point operation. If they lack this setting, disable NAT and DHCP to prevent conflicts with the primary router. Cat5e works well for 1Gbps over up to 100 meters (device to device). I recommend Cat6 or Cat6a for more stable performance; it supports 1Gbps consistently and enables a smooth upgrade to 10Gbps without rewiring. The cost difference is usually minimal, so choose the highest quality cable that fits your budget.

Z
zFlare22
Member
210
09-29-2023, 04:28 AM
#8
This setup works well for a three-story home. Even positioning the switch and modem on the garage floor is feasible.
Z
zFlare22
09-29-2023, 04:28 AM #8

This setup works well for a three-story home. Even positioning the switch and modem on the garage floor is feasible.

T
Tudaofuat
Member
58
09-29-2023, 12:04 PM
#9
Wouldn't it be required to set up sub-interfaces on the router? Otherwise, even if a trunk port is connected and linked to the router, all traffic between VLANs could still flow freely since the router wasn't instructed to isolate it. VLANs on the switch alone might block tools like Wireshark, but basic communication such as pings would remain intact, allowing users to view other devices on the network. I’d likely think about creating sub-nets, though that’s not ideal for open Wi-Fi or when APs are nearby enough for users to connect directly. A router with sub-interfaces would be the simplest solution.
T
Tudaofuat
09-29-2023, 12:04 PM #9

Wouldn't it be required to set up sub-interfaces on the router? Otherwise, even if a trunk port is connected and linked to the router, all traffic between VLANs could still flow freely since the router wasn't instructed to isolate it. VLANs on the switch alone might block tools like Wireshark, but basic communication such as pings would remain intact, allowing users to view other devices on the network. I’d likely think about creating sub-nets, though that’s not ideal for open Wi-Fi or when APs are nearby enough for users to connect directly. A router with sub-interfaces would be the simplest solution.