F5F Stay Refreshed Power Users Networks Correct wiring configuration and path planning.

Correct wiring configuration and path planning.

Correct wiring configuration and path planning.

J
Just_Senya
Member
169
03-26-2016, 07:55 AM
#1
Good morning everyone. I’ve finally installed all my managed switches and got everything up and running. Here’s how the setup looks. My layout is this: a server/switch rack in the basement contains a modem and an edge router X. The modem connects to port 0, port 1 is a Cat6 cable to the living room switch (Dell 2808 managed). On the 2808 I have a hard-line TV, Xbox, Netgear router set as an access point, a Nintendo Switch, and an IP camera. The edge router X is on port 2 for the office line (Dell 2824), which connects my laptop and my wife’s laptop. The bedroom smart TV also uses that port. #1 My main concern is whether the single line going to the edge router will become a bottleneck for both rooms. #2 When configuring VLANs, do I need to set up the edge router’s VLANs as well? I’d like each device to have its own dedicated VLAN. #3 Are there any good guides or videos on configuring Dell switches? This is my first experience with networking and setting up a home server. #4 Should I connect the Dell 6248p in the server rack directly from the edge router, then assign VLANs there instead? Thanks in advance, everyone!
J
Just_Senya
03-26-2016, 07:55 AM #1

Good morning everyone. I’ve finally installed all my managed switches and got everything up and running. Here’s how the setup looks. My layout is this: a server/switch rack in the basement contains a modem and an edge router X. The modem connects to port 0, port 1 is a Cat6 cable to the living room switch (Dell 2808 managed). On the 2808 I have a hard-line TV, Xbox, Netgear router set as an access point, a Nintendo Switch, and an IP camera. The edge router X is on port 2 for the office line (Dell 2824), which connects my laptop and my wife’s laptop. The bedroom smart TV also uses that port. #1 My main concern is whether the single line going to the edge router will become a bottleneck for both rooms. #2 When configuring VLANs, do I need to set up the edge router’s VLANs as well? I’d like each device to have its own dedicated VLAN. #3 Are there any good guides or videos on configuring Dell switches? This is my first experience with networking and setting up a home server. #4 Should I connect the Dell 6248p in the server rack directly from the edge router, then assign VLANs there instead? Thanks in advance, everyone!

V
VitoSEXY
Posting Freak
797
03-27-2016, 11:26 AM
#2
The most useful guidance I offer is to avoid excessive planning for your production network. A straightforward setup works well for home installations, reducing unnecessary complexity and ensuring the essential home devices function smoothly. Reserve VLAN configurations for more advanced environments. If others rely on it, keep things simple. Avoid setting default gateways on devices you don’t want exposed outside the network. In theory, any Gigabit device sharing a Gigabit uplink with other Gigabit devices might experience a bottleneck. This can be addressed by using switches equipped with 2.5 or 10 gig ports for backbone connections.
V
VitoSEXY
03-27-2016, 11:26 AM #2

The most useful guidance I offer is to avoid excessive planning for your production network. A straightforward setup works well for home installations, reducing unnecessary complexity and ensuring the essential home devices function smoothly. Reserve VLAN configurations for more advanced environments. If others rely on it, keep things simple. Avoid setting default gateways on devices you don’t want exposed outside the network. In theory, any Gigabit device sharing a Gigabit uplink with other Gigabit devices might experience a bottleneck. This can be addressed by using switches equipped with 2.5 or 10 gig ports for backbone connections.

C
Cyanstrophic
Senior Member
668
04-03-2016, 02:00 PM
#3
….but why? If each device has its own vlan, communication becomes impossible. You can begin bypassing the firewall, but then you might as well place everything on the same vlan. For home use, the level of isolation you aim for is having two separate WiFi networks, each in a different vlan—one for everyday tasks, one for IoT, and then restricting IoT from connecting to any other vlan. This significantly cuts down the attack surface because IoT devices are typically a common entry point into a network. The next phase would involve isolating all management interfaces on a limited subnet. This way, if a device is compromised, it can’t laterally access your firewall, networking, or web interfaces (or SSH ports) to cause damage. Beyond that, you’re just adding unnecessary complexity and confusion for no real benefit.
C
Cyanstrophic
04-03-2016, 02:00 PM #3

….but why? If each device has its own vlan, communication becomes impossible. You can begin bypassing the firewall, but then you might as well place everything on the same vlan. For home use, the level of isolation you aim for is having two separate WiFi networks, each in a different vlan—one for everyday tasks, one for IoT, and then restricting IoT from connecting to any other vlan. This significantly cuts down the attack surface because IoT devices are typically a common entry point into a network. The next phase would involve isolating all management interfaces on a limited subnet. This way, if a device is compromised, it can’t laterally access your firewall, networking, or web interfaces (or SSH ports) to cause damage. Beyond that, you’re just adding unnecessary complexity and confusion for no real benefit.

F
Frinex10
Posting Freak
806
04-08-2016, 05:21 AM
#4
F
Frinex10
04-08-2016, 05:21 AM #4

L
leo_b0a
Member
199
04-09-2016, 12:42 PM
#5
I learned by watching YouTube videos. Lawrence systems offers many useful networking content, mainly about pfSense. The main ideas stay the same no matter the hardware or software. There are several creators besides him, like RAID owl, level 1 techs, and Christian Lempa, and the list continues. I got a solid foundation before you dive into troubleshooting, since networking can quickly cut off your internet access and make finding fixes tough.
L
leo_b0a
04-09-2016, 12:42 PM #5

I learned by watching YouTube videos. Lawrence systems offers many useful networking content, mainly about pfSense. The main ideas stay the same no matter the hardware or software. There are several creators besides him, like RAID owl, level 1 techs, and Christian Lempa, and the list continues. I got a solid foundation before you dive into troubleshooting, since networking can quickly cut off your internet access and make finding fixes tough.

X
xXRAXERXx
Posting Freak
817
04-11-2016, 12:16 PM
#6
Thanks in advance! I’ll look into those this weekend. I spotted a YouTube instructor offering a free CCNA course, which I’ve been watching throughout the day at work. He also provides a free trial for Cisco’s packet tracker software. I plan to download it later and experiment with it before diving into any projects.
X
xXRAXERXx
04-11-2016, 12:16 PM #6

Thanks in advance! I’ll look into those this weekend. I spotted a YouTube instructor offering a free CCNA course, which I’ve been watching throughout the day at work. He also provides a free trial for Cisco’s packet tracker software. I plan to download it later and experiment with it before diving into any projects.

C
CrazySage9
Member
51
04-11-2016, 03:00 PM
#7
Wireshark offers comprehensive tools for network analysis, yet its advanced features aren’t necessary for simple VLAN configurations. Focus on the purpose behind your setup and the benefits of VLANs rather than deep packet inspection techniques.
C
CrazySage9
04-11-2016, 03:00 PM #7

Wireshark offers comprehensive tools for network analysis, yet its advanced features aren’t necessary for simple VLAN configurations. Focus on the purpose behind your setup and the benefits of VLANs rather than deep packet inspection techniques.