F5F Stay Refreshed Power Users Networks Yes, the solution is feasible.

Yes, the solution is feasible.

Yes, the solution is feasible.

F
FaustinM
Junior Member
6
11-10-2023, 02:57 AM
#1
I aim to understand if this setup is feasible at your location. The plan involves connecting an ISP router to the wall, a secondary router via one of the rear Ethernet ports on the first router, with VPN enabled. Devices can toggle between VPN and regular access. Both modems support WiFi. A diagram was provided for clarity. Would this configuration work in your home?
F
FaustinM
11-10-2023, 02:57 AM #1

I aim to understand if this setup is feasible at your location. The plan involves connecting an ISP router to the wall, a secondary router via one of the rear Ethernet ports on the first router, with VPN enabled. Devices can toggle between VPN and regular access. Both modems support WiFi. A diagram was provided for clarity. Would this configuration work in your home?

R
rudo2000
Junior Member
10
11-12-2023, 11:22 AM
#2
That's feasible. I'll check about adding a "DMZ" zone for the second router. Make sure it doesn't reuse the same subnet as the main router (192.168.1.x) and the VPN router (192.168.2.x). You want to prevent communication between those networks, like printers or similar devices.
R
rudo2000
11-12-2023, 11:22 AM #2

That's feasible. I'll check about adding a "DMZ" zone for the second router. Make sure it doesn't reuse the same subnet as the main router (192.168.1.x) and the VPN router (192.168.2.x). You want to prevent communication between those networks, like printers or similar devices.

R
ReaperCreeper1
Junior Member
40
11-17-2023, 07:04 AM
#3
The most straightforward approach is ideal for you. If printers or similar devices need to talk across routers, it's better to keep them separate. For setting up a DMZ on the second router, you'll need to configure it as a separate network segment accessible only through a firewall. As for DMZ, it acts as a buffer zone between your internal network and the outside world, helping to isolate sensitive systems.
R
ReaperCreeper1
11-17-2023, 07:04 AM #3

The most straightforward approach is ideal for you. If printers or similar devices need to talk across routers, it's better to keep them separate. For setting up a DMZ on the second router, you'll need to configure it as a separate network segment accessible only through a firewall. As for DMZ, it acts as a buffer zone between your internal network and the outside world, helping to isolate sensitive systems.

V
victordub44
Member
216
11-17-2023, 08:05 AM
#4
Essentially "DMZ" refers to a demilitarised zone where all ports are accessible for internal IP addresses, allowing unrestricted traffic flow. This works well when your VPN router includes a firewall. If not, restrict only the ports required for VPN and other services. The most straightforward setup uses an ISP router, directing traffic through the DMZ to your VPN router’s internal IP. For guidance, check https://portforward.com/router.htm.
V
victordub44
11-17-2023, 08:05 AM #4

Essentially "DMZ" refers to a demilitarised zone where all ports are accessible for internal IP addresses, allowing unrestricted traffic flow. This works well when your VPN router includes a firewall. If not, restrict only the ports required for VPN and other services. The most straightforward setup uses an ISP router, directing traffic through the DMZ to your VPN router’s internal IP. For guidance, check https://portforward.com/router.htm.