This is a bug in the firmware that causes a broadcast storm from the affected hubs, but is entirely unexpected. some USB-C docking hubs with ethernet will take down an entire network when the host computer goes to sleep or is disconnected.The culprit can be things that you wouldn't expect, for example: Look for patterns and methodically evaluate what is happening on the network. This will help you understand if you need to buy one or more managed switches or any other hardware (such as APs that can support multiple SSIDs and VLANs), as well as your overall strategy for how you will configure everything once you have appropriate plans around the hardware. make a physical topology map to understand how these networks get distributed through your home.figure out the security model you want (wide open vs restricted, etc.).all your IoT devices might be good on a single VLAN, etc.). map out all of your devices and their respective services/dependencies so you can logically group them together (i.e.I would recommend your starting point should be as follows: Wifi is another issue - your AP(s) (and any intermediate switches) must support VLANs if you wish to create wifi networks for each of your VLANs. This can work just fine if your physical topology allows. You can, however, split your OpenWrt router's ports such that each physical port represents one network, and then connect an unmanaged switch to each port. Unmanaged switches just can't do this - they are designed for just a single untagged network. Next thing - if you need any single physical switch to handle multiple VLANs, you must get managed switch to do this. You can couple that with the two things above, of course. Or have a VLAN for your network infrastructure, another for your media devices, and one for your general purpose computers. so if you are a business, it might make sense to have all of the computers for one department (maybe marketing) on a VLAN, and a separate VLAN for another team (say finance). this means that you can, for example, protect trusted networks from untrusted (IoT/guest/kids, etc.) hosts.Īnother reason to use VLANs is the logical grouping of hosts. Add security by using VLANs - firewall rules can allow or prohibit (or selectively allow/prohibit) traffic from flowing between VLANS.As compared against one large network, several smaller networks can improve network efficiency because fewer hosts per network means reduced 'chattiness' of the network, especially with broadcast traffic which tends to be one of the things that can multiply exponentially. VLANs make it possible to segment the network into multiple broadcast domains.but I'll start with this: it depends on your objectives. If a VLAN is what I want, is there a way to do that in OpenWRT 21 with Luci? I watched some videos on setting up VLANs, but it looks like the settings in OpenWRT have since changed. Is a VLAN what I would want? I would still like layer 3 communications to work between VLANs, but want to isolate layer 2 traffic into smaller segments. I learned about the OSI model in school, but never really dove into it in practice. I'd like to begin segmenting my network, but I don't have any idea on how to start. I suspect I'm getting into an ARP storm and eventually one of the unmanaged switches has hit its limits. Plugging in wireshark into one the ports on the central unmanaged switch, I get almost all MAC-specific-ctrl-proto-01 packets / MAC CTRL / Pause packets. At least 20 wired devices and 30 wireless devices.Ībout once a month, the whole wired part of the network goes down (my openwrt router's wifi still works, AP does not). I have a rather large home network with dozens upon dozens of devices, a router in AP mode, and 5 or 6 unmanaged switches.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |