1gbs router on a 2.5gbs network?

Status
Not open for further replies.
You told me to ask it and, now that you don’t like the answer, it’s wrong.

We’ll agree to disagree.
ChatGPT will tell you whatever you want to hear at times.

Ask it this:
Code:
ONT <> unmanaged LAN Switch (including LAN clients) <> EE Hub WAN port (no devices on LAN ports)

Is this a good idea?
I think I've read/heard of devices that can run it's services across the WAN port instead of over it's LAN port connections, but from what I remember my quick perusal of such info, it suggested that only specific types of devices (usually higher end business models) have such functionality.

Are you saying the EE devices is capable of this natively?
Correct, some higher end Cisco/Juniper etc firewalls can run WAN and LAN using the same interfaces. No home routers I'm aware of let you do this.
 
Correct, some higher end Cisco/Juniper etc firewalls can run WAN and LAN using the same interfaces.

Thanks for confirming, that info is outside my wheelhouse as it's not something I've had the pleasure of managing or interacting with.

No home routers I'm aware of let you do this.

I gathered, but that is also why I asked @MartinInAyrshire if their EE device was capable of doing this for them right now (new device with unintended feature not disabled?), since that might answer the question on why it's working for them, but others might be confused as to why a dosmetic home device was performing with such a capability that's traditionally not associated with having.
 
I gathered, but that is also why I asked @MartinInAyrshire if their EE device was capable of doing this for them right now (new device with unintended feature not disabled?), since that might answer the question on why it's working for them, but others might be confused as to why a dosmetic home device was performing with such a capability that's traditionally not associated with having.
I genuinely don't understand how it's working, and I'm intrigued to learn why. Even if it is working, it doesn't make it a good idea.

My thinking is the devices are somehow working over IPv6, but that's just an assumption.
 
The EE Smart Hub Pro just happens to have:

2.5 Gb WAN (good)
1 Gb LAN ports (theoretical bottleneck if used directly but not really in practice)
Hi, I'm a little confused.

I looked up the Smart Hub Pro and it lists the following:
2.5gb WAN x1
2.5gb LAN x4

Are you sure your EE device is the Smart Hub Pro? Or is it a prior version or newer version?
 
These posts have lived rent free in my head all Saturday. :D

I think there’s some confusion.

There are no LAN devices on the WAN side at all.
OK?...
It’s simply:

ONT → (dumb unmanaged) switch → WAN port of router
Which puts your 'LAN' upstream of the router's WAN port, as confirmed by your own network diagram and directly contradicting your first claim. Your diagram clearly shows your WiFi and other LAN clients connected over the MOCA backhaul to the L2 switch, to which your router is also connected via its WAN port. If your LAN devices are plugged into the unmanaged L2 switch, and the router's WAN port is also plugged into the switch, you've completely flattened the layer 2 network (ISP/ONT, LAN and 'WAN') into one single broadcast domain. You have also, then, contrary to your assertion, put the LAN devices on the router's WAN side.

Assuming your EE Hub even allows RFC1918 traffic on the WAN interface, and will permit DHCP and NAT to be run via WAN (which I've never seen?) you'd still need either the switch to be a managed layer 3 switch (to tag LAN traffic on its own VLAN, and/or to act as a L3 router) or else to assign a logical subinterface on the router's physical WAN interface, separate to the ppp0 subinterface, to allow the router to then serve DHCP, SNAT and DNAT to the 'LAN' subnet via arp with the firewall turned off (or otherwise configured to allow bogons/martians).

Even in that case, with the completely flat broadcast domain you're flooding the fully flat network with arp/broadcast traffic (including the ONT and ISP), and you're going to experience PPPoE drops and likely a MAC ban for abuse from the Openreach side. You're also leaving your local devices wide open to sniffing, malware can easily own your entire network, and they are directly exposed to WAN independent of the 'sideways' connected router and firewall device. Running router on a stick will also cut the port's physical throughput as traffic travels through it twice, defeating the multigig objective. So yes, there's definitely some confusion here.

- Can you confirm your switch is definitely an unmanaged L2 switch with no VLAN tagging or other L3 features?
- What OS is your router running, and how have you configured DHCP and NAT to run via the physical WAN interface (which is what you have connected to the switch, and by extension both your MOCA LAN links/clients and the ONT/ISP)?
- Are you assigning static addresses to the 'LAN' clients manually, relying on link-local addressing, or otherwise running DHCP and NAT through the physical WAN if via the switch - which is also directly interfaced to the wider Internet?

We know similar setups are technically feasible (albeit with VLAN tagging and router on a stick topology), but on a standard EE router with a dumb L2 switch, no logical subinterfaces and no ability to set a secondary RFC1918 subnet? Help us understand your physical, logical and routing setup because this doesn't make sense. And yes, I also asked AI (Grok and Gemini) and both agree with @ChrisD. and I.

TL;DR – The EE router isn’t doing anything wild, I just tried to design the network like an enterprise one:


Router = edge, Switch = core.


Most people treat the router as the core.
This I don't understand. You're using the right words but how you're saying them doesn't make sense. You just described a collapsed core network but your own topology is anything but.

Enterprise aren't running L2 switches at the network edge, which is what you're physically describing. Edge routers sit at the edge of each (sub)network and core routers sit at the core of the larger overarching network (depending on which network topology you're actually using - usually collapsed core in resi or SMB environments). Core switches sit at the core of the (local) network, behind their edge (or core) router, and have access switches sub-connected to them in turn. So of course as we zoom out the topology, ISPs and larger campuses will have core routers above each of the edge routers, but that's 'turtles all the way down' and it still starts and ends with a router. If you can forget about ChatGPT for a moment and simply break down your logical setup and the overarching topology (i.e. the network architecture and the way you've engineered it) we might understand. As it stands, nothing you said makes sense.
 
It's hurting my head thinking about this still don't get what it fixes.
I'm with Chris on this one the 2.5gb switch LAN side is the correct way to set it up. Any 2.5gb devices will communicate at 2.5gb as long as they are on the same VLAN.

I have a layer 3 switch so even my different VLANS only communicate via the switch and not the router.
Sorry, 15 post limit. I don’t know what it fixes either.
 
I’m super dumb. When I saw the LAN ports were yellow I got it into my head they were 1GB and it got stuck there.
It would be irrelevant anyway. No LAN devices would have been going via the router if they were all on the same VLAN, they'd go via the switch only. That's the whole point of switches. Router only routes via different networks.
 
These posts have lived rent free in my head all Saturday. :D


OK?...

Which puts your 'LAN' upstream of the router's WAN port, as confirmed by your own network diagram and directly contradicting your first claim. Your diagram clearly shows your WiFi and other LAN clients connected over the MOCA backhaul to the L2 switch, to which your router is also connected via its WAN port. If your LAN devices are plugged into the unmanaged L2 switch, and the router's WAN port is also plugged into the switch, you've completely flattened the layer 2 network (ISP/ONT, LAN and 'WAN') into one single broadcast domain. You have also, then, contrary to your assertion, put the LAN devices on the router's WAN side.

Assuming your EE Hub even allows RFC1918 traffic on the WAN interface, and will permit DHCP and NAT to be run via WAN (which I've never seen?) you'd still need either the switch to be a managed layer 3 switch (to tag LAN traffic on its own VLAN, and/or to act as a L3 router) or else to assign a logical subinterface on the router's physical WAN interface, separate to the ppp0 subinterface, to allow the router to then serve DHCP, SNAT and DNAT to the 'LAN' subnet via arp with the firewall turned off (or otherwise configured to allow bogons/martians).

Even in that case, with the completely flat broadcast domain you're flooding the fully flat network with arp/broadcast traffic (including the ONT and ISP), and you're going to experience PPPoE drops and likely a MAC ban for abuse from the Openreach side. You're also leaving your local devices wide open to sniffing, malware can easily own your entire network, and they are directly exposed to WAN independent of the 'sideways' connected router and firewall device. Running router on a stick will also cut the port's physical throughput as traffic travels through it twice, defeating the multigig objective. So yes, there's definitely some confusion here.

- Can you confirm your switch is definitely an unmanaged L2 switch with no VLAN tagging or other L3 features?
- What OS is your router running, and how have you configured DHCP and NAT to run via the physical WAN interface (which is what you have connected to the switch, and by extension both your MOCA LAN links/clients and the ONT/ISP)?
- Are you assigning static addresses to the 'LAN' clients manually, relying on link-local addressing, or otherwise running DHCP and NAT through the physical WAN if via the switch - which is also directly interfaced to the wider Internet?

We know similar setups are technically feasible (albeit with VLAN tagging and router on a stick topology), but on a standard EE router with a dumb L2 switch, no logical subinterfaces and no ability to set a secondary RFC1918 subnet? Help us understand your physical, logical and routing setup because this doesn't make sense. And yes, I also asked AI (Grok and Gemini) and both agree with @ChrisD. and I.


This I don't understand. You're using the right words but how you're saying them doesn't make sense. You just described a collapsed core network but your own topology is anything but.

Enterprise aren't running L2 switches at the network edge, which is what you're physically describing. Edge routers sit at the edge of each (sub)network and core routers sit at the core of the larger overarching network (depending on which network topology you're actually using - usually collapsed core in resi or SMB environments). Core switches sit at the core of the (local) network, behind their edge (or core) router, and have access switches sub-connected to them in turn. So of course as we zoom out the topology, ISPs and larger campuses will have core routers above each of the edge routers, but that's 'turtles all the way down' and it still starts and ends with a router. If you can forget about ChatGPT for a moment and simply break down your logical setup and the overarching topology (i.e. the network architecture and the way you've engineered it) we might understand. As it stands, nothing you said makes sense.
I am just a layman. I’m no engineer. I’ve just fought tooth and nail for a decent network for 10 years. I do not claim to be more knowledgeable than you or anyone on here.

For my specific circumstance, I have set it up this way, originally because I got caught in my head and thought yellow ports in the router meant 1gb. I had tried both ways and this way brought a very small improvement.

If my LAN devices were actually on the WAN side, they would have public IPs and bypass NAT. They don’t. They get 192.168.x.x from the router. Therefore, the router is absolutely still the Layer 3 boundary. The switch is only Layer 2 fabric — exactly like in enterprise collapsed core designs.

The fact my devices pass through the switch physically before the router doesn’t change the logical boundary. The router’s WAN and LAN are separate broadcast domains by design. A Layer 2 switch does not magically bridge them just by being between.
 
If you're going to say things like this:

I am just a layman. I’m no engineer.

Please don't follow up with statements like this:

exactly like in enterprise collapsed core designs.

Because your 'setup' has zero resemblance to a collapsed core in an enterprise environment. And FWIW, modern enterprise architectures do not follow the core/distribution/access model anymore because it has inherent issues in modern datacenter switch fabrics.
 
If you're going to say things like this:



Please don't follow up with statements like this:



Because your 'setup' has zero resemblance to a collapsed core in an enterprise environment. And FWIW, modern enterprise architectures do not follow the core/distribution/access model anymore because it has inherent issues in modern datacenter switch fabrics.
I say this with more respect intended than you have afforded me thus far - no. I’ll say what I like, and what I believe is true. I’ve said what I said based on research and what I’ve seen in enterprise environments.

My home is not a data centre and the majority of enterprise deployments are not data centres either.

Collapsed core doesn’t refer to datacenter spine-leaf. It refers to combining the core and distribution layers, while still maintaining a routed edge boundary — which is exactly what my router is doing. The switch is simply a multi-gig Layer 2 fabric in front of the Layer 3 boundary. The router’s WAN and LAN are still separate interfaces with separate broadcast domains. The presence of the switch in front of the WAN interface does not bridge those domains — it only extends the physical fabric.
 
Here’s what my network was giving me on WiFi last night, while 3 Sky stream pucks were in use for 4K and my son was playing on his gaming laptop.

The laptop is a 2014 MacBook Air with just one antenna.


 
Last edited:
This setup is impossible unless something is being bridged through the MoCA onto the other WAN-side wired devices. I think the EE Wi-Fi device connected to the MoCA is providing connectivity to that network segment.
 
Last edited:
This setup is impossible unless something is being bridged through the MoCA onto the other WAN-side wired devices. I think the EE Wi-Fi device connected to the MoCA is providing connectivity to that network segment.
MoCA isn’t routing anything. It does not have that capability or anything close. It’s just Ethernet over coax (Layer 2 only). It has no PPPoE, no DHCP, no NAT, no routing. It can’t terminate the WAN link even if it wanted to. And the router still works when I disconnect the MoCA.

The EE Wi-Fi Pro satellite also isn’t acting as a router – it’s in access point / bridge mode. It doesn’t have its own WAN or NAT, and it doesn’t hand out any IPs. All clients behind it get their 192.168.1.x address from the main router.

If MoCA or the satellite were somehow bridging WAN traffic, the devices connected to them would:
• Get public IPs instead of 192.168.x.x
• Bypass NAT/firewall
• Break PPPoE (only one session allowed)
• Not have NAT Type 2 on consoles

But everything behaves exactly like a normal LAN behind a router – because that’s exactly what it is. The router still authenticates PPPoE, owns the public IP, does NAT, DHCP, and firewall. The switch + MoCA + satellites are simply delivering Layer 2 LAN connectivity at above 1Gbps speeds.
 
Ahh, I think I see what's going on now.

It looks like the BT/EE ONT on that wall there permits a direct connection to the Ethernet connection it uses for any device so long as it can communicate via PPPoE. The switch is invisible in this setup so the Router still see's the connection and the ONT still sees the Router and they talk to each other. And so the Router is still doing the traffic management here (WAN in, and LAN control out).

But you have also got the WiFi extenders further down your network, and if I'm not mistaken those are the ones that is feeding your LAN connection from the Router (over the 6Ghz wireless) back into the wired network.

So if you remove the MoCa device to this switch here, I think you'll find that your network is still fully connected.
 
Ahh, I think I see what's going on now.

It looks like the BT/EE ONT on that wall there permits a direct connection to the Ethernet connection it uses for any device so long as it can communicate via PPPoE. The switch is invisible in this setup so the Router still see's the connection and the ONT still sees the Router and they talk to each other. And so the Router is still doing the traffic management here (WAN in, and LAN control out).

But you have also got the WiFi extenders further down your network, and if I'm not mistaken those are the ones that is feeding your LAN connection from the Router (over the 6Ghz wireless) back into the wired network.

So if you remove the MoCa device to this switch here, I think you'll find that your network is still fully connected.
Pretty much exactly this. The switch is just Layer 2, so the router and ONT still see each other directly over PPPoE, and the router remains the Layer 3 boundary.

Just one small clarification: the EE Wi-Fi satellites in my setup are NOT using wireless backhaul. The first satellite (by the back door) connects via MoCA for wired backhaul, and the second satellite (garage) connects via Cat6a from that first satellite. So MoCA is actually what brings LAN connectivity out of the core switch to the rest of the house.

If I removed the MoCA, the satellites would fall back to wireless mesh, but throughput and latency would tank – that’s why I built the wired backhaul path.
 
Just one small clarification: the EE Wi-Fi satellites in my setup are NOT using wireless backhaul. The first satellite (by the back door) connects via MoCA for wired backhaul, and the second satellite (garage) connects via Cat6a from that first satellite. So MoCA is actually what brings LAN connectivity out of the core switch to the rest of the house.

If I removed the MoCA, the satellites would fall back to wireless mesh, but throughput and latency would tank – that’s why I built the wired backhaul path.
Would it be possible for you to try one thing? Disable the WiFi on your Router. And then tell us if your wired network still works? Because I suspect that it won't work without the WiFi on the Router, or the Extenders powered on.
 
Status
Not open for further replies.
Back
Top Bottom