Network redesign: Good managed 24 port PoE switch?

Soldato
Joined
18 Aug 2007
Posts
9,867
Location
Liverpool
My home network currently looks a bit like this:

2PW3OOZ.png


As you can see I have an x86 router running Arch Linux. This runs AdGuard Home (network wide adblocking plus DNS over HTTPS and DNS over TLS server), with DHCP and Shorewall. I have two physical unmanaged switches, one for each local network/subnet. There's an 8 port Netgear ProSafe GS108 for LAN devices, and a TP-Link TL-SG1008P 8 port PoE switch powering the cameras. I've got *just* enough ports (for now).

The diagram is simplified/flattened, and doesn't show the network upstairs. This runs from a single solid-core external grade cat5e trunk line from the main switch downstairs, up the brickwork and back into a wall box in my room, attached to another TP-Link SG108 basic unmanaged gigabit switch. This serves my MacBook Pro, TiVO and FireTV etc.

I keep the CCTV (which is barred by the router's firewall from accessing the Internet) and NAS segregated from my local trusted devices, hence the separate subnet. If the NAS is ever compromised then at least my 'real' devices aren't able to be reached. It does run a separate firewall and IP jailing of its own, however, with random usernames and SSH keys for access, to be safe. Everything (Docker configs, Diskstation config, Unifi configs etc) backs up by rsync to Git overnight.

Our visitors connect to the wireless AP's guest network by scanning a QR code (handy to stick on a wall/door during gatherings), and get segregated from the 'real' network and into a local jail network by the AP itself. There's no VLAN as such.

I've been looking to simplify things. Rather than shove everything back on one network and lose the security advantage of segregating the NAS, I was thinking of getting a managed PoE switch and running VLANs. That way I can offload the whole 'two physical subnets and two switches' rigmarole onto a single managed switch with separate VLANs, and have one router and one switch in a nice tidy cabinet/rack on the wall. At the moment there's just a pile of gear in a corner - modem, Dell Optiplex 7020 router, two switches, NAS...

Since I already run the controller for the UAP-AC-PRO on the NAS I figured a Ubiquiti switch would fit in easily, plus it's fanless which is a bonus (networking stuff's in the corner of the living room). I hear the reliability isn't that good though and they're literally twice the price of something similar from Netgear, Cisco etc. Are there any recommendations for something solid, that isn't a pain to configure and manage? As I said Ubiquiti would have been nice but I begrudge paying double for something just because it's white and trendy.
 
Last edited:
I can only talk about what im running, which is Dlink - I have a number of switches dotted about the house, all managed.

I have a 'core' 24 port POE switch, and from this, I have a switch in the garage, a switch in the office, a switch in the lounge.

They have been set and forget - 6 vlans tagged across them all - Management, Production Lan, Guest Lan, IOT Lan, CCTV Lan, SKYQ Lan
Main switch is a DGS-1210-24P
Remote switches 8 port are DGS-1100-08P
and I have a couple of small 5 port switches behind TVs on the wall that have a sky box, Ras Pi and ethernet for the TV, these are powered by POE which is brilliant, they are DGS-1100-05PD

The NAS (UnRaid) is sitting in multiple Vlans too - Management for there Unifi controller, and production for Plex. All vlans firewalls with default deny using Unifi USG.
 
The Unifi Gen2 24-port switch isn't fanless. The Gen1 is definitely not fanless. Its vacuum-cleaner noisy! If you are already running the controller a Unifi is by far the neatest way to implement VLANs though.

That said, I've never really seen the advantage of VLANs in a home network. Certainly not £350 worth of value.
 
Last edited:
Thanks guys. I was actually referring to the 16 port Ubiquiti, which I'd read was fanless(?) - then decided I should go 24 port, changed the OP and forgot to omit the fanless part. :p I've been looking at the Netgear GS724TP-200EUS and TP-Link TL-SG1218MPE, but I don't know how good (or not) they are. For around £150 they're worth a punt? If it wasn't for the CCTV I wouldn't even need a managed switch I don't think. Since I have an x86/Linux router I can set VLAN tags directly in iproute2, but while the Synology NAS is able to accept a VLAN tag in its config, the cameras can't - so they'd need port based VLANs on a switch. :(

That said, I've never really seen the advantage of VLANs in a home network. Certainly not £350 worth of value.

Have you any better ideas (aside from the current physical subnet segregation) to keep the CCTV and servers isolated from the LAN in case of a breach? I figured VLANs were basically made for this, but I'm always willing to learn.
 
All the Ubiquiti PoE switches over 8-port have fans. The ones on the 16-port never kick in in the real world though. The Gen2 switches have a horizontal blower fan that is extremely quiet.
 
All the Ubiquiti PoE switches over 8-port have fans. The ones on the 16-port never kick in in the real world though. The Gen2 switches have a horizontal blower fan that is extremely quiet.
What's the power consumption like on the Unifi 24/48 port POE switches when you're only using <10 of the ports to supply power?
 
What's the power consumption like on the Unifi 24/48 port POE switches when you're only using <10 of the ports to supply power?

I’ve never actually measured it because I tend to use a US-24 or a US-48 and one or two US-16-150W for the PoE. On a really big house you can have one switch just running the in-wall Access Points and another running the cameras although I’ve started using the QNAP QGD-1600P Guardian Running RouterOS for the Router/Firewall and cameras recently.

I would imagine you’d be looking at the same power for a US-24 or US-48 (25-60W) plus about 10-25W per powered port based on 50-80% efficiency.
 
I’ve never actually measured it because I tend to use a US-24 or a US-48 and one or two US-16-150W for the PoE. On a really big house you can have one switch just running the in-wall Access Points and another running the cameras although I’ve started using the QNAP QGD-1600P Guardian Running RouterOS for the Router/Firewall and cameras recently.

I would imagine you’d be looking at the same power for a US-24 or US-48 (150-200W) plus about 10-25W per powered port based on 50-80% efficiency.
I've got a 24 Port Zyxel GS1920 POE switch that is about 50w or so without loaded ports. I've been considering swapping to a Unifi one long term just for the extra management convenience of it all being in one space.

I've got a fairly big house as well (12 rooms over 3 floors), so I'm almost maxed out on my 24 port switch and that's only with half the rooms covered, 5 POE cameras, 4 POE AP AC Pros, and a Cloud Key.

Though I can't see me really needing any more than 24 POE ports, so you're probably right about having 2 switches.
 
Thanks guys. I was actually referring to the 16 port Ubiquiti, which I'd read was fanless(?) - then decided I should go 24 port, changed the OP and forgot to omit the fanless part. :p I've been looking at the Netgear GS724TP-200EUS and TP-Link TL-SG1218MPE, but I don't know how good (or not) they are. For around £150 they're worth a punt? If it wasn't for the CCTV I wouldn't even need a managed switch I don't think. Since I have an x86/Linux router I can set VLAN tags directly in iproute2, but while the Synology NAS is able to accept a VLAN tag in its config, the cameras can't - so they'd need port based VLANs on a switch. :(



Have you any better ideas (aside from the current physical subnet segregation) to keep the CCTV and servers isolated from the LAN in case of a breach? I figured VLANs were basically made for this, but I'm always willing to learn.

From your diagram it doesn't look like you need VLANs on the switches because the traffic is split at the router anyway, but you could do an access list denying traffic from your home LAN accessing the DMZ.
 
From your diagram it doesn't look like you need VLANs on the switches because the traffic is split at the router anyway, but you could do an access list denying traffic from your home LAN accessing the DMZ.

It's exactly the two physical subnets I'm trying to get shut of, so I can go back to a smaller lower powered router with two physical ports and one switch instead of two. At present the two subnets are set up in shorewall:

Code:
###############################################################################
?FORMAT 2
###############################################################################
#ZONE    INTERFACE    OPTIONS
net        NET_IF        tcpflags,dhcp,nosmurfs,routefilter,logmartians,physical=eno1
loc        LOC_IF        tcpflags,dhcp,routefilter,routeback,physical=enp3s0f0
dmz        DMZ_IF        tcpflags,dhcp,routefilter,routeback,physical=enp3s0f1
wg        wg0            optional,tcpflags,dhcp,routefilter,nosmurfs

and the policy is:

Code:
###############################################################################
#SOURCE    DEST        POLICY        LOGLEVEL    RATE    CONNLIMIT

$FW    net        ACCEPT
$FW    loc        ACCEPT
$FW    dmz        ACCEPT

loc    net        ACCEPT
loc    $FW        ACCEPT
loc    dmz        ACCEPT

dmz    net        ACCEPT
dmz    $FW        DROP
dmz    loc        DROP

net    all        DROP        info

# THE FOLLOWING POLICY MUST BE LAST
all    all        REJECT        info

Which is fine, but I want to get back to a single LAN port and managed switch if possible.
 
Back
Top Bottom