Thank you! I clearly need to learn more about the other capabilities of firewalls. Used Edge Router Lites are fantastic little boxes. VLANs accomplish vertical network segmentation by default, but I just find this cumbersome in this scenario and prefer the flexibility of a firewall with multiple internal interfaces. You can then create rules to allow certain internal devices to see each other across the interfaces etc. You then split devices internally according to the internal interface. You throw the IPs of the specific devices in a group and then block that group from the WAN interface. Just a Firewall with flexible policies and multiple internal ports. Netgear RAX20 looks OK but apparently needs an account to use and it's unclear if it supports managed switching functions. I've now read so much that I've hit a point of decision fatigue and am stuck. I'd like to avoid anything supporting WPS or remote management or anything with subscription services or anything with a fan. Built in wifi6 with WPA3 support would be nice, but wifi is not strictly required. I have time to learn a new thing, but intermittently have periods where I have no time for maintenance or troubleshooting so would rather avoid anything CLI heavy. ![]() I particularly want VLAN so I can isolate devices that only need internet access from those that need whole network access - although any switching method that isolates specified physical ports would be fine. ![]() ![]() ![]() It has performance issues intermittently, and doesn't support VLAN. I'm currently using a generic (ISP provided) wifi and router in one.
0 Comments
Leave a Reply. |