Some IT guy, IDK.
So, in my case, I had a modem router model by a company called SmartRG. Details aside, I pretty much instantly put it into bridged mode so it wouldn't participate in the IP routing. That modem did modem things only.
The connection went from provider phone line to SmartRG to my firewall.
I was weird and got a set of WAN IP addresses, so I put a router in front of everything to handle that, so the connection went from provider line, to modem, to router, to firewall.
It's not super relevant, but the router I was using was a Cisco 1911. This is a semi modular enterprise router. The modular part, which will be important later, is in the form of "WIC" modules, or "WAN Interface Card" modules. The 1911 has two.
Anyways, I managed to get a WIC that supported VDSL2 with all the options and configuration that my ISP used. Happened to be the ehwic-va-dsl-m. Long story short, this module would integrate with my router and act as a modem of sorts to "translate" to the provider line. When I implemented this, I basically threw out my SmartRG. The phone line went directly into my router. So the connection was from the provider line, into my router, then to my firewall.
So the modem was "deleted".
Another instance was for a fiber GPON line. The provider in this case, gave you a modem with a GPON connection, but they didn't really tell anyone that the GPON interface was just a plain old SFP transceiver. So I pulled the SFP, put it into the firewall and threw out the modem. The provider line went right into their module in my firewall. The modem was effectively "deleted"
The idea of a modem delete is to remove whatever standalone device the provider has converting their signal (DSL, cable, or fiber) into Ethernet, and effectively plug that into your gateway.
It's not always possible.
I'm currently looking for an option to do a modem delete for a local ISP that's switched to xgs-pon. They put out a modem router for it that has the transceiver built in, so there's no way to extract it and plug it into something else.
I'm hopeful I'll find a SFP+ module like I found for the GPON ISP in my area.
I dunno if they still offer it, but I found that Cisco's ICND1 was fairly neutral. They use examples from Cisco stuff, naturally, but the majority of the content is around learning and understanding how IP networks function. This is the first half of the CCNA study materials, and honestly, one of the best resources I had, and used, for learning how it all works.
There's probably a ton more out there now, but at the time when I was learning, it was all CBT Nuggets and pluralsight.... I believe a lot has hit YouTube in recent years.
Don't worry if the information is out of date, this stuff doesn't change. The updated stuff just has newer vendor specific information, and IPv6.
IPv6 isn't crazy different in how it behaves, but the mechanisms for local discovery, IP assignment, and whatnot, can vary quite extensively.
Good luck out there
Sorry this took me a bit to get to. Hello!
I'm hoping that not all of that is running on a single pi. I mean, it can, but you might hit limitations when everything is engaged with doing things. I just feel like, that's a lot for one raspberry Pi.....
Anyways, iptables are good to have a general grasp of, but they're generally GNU/Linux specific. There's other routing implementations that run on Linux, and hardware appliances generally have their own bespoke, vendor specific stuff. One project I'm aware of is free range routing. There's a lot more, but this is one that I know of. Using FRR, vs iptables, they're very different beasts. But you shouldn't need FRR, it's a monster in terms of memory use and designed to operate in ISP class networks. You don't need it. I'm just using it as an example of what is out there.
The best advice I can give about this is that learning the concepts behind routing is more valuable than any specific product. Knowing the difference between an RIB and FIB, and how to structure routes, priorities, costs, etc... All very important. Can you learn that with iptables? Sure, and probably more, since iptables can also function as a low end firewall.
The important thing is that you learn the meaning behind what you're doing in whatever routing platform you are working with.
I've worked with so many different ways of handling routing and firewall work that I get annoyed when vendors come up with dumb marketing terms that leak into the device user interface, for a very common routing, firewall, or VPN technology. I don't care whether I'm on a router or firewall that's custom and running open WRT, ddwrt, opnsense, or one from Cisco, Sonic wall, watchguard, Fortinet, Palo Alto, or any of the dozens of other vendors. A VPN is a VPN. IKE and IPsec don't change because it's vendor x or y. Don't start calling the IKE identifier something else.
.... Sorry, rant.
Anyways, I don't really see the vendor's interface as anything more than a code I have to convert into the industry standard protocol information that everyone uses. It's a filter by which that vendor portrays the same options that everything else has. Some have quirks. Some are more straight forward. But they all have the same options in the end. Allow the traffic or don't, do it by port and protocol or by IP. Apply content filters or don't, use Ethernet, DHCP, pppoe, or something else like ATM or ipx/SPX for signaling. Who cares.
If you understand the concepts, the skills are transferable, no matter what platform you end up using, you'll know what needs to be done, you'll just be stuck figuring out how you do it on this platform.
You are very welcome my friend.
An unmanned switch? Nothing concrete.
A managed switch can give you telemetry, like port utilisation, and you can observe how much upstream is in use.
My concern is that you have a 1g switch connecting 2.5g capable devices to a 2.5g capable upstream network. That's a bottleneck that I would want to eliminate. I know serve the home has a roundup of 2.5g switches that might be useful for you. I'm not saying you should switch to managed either, you may be well served by an unmanaged switch, and it will save you money. The telemetry for managed switches usually requires a system to collect and store it, usually an NMS, or network monitoring/management system.
Some manufacturers build NMS style telemetry into their products, ubiquiti does this to a limited extent. Other vendors may be better or have nothing at all. Something to think about when picking gear, if you like that sort of visibility. NMS usually operates over SNMP, which can become a whole thing; but for monitoring, setting up read only SNMP can be rather easy.
A word of caution. 10G and 2.5/5G were developed independently, and 10G came first. It was expensive which is why 2.5/5g Ethernet became a thing. Because of this checkered past, there's a lot of 10G equipment that will not support operating at 2.5 or 5gbps. So if you get a 10G switch, check if there's 2.5G, or 5G capability separately, or included on the 10G ports.
In my experience, most 10G ports are 1 or 10G, with nothing in between. Most 2.5G ports can't do 10G. So the best idea would be to have a switch with a couple of 10G for fast uplinks and some 2.5G connections for your devices. Unless you can find a unicorn of a switch that supports all speeds on all ports, a switch split between 2.5G and 10G ports is probably your best bet.
Good luck.
Well, I'm not opposed to it. If someone has an operational security issue that they want my take on, I'm happy to take that to DM.
The same promise, or lack thereof, for replies, will apply. Heh. I'm busy, so I can't spend all my time on Lemmy. I love you all, but Shaka six feet dude.
That's fair. I feel a little called out, rightly so.
What you want to do is look at the MoCA frequencies, which is ~450-1625mhz or so and see if your splitters include that range. If so, you're golden, if not, there's a good chance your MoCA signal will be attenuated by the splitter. Each splitter will cut the power by the number of connected branches, so 2 branches will be half power per branch, 4 will be a quarter. Etc. MoCA can handle some loss, but too much and it will fall over. There are splitters that you can buy that specifically include MoCA frequencies, some that don't, and they're will be some that specifically block it. The last type is good for separating MoCA segments, or at service entry points so you don't end up sharing your network with neighbors.
Each splitter will have a label that specifies what frequencies it's been tested with and that are validated to work. It should be printed on the splitter. If it's not, throw it out and buy something that's not in disrepair.
To clarify what's going on a bit, the coax is just an antenna line, with no antenna. It can handle many different frequencies of transmissions. Like with the radio in your car, you can "tune into" different radio stations. The other radio stations on air don't interfere with the one you're listening to and vice versa. It's the same idea with coax. Some frequencies are used to send cable TV, others are used for Internet (otherwise known as DOCSIS) and some are used for MoCA. All coax handling gear will support and be tested for some frequencies, and unless otherwise stated, anything outside of that range will be unknown. Most cable splitters support cable TV and DOCSIS frequencies primarily. There are different coax splitters for satellite, which uses all different frequencies, and there's others that support much broader frequency ranges. Some can connect a wide spectrum but are only validated for a small part of what they can carry.
Your mileage may vary, and it's really up to what you have and what the manufacturer did with the design of that specific splitter.
I'm sorry the answer isn't more straight forward.
No argument here. The earlier stuff is still very bandwidth constrained, some pieces are incapable of meeting line rate, like the UDM pro. It has 10G connections but the throughput of the unit is around 6Gbps. Still much faster than most people's Internet connections (who in their right mind has a 5+ Gbps Internet connection at their house?) but it's a limitation worth knowing before you buy.
Solid gear otherwise. I haven't seen how their end of life looks, so I can't really comment, but most companies just announce that they're no longer supporting a piece of gear and suggest a replacement. Called an EOL notice, or something similar. EOL being end of life. Usually includes a recommendation for an upgrade to something supported that's a similar class of device.
Time will tell on that one. I have a UDM pro in a network I manage so I'm waiting for that EOL notice.
Yeah, that can certainly happen. It really depends on how the router handles contention, it's overall capability and performance, and what loaf balancing algorithms, if any, have been implemented. QoS basically guarantees that some form of traffic management is happening. With it off, it's really just a guessing game whether something will work well or fall over, as you've discovered.
Have a great day.
I see what you're saying and this is a good inquiry. The reality is that most networks are what we call North/South traffic exclusive. In this context, we use "North" to describe towards the Internet, "South" to be from the Internet, and east/west to be LAN to LAN traffic.
Networks that are primarily or exclusively North South, your contention will always be your ISPs committed speed (the speed they're allowing you to use). So most of what's South of that is pretty trivial, as long as it can keep up with, or exceed the speed of the North connection.
That changes if you do any East/West traffic. Whether that's a home lab, a home server, or even just a NAS, or computer to computer file sharing.... Once that traffic is more than a trivial amount of the network traffic, then you see a lot of benefit from wired connections to your computers. The switch backplane can handle a lot more bandwidth than any individual port, and the only way you'll see that bandwidth is if some traffic is going somewhere other than your router, or the Internet.
To say most home networks are North/South heavy is obvious. Business networks frequently have servers and other LAN resources that are frequently utilized. So East/West traffic is usually non-trivial.
To spin an example, if your ISP is providing a 100mbps committed rate, and you gave full gigabit ethernet inside and at least 802.11ac wireless, with almost all traffic going to the Internet and back, you're going to see little difference between Wi-Fi and Ethernet. The only major change moving from Wi-Fi to Ethernet is that your ping time will be more consistent and lower overall. It won't be a huge change, something in the range of 10s of ms, but it's literally the only thing you'll notice a difference with.
Another example where it will make a big difference is if you have a NAS or home server, where you have files stored. Compared to a file storage service like drop box or Google drive. The LAN specific traffic will move at line rate, or the speed of whatever storage the data ultimately rests on, whichever is slower. In that context, the East/West traffic benefits greatly from Ethernet, and the full duplex connection between the two devices.
It's all subjective to how you are using your network. You've made a good point, so thanks for that. Have a good day.
Oh yes. You're taking about a VPN.
But that opens a whole can of worms. You could go with something more tried and true, like Ike/IPsec, if your routers have that option. Usually that's the way for firewalls, but it's a bit hit and miss for routers.
Or you can go with something a bit more modern, like tailscale, wireguard, or zero tier. But then you need some way to put that on your NAS. I'm partial to zero tier, but there's plenty of good options, even beyond what I've mentioned.
Researching this becomes a mine field without the right vocabulary, because having a "VPN" is such a broad definition that there's a lot of commercial VPN solutions, designed to give you operational security when browsing the Internet, which are completely useless at securing traffic between computers on different LANs over the Internet. Services like PIA, NordVPN, surfshark, proton VPN, Express VPN.... So many others. They'll secure your traffic to the Internet itself, not between private locations connected by the Internet.
I don't know what hardware you're specifically using as a router at each location or what works with what. I know ubiquiti has some VPN features in their gateway products, and that could make quick work of the problem. Just food for thought I guess.
Yes and no, usually the ISP router is also the modem, converting from either VDSL, DOCSIS, or some flavor of GPON, and most people don't have the knowledge or patience to figure out how to do a modem delete for their ISP.
Having the ISP put the modem in bridged mode usually nullifies the instability of it. Bridged mode turns the ISP modem router thing effectively into just a modem.
You can improve communication by removing it entirely, if you can sort out the modem delete, but unless there's a pretty clear demarcation between the line handling gear and the ISP router, you might be up a creek.
The other caveat is that with a modem delete, you won't get help from the ISP. You have to revert to their gear before they will troubleshoot your connection. To them, that modem router is their demarcation line, so it must be in the path somewhere, or they get pretty grumpy about it all.
But, if you have the skill and the aptitude to do it, you can cut ping times by quite a bit. On my VDSL line, when I did a modem delete, replacing whatever lowest bidder modem router my ISP gave me with a Cisco 1911, and a VDSL2 line card, I got my, already quite reasonable ping times (somewhere around 10ms? Or so, to the local datacenter), down to about 4ms. Over VDSL2. That's crazy good. Nearly FTTH speed.
I did something similar when I was on FTTH for a bit, I got a fiber ont SFP transceiver that could be reconfigured, programmed it with the MAC and other critical information from my ISPs device, and used that in my own router. Which also cut ping times from ~5ms? To ~2ms maybe? So, yeah. There's benefit to it, but it requires specialized expertise most of the time. If you have an easy path to a modem delete with your ISP, then it's a no brainer.
Disabling the routing in your ISPs combo router/modem, is essential for any mid sized household that values their performance.
I suppose, but I usually don't check my messages on Lemmy very often, I look at my comment replies, but not my messages. I should have Matrix connected, if you use that... I have no idea if I set up Matrix right, or if I linked it correctly... I haven't looked at it since I did the setup.
I'm curious why you would want to DM rather than discuss it publicly where the information might help others?
You don't need to justify yourself to me. That question is intended for you to answer it for yourself, and if that doesn't change that you would rather do the discussion over DM, then I won't hold that against you.
Be well.
Good luck.
Basic configurations shouldn't be too stressful. When you get into large segmented networks that use routing protocols, then you'll have some headaches. I think you'll be fine.
Hallelujah.
Preach it!
Sorry, I'm married.
:p
My wife doesn't think it's sexy, she usually just falls asleep whenever I get into a topic I'm passionate about. Oh well.
Well, SNMP is pretty great. There's three variants in common use, v1, v2c, and v3. I'm a big fan of v2c, because I usually run SNMP over my trusted LAN, and read only, so there's little or no risks there. I just want all the information! Haha I would consider v3 if I was doing any kind of read/write work with SNMP. To date, I've never had to, so I just don't bother with it. It's a bear to set up compared to v2c.
ARP is on layer 2/3 of both the OSI model and the 5 layer TCP model. The OSI model has never been implemented in a production network, it's just a reference to visualize how things operate. TCP/IP and ipv6 generally stop around the OSI model layer 5. 6/7 is handled by the software, in theory, and layer 8 is where you get the most problems, by far.
ARP is considered to be both layer 2 and layer 3, sometimes noted as layer 2.5, because it's bridging layer 2, which is Ethernet Mac addressing in most networks, and layer 3 which is IP addressing. It almost entirely operates on layer 2 however.
There's a new, revised version of the TCP model that I'm aware of that blurs the line between what is known as layer 1 and 2 in the OSI model, kind of bundling them together. It's weird, but something I've seen around.
The question I never got an answer to was about Ethernet. I have searched the internet high and low and have yet to find a credible reference that indicates what the real answer is. There's a white paper but you have to pay to see it, I'm pretty sure the answer is in there, obfuscated by some fancy math algorithm.... The question is: how much voltage is used for Ethernet baseband signaling when PoE is not used? What constitutes a "high" signal, and what is a "low" signal? A lot of sources seem to point to 5v and 1v, but never have any references to back up the claim. There are other sites that provide different voltages for high and low too. 5/1 is just the most common that I've seen mentioned.
ISP provider doesn't matter. Put your ISP modem into bridged mode and get your own router.
ISPs usually don't buy good, or reliable stuff for their clients, they buy whatever gives them the marketing buzzwords and costs them the least. Usually, they're great at doing modem things, not so good at anything else. Bridged mode just limits them to just doing what they're good at.
Work Reform @lemmy.world Workers are not valuable
Lemmy411 - Don't know where to find what you're looking for? @lemmy.ca techsupport and homenetworking
homeassistant @lemmy.world offboard zwave
homelab @lemmy.ml SBC for homelab CEPH cluster?
The recording industry did.
Who pirates music anymore. Everyone has one of the streaming services for it, because they all have functionally all of the music. There's no exclusive releases on one platform or another.
Well, maybe there is, I haven't looked in a while. Maybe they're enshitifying that too.
Somehow the TV/movie shit heads can't figure the same thing out.