elmedico27
New Around Here
Hi all,
Been lurking for a while and finally created an account to ask this question, which has probably been asked and answered but I haven't really found anything specific to my situation while searching around.
In a general sense, I'm wondering what is the best way to isolate all my IoT devices from my trusted PCs/phones/etc. I have both wireless and wired clients in both the trusted group and the IoT group (e.g. wired SmartThings hub, wireless thermostats). I've come up with several ideas using the equipment I have, but I'm fairly new to VLANs and subnets and all that, so forgive me if my questions relay a misunderstanding.
I'm running an ASUS RT-AC1900P (rebadged 68U) as my main router on the stock firmware; I've run Merlin before and can put it back on the router as needed (only got rid of it to do AiMesh, which I've since abandoned). I also have a TP-Link TL-SG108e switch that will do VLAN and other basic managed tasks. In addition, I have another 68U plus various other older Linksys routers, and an unmanaged switch I can use for this.
Idea #1: run two VLANs on the switch, and somehow attach one to a guest wireless network (IoT) and the other to a non-guest wireless network (trusted) on the ASUS. If I did this--let's say switch ports 1-4 are VLAN 2 and switch ports 5-8 are VLAN 3--would I need to run two cables from the switch to the router? Like, VLAN 2 into port 1 on the router and VLAN 3 into port 4, which is itself attached to the guest network (as in this thread)?
In my head, this looks like:
Idea #2: run two VLANs on the switch, both going untagged up a single cable to the ASUS router for internet, but throw an old wireless router into one of the IoT VLAN's ports as an AP and have all the IoT wireless devices connect to that rather than a guest network on the ASUS. This seems simpler to configure but I'm running extra equipment. See the example 1 picture here but imagine an AP hanging off the side of group B.
In my head, this looks like:
Idea #3: go with a Double NAT config and place one router behind the other, with IoT stuff on the internet facing router and trusted clients on the other, and any switches can sit there dumb and unmanaged on their respective routers without any VLAN trickery.
In my head, this looks like:
Idea #4: ??? Other suggestions?
Given the choice between ease of configuration/setup and reducing clutter of network equipment, I'm leaning towards the easy setup (#2?) but a good balance would be appreciated too. Is #1 possible and easier than I think? Would #3 destroy my bandwidth? Thoughts? Snarky criticisms? I'll take it all! Thank you!
Been lurking for a while and finally created an account to ask this question, which has probably been asked and answered but I haven't really found anything specific to my situation while searching around.
In a general sense, I'm wondering what is the best way to isolate all my IoT devices from my trusted PCs/phones/etc. I have both wireless and wired clients in both the trusted group and the IoT group (e.g. wired SmartThings hub, wireless thermostats). I've come up with several ideas using the equipment I have, but I'm fairly new to VLANs and subnets and all that, so forgive me if my questions relay a misunderstanding.
I'm running an ASUS RT-AC1900P (rebadged 68U) as my main router on the stock firmware; I've run Merlin before and can put it back on the router as needed (only got rid of it to do AiMesh, which I've since abandoned). I also have a TP-Link TL-SG108e switch that will do VLAN and other basic managed tasks. In addition, I have another 68U plus various other older Linksys routers, and an unmanaged switch I can use for this.
Idea #1: run two VLANs on the switch, and somehow attach one to a guest wireless network (IoT) and the other to a non-guest wireless network (trusted) on the ASUS. If I did this--let's say switch ports 1-4 are VLAN 2 and switch ports 5-8 are VLAN 3--would I need to run two cables from the switch to the router? Like, VLAN 2 into port 1 on the router and VLAN 3 into port 4, which is itself attached to the guest network (as in this thread)?
In my head, this looks like:
Code:
ISP <---> router normal SSID <--(port 1)--> switch (VLAN 2, ports 1-4) <---> trusted wired clients
router guest SSID <--(port 4)--> switch (VLAN 3, ports 5-8) <---> IoT wired clients
Idea #2: run two VLANs on the switch, both going untagged up a single cable to the ASUS router for internet, but throw an old wireless router into one of the IoT VLAN's ports as an AP and have all the IoT wireless devices connect to that rather than a guest network on the ASUS. This seems simpler to configure but I'm running extra equipment. See the example 1 picture here but imagine an AP hanging off the side of group B.
In my head, this looks like:
Code:
ISP <---> router <---> switch (VLAN 2, ports 1-4) <---> trusted wired clients
(VLAN 3, ports 5-7) <---> IoT wired clients
(VLAN 3, port 8) <------> old router as AP for IoT wireless
Idea #3: go with a Double NAT config and place one router behind the other, with IoT stuff on the internet facing router and trusted clients on the other, and any switches can sit there dumb and unmanaged on their respective routers without any VLAN trickery.
In my head, this looks like:
Code:
ISP <---> RT-AC1900P <-------> RT-AC68U
\ \
\___IoT \___trusted
Idea #4: ??? Other suggestions?
Given the choice between ease of configuration/setup and reducing clutter of network equipment, I'm leaning towards the easy setup (#2?) but a good balance would be appreciated too. Is #1 possible and easier than I think? Would #3 destroy my bandwidth? Thoughts? Snarky criticisms? I'll take it all! Thank you!