To this day i have all of them connected to the regular 2.4Ghz network and i really didn't thought about it.It's up to you. Many folks move whatever IoT allows to isolated Guest Network.
Moving your smart home devices to a separate guest SSID for better security can be helpful.Hello
I have 11 Smart Bulbs, 3 Wifi Cameras and 3 Alexa Echo devices and I'm using Asus AX86U router.
Is it worth it moving them all to a seperate guest ssid for better "security" or it ain't worth the hassle?
My Azus RT-AX Routers allow for 3 x 2.4Gig Guest Networks so why not allow for a dedicated iOT network for added security? Selecting Guest Network-1 and disabling Intranet access, this gives it it’s own IP address range also. I don’t trust Chinese or Amazon products to necessarily “behave” themselves.
To this day i have all of them connected to the regular 2.4Ghz network and i really didn't thought about it.
I don't mind resetting them all and move them ro a guest network.
Is 1 separate guest ssid is sufficient for them all?
It is also a good way to cut down on a lot of the "chatter" that some of these devices put out (and ironically, often have trouble dealing with/processing from other devices on the LAN).
The "chatter" still happens on the Guest SSID as it's a shared radio with the Primary SSID...
The VLAN might cut down IP traffic, but not really, as it's still going across the same Radio to Switch connection...
VLAN doesn't change things there, just moves the traffic around...
It's well known that additional SSID's create and consume management airtime that is not available for client data traffic,
and those management frames are transmitted at the lowest available data rates (1Mbps for legacy DSSS (802.11b mode) and 6Mbps for OFDM which is G/N/AC/AX.
Reducing "chatter" with a second guest SSID is absolutely an invalid statement.
The guest SSID creates a new VIF, with the associated AID management structure, which consumes overhead for each and every SSID that is assigned to the same PHY layer.
Guest SSID does not magically double the number of frames over time - that is constant, so you have to shove everything into the same PHY for Tx/Rx between the AP and the client stations.
It's well known that additional SSID's create and consume management airtime that is not available for client data traffic, and those management frames are transmitted at the lowest available data rates (1Mbps for legacy DSSS (802.11b mode) and 6Mbps for OFDM which is G/N/AC/AX..
Go back and review 802.11-2016, which is current up to 11ac (which is good enough for our discussion here).
I've been developing 802.11 equipment for over 20 years now, and to be completely honest, I find the whole concept of "reducing chatter" boneheaded logic...
@drinkingbird and @rborth - you both should know better here..
drinkingbird: You clearly have done homework. Me, I'm still learning. My ioT guest network seems fine SANS the 2015 SONY blue ray, no longer supported as in EOL and streaming services suspended, and connected to a guest network. I also have two no Intranet guest networks. I had to connect the Sony on the 2.4Gig guest so the only remaining working Ap, Netflix works. But I must say the Amazon Echo devices have a problem with reliability and I don't think it's the network. Can I say POS devices here? Not Point of Sale, use your imagination.
People that I allow on the guest networks are semi trusted friend & family. Should one of those need access to local network resources and I really trust them, they get access to the primary WiFi.
I also came from the time when WiFi was new and toped out at 11 Mbps when wired was 10 AND before. We had RJ45 ports everywhere that eventually became 1 Gig ports due to forward thinking on the wire selected. The mantra then was to secure the attached devices on the wire. This I do today as another layer of protection. Call me old but despite the claims I still think wire is the way to go if you can pull it off and keep most of the critical traffic there.
Sorry for the edit, math is my first language not English. ;>)
IMO, Agreed the chatter to the WAN does not decrease. The goal is to decrease the chatter between the IoT devices via the WAN and the unnecessary chatter to other "real" locally connected clients visa the LAN. Then the discussion about how much we want our AI iot devices "phoneing home". For example, my robot vacuums keep my wife happy but they have a very good floor plan of all of my house. And Alex hears pretty much what ever we say when it's not locked up. Perhaps a topic for another post?
Check.
Actually, on WAPs with decent firmware you can choose the beacon frame transmission rate. Setting it to the max your clients will tolerate saves airtime and helps keep obsolete riffraff off your network
Fully agreed though that adding SSIDs adds overhead without adding performance. Use as few as you can given whatever your security concerns are.
Good to look back and refresh those old DRAM brain cells to avoid losing the data.The people that I know that have Echos they seem to be pretty reliable. But they are some of the ones creating a lot of the chatter with MDNS or whatever proprietary version they're using. Would not surprise me if having several of those along with other IOT stuff could start causing problems. But my mom's house has 5 echo dots (1 gen 2 and 4 gen 3) along with their discontinued landline interface (echo connect) so she can say "call 911" from anywhere in the house (lives alone). Running off a cheap netgear AC router and they've been solid for a few years. She actually uses them for quite a bit now (contrary to what she would have claimed in the beginning).
I started with Intel's first 802.11b and was running off 10M hubs before that as well. The first one I toyed with was apple's network that ran off RJ11 phone cords, then ARCNET that ran off a shared run of BNC with Tees along the way and terminators on each end. We've come a long way from those days.
Though I doubt you were able to upgrade 10M to 1 gig without replacing the wiring. Cat 5e didn't exist when it was 10M only Same keystone jacks could typically be used though, technically not up to spec but they worked. Most offices were typically wired with only 2 pair to each desk too, that was a major undertaking when they wanted to go gig. Many just waited until the inevitable move to a new floor/building to do that.
Good to look back and refresh those old DRAM brain cells to avoid losing the data.
Our first network was an IBM AS400 running twinax. And like you, thinnet tying select PCs together. Later added 10BT hubs that had provisions for the thinnet "backbone".
We upgraded buildings around 2000 just before the dawn of CAT5e with 100BT Hubs at the time with one switch tying the hubs together. Luckily the CAT5 cable we bought, with the lengths we had and the termination we used worked at 1000BT. I think it was Hitachi cable and obviously slightly ahead of their time in the crosstalk department. Subsequent wiring was done with CAT5e then Cat6 as available.
I was gifted an echo show 8 which I use to check the weather and my flash news briefings in the morning. Some morning it takes it time to respond, some mornings I need to do a reboot, often when this happens the Alex AP on my Android tablet works in the same location. Should be the same signal strength but connected to a different SSID.
Speaking of Chatter, echo show devices, unless this “feature” is disabled, Provide Internet connection to the Public Amazon Sidewalk Bluetooth Low Energy (BLE) Mesh network. I of course immediately disabled this. This Amazon “surprise” was the impetus for me to isolation iOT devices as much as possible.
https://www.inverse.com/input/guides/what-is-amazons-sidewalk-network-how-to-disable-it
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!