What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Want to move away from Asus routers, Ubiquiti? advice needed

after discovering this Unifi stuff

It's addictive. Single 3-in-1 gateway, one extra PoE switch eventually, few APs, few cameras. This is all you need. Reddit if full of UniFi "home lab" setup pictures, it's like a competition who is going to spend more money for no reason. Some run equipment similar to the one used for the chemical plant in Lawrence Systems video. 🧐

1745710488532.png
 
But then, 4 days later, the 6+ AP is $20 off.

If I remember correctly your gateway was UGC-Ultra. There is a new U7-Lite access point for $99. Dual-band, unlikely to exceed Gigabit on Wi-Fi, perhaps will be good fit for Gigabit gateway. What it may give you more - system integration, easy configuration changes with no reboots, SSID to VLAN in few clicks, better looks perhaps. If your Asus router in AP Mode is working fine though - no rush.
 
Thanks, yes that makes sense. Would that still be a thing if all the IoT stuff is on it’s own network? What kind of threats are we talking about from IoT devices? It would just be 2 or maybe 3 cameras max, and they would be wired. 👍
This depends on what kind of threats you're worried about and how far down the rabbit hole you want to go. AIUI the main concerns in this area are:
  • If your security cams connect via wifi, they can be disabled by a burglar who has a wifi jammer. Some say that's becoming a common tool for miscreants to carry.
  • OTOH, if your cams connect over wires, then anybody who can shimmy up to an outside camera and unplug it can plug in their own device and have access to your LAN.
  • On the third hand, if somebody has broken into your LAN some other way, they could gain access to your camera footage, or maybe attack the cams directly.
The point of putting cams on a separate VLAN is that it offers some protection against both of the latter threats: jacking into a camera feed doesn't give access to your whole LAN, nor can someone easily get access to the cameras from some other part of the LAN.

My take is that the average homeowner probably is wasting their time/money to worry about any of these scenarios. But if you've spent money on security cams in the first place, maybe you feel like worrying.
 
Last edited:
A matter of choice and specifications comparison. UCG-Fiber has better Gateway and Switch parts inside, better NVR options with SSD storage, separate AP allows better placement, etc. UDR7 on the other hand is cheaper, takes less space... perhaps better option for someone looking for a single AIO device in a smaller coverage area. In terms of software both are identical or very similar.
 
It's addictive. Single 3-in-1 gateway, one extra PoE switch eventually, few APs, few cameras. This is all you need. Reddit if full of UniFi "home lab" setup pictures, it's like a competition who is going to spend more money for no reason. Some run equipment similar to the one used for the chemical plant in Lawrence Systems video.
Indeed. I think you do get that with pretty much anything computer related, it always turns into a 'mine is bigger than yours' contest. Add in social media and that just fuels it. But, if it makes them happy...😂
 
Correction: Seems like UCG-Fiber does have a cooling fan inside, @user1234567890.

Performance tests and thermals information here:
I haven't heard anything so far, and I'm sat a few feet away from it. I think it's probably preferable to have a fan, especially if you never hear it. I haven't seen anyone do teardown of these kinds of things, I'd be interested to see what's inside.
 
This depends on what kind of threats you're worried about and how far down the rabbit hole you want to go. AIUI the main concerns in this area are:
  • If your security cams connect via wifi, they can be disabled by a burglar who has a wifi jammer. Some say that's becoming a common tool for miscreants to carry.
  • OTOH, if your cams connect over wires, then anybody who can shimmy up to an outside camera and unplug it can plug in their own device and have access to your LAN.
  • On the third hand, if somebody has broken into your LAN some other way, they could gain access to your camera footage, or maybe attack the cams directly.
The point of putting cams on a separate VLAN is that it offers some protection against both of the latter threats: jacking into a camera feed doesn't give access to your whole LAN, nor can someone easily get access to the cameras from some other part of the LAN.

My take is that the average homeowner probably is wasting their time/money to worry about any of these scenarios. But if you've spent money on security cams in the first place, maybe you feel like worrying.
There's quite a high crime rate where we live, so a visual deterrent is better than none, for sure. Always good to be secure, thanks for the info 👍
 
@cptnoblivious, seems like with the new per App/Category QoS presets in Network Application 9.1.120 our UGC-Ultra can do about 450Mbps WAN-LAN. Ubiquiti is warning about performance impact and this is what I see happening on our gateway model. Just sharing quick test results in case you are interested in QoS. @user1234567890, your UCG-Fiber gateway will go faster.
 
@cptnoblivious, seems like with the new per App/Category QoS presets in Network Application 9.1.120 our UGC-Ultra can do about 450Mbps WAN-LAN. Ubiquiti is warning about performance impact and this is what I see happening on our gateway model. Just sharing quick test results in case you are interested in QoS. @user1234567890, your UCG-Fiber gateway will go faster.
Thanks, that's still way faster than my internet connection (sadly). But I appreciate the heads-up :)

I enabled QoS right now as we WFH but only for Teams and Zoom. If it's a nuisance I'll just turn QoS off again.
 
If QoS is really needed you can experiment with per App/Category QoS in Routing/QoS section (which perhaps uses DPI for traffic identification), but also with Smart Queues in Internet/WAN section (which applies FQ-CoDeL AQM).

Run some more tests, it's around 450Mbps with IDS + QoS, around 550Mbps with QoS only and close to Gigabit with IDS only.
 
Last edited:
If QoS is really needed you can experiment with per App/Category QoS in Routing/QoS section (which perhaps uses DPI for traffic identification), but also with Smart Queues in Internet/WAN section (which applies FQ-CoDeL AQM).

Run some more tests, it's around 450Mbps with IDS + QoS, around 550Mbps with QoS only and close to Gigabit with IDS only.
Was that for me?

If so, not needed, you misunderstood. My internet connection is < 450 Mbps. So speed reduction is not an issue or concern :)
 

Similar threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top