Welcome to today’s daily kōrero!

Anyone can make the thread, first in first served. If you are here on a day and there’s no daily thread, feel free to create it!

Anyway, it’s just a chance to talk about your day, what you have planned, what you have done, etc.

So, how’s it going?

  • @DaveOPMA
    link
    1
    edit-2
    6 months ago

    Current setup:

    • Desktop tower attached to TV
    • Old Raspberry Pi for Pi Hole
    • Newish Raspberry Pi for Home Assistant
    • Old laptop as server for self hosting other stuff
    • Mesh wifi network with two access points connected over ethernet

    This is just the stuff I’d like over ethernet. Currently everything is together in the TV cabinet (except one of the mesh access points) but probably ideally the desktop stays with the TV and the rest are parked somewhere more out of sight.

    In your other comment you also mentioned cameras, we currently have none but I like the look of that setup where it messages you that a car just pulled into your driveway or a person is at your door, etc. Frigate stuff. So it would be good to future proof for that sort of thing too!

    Edit: Oh one thing to add, I have a spare ISP router. Can it be used as a switch?

    • @TagMeInSkipIGotThis
      link
      3
      edit-2
      6 months ago

      Re the ISP router; yes sometimes they can be configured to just act as a switch, but I wouldn’t recommend it - can be a complete PITA to setup.

      So looking at your current setup, you need 7-8 ports (one as backhaul to your router, possibly 1 extra for the TV); and for future growth you might need 1-4 more POE based ports for cameras. I’d recommend POE for Cameras & Access Points as it just makes installing them a hell of a lot easier.

      You also don’t need any network segmentation by the sounds of things, everything can sit & talk together. What is your current router / internet gateway?

      Just editing to add that Frigate is exactly what I use; and I love it apart from its integration with Home Assistant for notifications which i’ve struggled to break free from.

      • @DaveOPMA
        link
        16 months ago

        You also don’t need any network segmentation by the sounds of things, everything can sit & talk together.

        Currently. However, I have stuff like Nextcloud and Jellyfin that I may want to expose publicly at some point (currently using Tailscale). If I do that and also have cameras on the same network that starts to sound like a bad idea. Maybe segregating the network is a good idea?

        What is your current router / internet gateway?

        It’s an ISP Huawei router. This is then plugged into a Ubiquiti Amplifi mesh base station, and then other things plus into either the router of the base station. The router and mesh setup have a bridged network so the router is the DCHP server for both (if I understand it correctly).

        Just editing to add that Frigate is exactly what I use; and I love it apart from its integration with Home Assistant for notifications which I’ve struggled to break free from.

        Do you know of any tutorials that tell you what to buy and how to set it up?

        • @TagMeInSkipIGotThis
          link
          26 months ago

          Ah cool - I basically access my home services in a similar way to you, I prefer to use the VPN as I don’t trust my knowledge to secure things sufficiently if I was actually making them exposed.

          I’d guess your Huawei box has 4 LAN ports, one of which is connected to the Amplifi base station, and given that’s your wifi I don’t think there’s any need to worry about POE for the APs for now; that also reduces the ports you need down to 5-6 as well. The simplest thing to do for now is to just connect a switch into that and run with 1 VLAN until you need more.

          Bang for buck, I like UniFi gear; its not fully featured for enterprise or business but does most of what you’d need. And there’s not a big difference between the 8 & 16 port options for the Lite models: https://www.pbtech.co.nz/search?sf=unifi+lite+switch&search_type= You’d just need to run the UniFi Network application on something in order to configure it.

          Alternatively you can go for something even dumber, which has the advantage of it being even cheaper: https://www.pbtech.co.nz/category/networking/switches?fs=9326997

          The frigate documentation is pretty good, even has a recommended hardware guide: https://docs.frigate.video/

          • @DaveOPMA
            link
            16 months ago

            Thanks! TBH I was expecting a switch to be kinda like an adapter or splitter, to find they were hundreds of dollars was a bit of a shock. What’s the (practical) difference between say this $70 switch and this $300 one? What am I getting for the extra $230, just PoE?

            • @TagMeInSkipIGotThis
              link
              2
              edit-2
              6 months ago

              PoE adds a bunch to the cost, on pretty much any type of switch at any level. On some Enterprise gear for a 48 port switch it can sometimes be another $1k. Sometimes it’ll come down to how many ports provide power, and what PoE standards they support. The newer, higher voltage standards typically will cost more. But especially in Enterprise, PoE gives huge flexibility, mostly for Wireless Access Points these days, but used to be that every desk would have a phone powered from the switch as well.

              Anywho, other than that; there really isn’t a massive difference between the two. Both will need something running the UniFi Network server for initial setup and management of them. It’d be an interesting experiment to see if they just worked without it though. Their management IP is usually a static in the 192.168.1.0/24 network and they default to using VLAN 1 for everything unless otherwise configured.

              Alternatively you could meet in the middle and go with the Edge series from Ubiquiti, eg: https://www.pbtech.co.nz/product/SWHUBI31306/Ubiquiti-EdgeSwitch-XP-ES-5XP-5-Port-Gigabit-Manag

              These don’t require UniFi Network, you just log onto a web GUI to configure them which can be limited to only the MGMT port, and this particular model also does PoE, though probably only the older standard, not PoE+. I have one of them (the older version called ToughSwitch) and its been great. I’m pretty tempted to swap it for one of those Flex Mini’s though - as that way I can manage it from my UniFi setup rather than having to do it manually.

              Actually just an edit to clarify the adapter/splitter… Back in the day you could buy a Hub, that’s closer to what I would call an adapter/splitter. The way they work is it effectively just turns one port into x ports, they’re a very dumb usually completely unconfigured device. But on a hub, all ports share the same collision domain so overall performance is weakened especially if you have a lot of devices connected to hubs.

              In a switch each port is its own separate connection, and it’ll hold its own MAC address table to know how to get to things at layer 2. The difference is a hub is a bit like a party line (back in the analog days) where you could end up having one device talking over another. Whereas with a switch, every device has their own private line back to the cabinet.

              • @TagMeInSkipIGotThis
                link
                2
                edit-2
                6 months ago

                Replying to myself now…

                Eg this thing - i’d be very surprised if it isn’t actually a Hub, rather than a switch: https://www.pbtech.co.nz/product/SWHMES11050/Mercusys-MS105G-5-Port-Gigabit-Desktop-Switch

                And PBTech have a variety of others: https://www.pbtech.co.nz/category/networking/switches

                I’ve seen some people run the Netgear / TPLink stuff - but they’re not things i’d be confident in recommending. Cheap though - just steer clear of anything that’s described as an “Unmanaged switch”, its probably not much of a switch - ie it’ll be single VLAN only, no trunking etc. Like basically a hub, but maybe with separate collision domain & its own MAC table.

                • @DaveOPMA
                  link
                  16 months ago

                  just steer clear of anything that’s described as an “Unmanaged switch”, its probably not much of a switch - ie it’ll be single VLAN only, no trunking etc. Like basically a hub, but maybe with separate collision domain & its own MAC table.

                  Haha ok, the one I linked is a no then. I have no idea what half those words mean so it’s a bit intimidating thinking about having to set it up!

                  • @TagMeInSkipIGotThis
                    link
                    26 months ago

                    If you’re confident enough to setup stuff like Frigate then working through the basic management stuff on something like the EdgeSwitch wouldn’t be a stretch. The GUI is very friendly, it even puts cables in for the ports that have something plugged in:

              • @DaveOPMA
                link
                16 months ago

                I’m thinking I might go without PoE and just meet my current need, then add a PoE switch to support cameras if or when I get them.

                I’ve been reading a bit on managed vs unmanaged switches, and it sounds like unmanaged switches are like managed switches but you just plug in your stuff and it works. There are no settings, but also there is no need to set it up. If I’m just out to allow more devices to join the network via ethernet, would something like this be suitable? I’m specifically doing it to improve the speed vs wifi so I don’t want to make it worse 😆