Basic Motherboard/NIC Question
-
You only really need the two nics in your case. WAN and LAN.. Uplink your LAN port to a switch and you're golden.
-
The part I suspect that is tripping you up is the fact that most home routers (Linksys, Netgear, etc.) have 1 WAN port plus 4-8 LAN ports on the back, correct? If so, what those actually have is a single, internal LAN port with a switch behind it which gives you multiple ports to work with.
What you really want is a network switch. Make sure you get one that is Gigabit. For reasons I don't understand, it's still possible to buy 10/100 gear…
-
Thanks roccor and Jason. I appreciate it.
Jason - You're right. I thought I needed to have a port for each device so I bought 4 NICs for my last build.
As far as allowing some devices to access the Internet and restricting others, is that where VLANs comes in?
Also, if there are any good books I can use to learn more, definitely let me know.
-
I thought I needed to have a port for each device so I bought 4 NICs for my last build.
Nothing wrong with that ether—one box fewer to take care of.
-
Thanks roccor and Jason. I appreciate it.
Jason - You're right. I thought I needed to have a port for each device so I bought 4 NICs for my last build.
As far as allowing some devices to access the Internet and restricting others, is that where VLANs comes in?
Also, if there are any good books I can use to learn more, definitely let me know.
VLANs for access control could be used, but it's not strictly necessary, and it could be detrimental to your performance if those VLANs need to talk to each other.
-
Thanks roccor and Jason. I appreciate it.
Jason - You're right. I thought I needed to have a port for each device so I bought 4 NICs for my last build.
As far as allowing some devices to access the Internet and restricting others, is that where VLANs comes in?
Also, if there are any good books I can use to learn more, definitely let me know.
VLANs for access control could be used, but it's not strictly necessary, and it could be detrimental to your performance if those VLANs need to talk to each other.
So if I have a media server that I would like all devices in the network to be able to access but that I do not want to allow directly on the Internet, is it best to use some other method of access control?
-
Putting your media server on a separate interface, a separate NIC or VLAN, is the most secure way sure. However if you just want to stop it accessing the internet you can do that with firewall rules and a static DHCP lease or static IP.
Also when you say 'on the internet' do you mean able to connect to the internet or do you mean is accessible from the internet? Nothing on your LAN is accessible from the internet unless you have specifically added rules to allow it.
Steve
-
Putting your media server on a separate interface, a separate NIC or VLAN, is the most secure way sure. However if you just want to stop it accessing the internet you can do that with firewall rules and a static DHCP lease or static IP.
Also when you say 'on the internet' do you mean able to connect to the internet or do you mean is accessible from the internet? Nothing on your LAN is accessible from the internet unless you have specifically added rules to allow it.
Steve
Thanks, Steve. I just want to make sure that it is not accessible from the Internet so it sounds like pfSense will have the covered by default.
-
Yes, all incoming unsolicited traffic is blocked by default.
Depending on what your server is it may try to open holes in the firewall via UPNP but that too is disabled by default. Something to be aware of if ever enable UPNP for some other reason.
Steve
-
I use one of these cards:
http://www.ebay.com.au/itm/INTEL-i350AM4-Gigabit-4-Port-Network-Server-PCI-e-Network-Adapter-1000M-i350-T4-/151207718974?pt=US_Internal_Network_Cards&hash=item2334aeb03e&_uhb=1At home. It works well (for me).
-
I am also rocking a Intel I350-T2 over here, rock solid from the day of snapshot 2.1.