Multi lan subnet on same physical interface
-
well true and not true, most SOHO switches use a realtek chip which by default doesnt support managing it but its fairly easy to supply a signal to one of its pin and make it manageable using an external ic and i have seen many guys do it after which it starts supporting VLAN. most modern chips r a stripped down cpu and to make better use of it, most is done at the software level but in this case the chip firmware, if the chip were a dumb hardware without software it would do very limited number of tasks but would perform it much quicker thats y the need for a software is there. hardwrae might not support new technology but it definitely can if its just a software feature
-
there is 2 different versions of the Netgear GS108 switch. the Unmanaged one and the Managed version..
i have Never liked the Managed version myself as there GUI is Horrible but for the price its a Good switch.
(im spoiled by Enterprise grade gear for switches)we have Servers in DataCenters all over the globe and I have never encountered one that does DHCP
for us NOR would I want one. and Yes all of ours are on there OWN Vlan provided to the TOR (Top
Of Rack) switch of ours that Feeds the PFsense box and then 60U worth of Gear..also there would be no way to seperate the subnets on the same Nic without Vlans let alone getting
it to work.2 minutes with wireshark and you could be around any block unless you Vlan off stuff…
i have personally seen the damn 255.255.255.255 netmask done in the enterprise and spent damn
near a month undoing all the static configs. it was causing more nightmares for the IT staff than anything
else. -
could u explain what specific issues can 255.255.255.255 netmask cause so i know if those issues r a great deal on a SOHO network?
-
when i got to my current job , thats how over 4000 machines were. DHCP was handing out that damn netmask
some of our machines needed access to other server / etc and the 255.255.255.255 netmask was a nightmare
until i figured it out and then started adding Vlans to the core switches and then working down from there. took well
over a month of me working on it to get things correct. now all machines can see whatever servers its suppose
to and not others it NOT suppose to see.we also had well over 40 IPSEC tunnels to our servers in colo's and some of them had issues which came down
to the Netmask.at home im using Vlans. when my kid comes home. tries to raid my pictures. NOW he cant cause his
machine in a different vlan that goes directly to the interenet and cant see my 2 FreeNAS boxes.:-)
-
well in my case i dont want my clients to get access to other servers or devices that y i was looking for such a netmask