I’ve gotten into selfhosting and have 3 mini PC’s

ODROID H4+ for TrueNAS
One for Home Assistant
and another for Immich and Nextcloud

They’re all just plugged into the router my ISP provided with network cables.

I’d like to get a managed switch or a router of my own that can function as a switch and router

I’ll be putting everything in a 10" rack at some point so it has to fit.

Any suggestions or tips would be appreciated, I’ve done some research and looked at options but unsure what is right/wrong

I’m especially stuck on what Hardware to get. Is 2.5ghz managed switch overkill? Should I get PoE for future use?
What brands are good, what should be avoided?

  • Seefoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 day ago

    Mikrotik makes a few that are rack ready. Not sure about rack size. They are extremely customizable and pretty cheap in the grand scheme. I absolutely love mine. some things I am using it for:

    • natively supports Wireguard, allowing me to keep everything private and just wireguard into my home network
    • I have set up firewall rules that force all DNS through my pihole, including those pesky LG/google devices that try to bring their own hardcoded DNS servers.
    • I have backed up my config to a script and literally trashed a switch a few weeks ago, bought a replacement and was up and running with the same config in <30 minutes of setup.

    My one qualm with them, is their warranty service is pretty jank. The devices themselves are generally very good, but having had one die on me after 3 years, I was a little dejected I couldn’t really get it replaced (they do still offer support though). If you need a specific recommendation the RB5009 is really solid for homelab stuff. The one saving grace is the routers are pretty cheap if you know what you need…replacing them (compared to a unifi or something else) is easier? if you’re ok with that

  • exu@feditown.com
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    You need something other than your ISP provided router, otherwise you’ll be constantly limited by a few basic settings they allow you to change. Check with your ISP if you can use your own router directly, if their routers have a bridge mode or if you can buy an alternative modem that does bridging.

    If you want a simple and cohesive ecosystem, Unifi is the one to beat. They offer routers and switches and you can manage them all from a single dashboard.

    For an open source router, the best option is OPNsense. Get one of the multi port x86 boxes from Aliexpress (e.g. Qotom) and install it on that.

    Personally, I don’t like OpenWRT, but that would be an option to flash a cheap consumer router.

    TP-Link offers some great switches, look at their JetStream series. They’re usually a bit cheaper than equivalent Unifi switches as well.

    As an anti-recommendation I’ll mention Mikrotik. Their hardware is great and they provide great value, but the UI is extremely confusing for newcomers. It’s all well documented (in the form of terminal commands, but the UI is basically built like that), but you need to know networking before you can find what and how you need to change settings.

    • Ek-Hou-Van-Braai@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      Spent the whole day looking at routers and switches, and I think I’m going with Unifi their prices are on par with the open source alternatives and they seem to just work no fuss, and I can run them fully locally and not depend on the cloud if I wanted.

      I don’t want to buy any hardware that can be taken away from me with a firmware push where I now need to pay a subscription to use my product. Wile that risk with Unifi doesn’t seem to be zero, it seems close to zero.

    • Seefoo@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      UI is confusing, but its a good platform to learn. there are a lot of resources for doing typical stuff (dhcp,dns, wireguard, firewall rules, etc.)

  • CameronDev@programming.dev
    link
    fedilink
    English
    arrow-up
    12
    ·
    2 days ago

    Whats your goal? Your current network works presumably, what are you trying to achieve by upgrading? Faster network? Reliability? Expansion options?

    • Ek-Hou-Van-Braai@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 days ago

      Mainly I like tinkering and building my own server and systems.

      I’d like to have different VLAN’s so that I can keep Home Assistant, sus wifi devices, my services, my personal network, and a guest network separate

      I’ll probably add more mini-PC’s or hardware as time goes by, so it being future proof-ish would be great

      • BlameThePeacock@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        2 days ago

        If that’s all you want to do, one of the cheaper Ubiquiti managed gateways would probably work and not break the bank.

        If you want to tinker even harder, an open source router running https://openwrt.org/ (or even their own device) may be a good option.

      • Creat@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        If separation is all you’re after, any managed switch will work. Even a “smart managed” one. But you’ll need Wi-Fi access points that can actually have SSIDs assigned to VLans, like the TP-Link, Mikrotik or ubiquity (basically anything aimed at business). At least if some or many of the iot devices are Wi-Fi based.

  • theneverfox@pawb.social
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    I’m not sure what you’re asking

    In your position, I would want a VPN. I like wire guard, it’s pretty simple compared to other options… But just comparatively

    If you want to do networking to network, I can suggest all sorts of things… None of them is practical for normal use cases, but some are pretty neat

    • Ek-Hou-Van-Braai@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      Right now I’m struggling to figure out what hardware to buy The Zyxel XGS1210-12 seems perfect but it won’t fit in a 10" rack

      • theneverfox@pawb.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        You could mount it on top or vertically behind the rack and have it still look decent and be functional with a little handiwork

        You still are going to need a router, although you don’t need a fancy router and a fancy switch, you just have to make sure you’re not bottlenecked and have to design things differently

        2.5 gb is probably more than enough, but you could probably get away with 1 gb if you aren’t doing a lot of file transfers - if it’s just backups and streaming video, if you want to get fancy it might become a bottleneck.

        PoE is kinda niche so unless you have specific plans to use it, it probably won’t come up

        The switch supports vlans, so you could get fancy with a VPN gateway and access these things remotely with a Virtual DMZ, but realistically that’s a bitch to set up and you could just make a real DMZ with a router/wifi access point combo. Or just forget the DMZ and have a VPN gateway that connects to the local network

        I really just don’t know enough about how you want to use this to get more specific. This is probably more switch than you need, but if you’re not connecting from outside it’ll probably work great for the LAN

        Networking is all about bottlenecks, and I doubt this will be a bottleneck for a good while

  • Strider@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 day ago

    I’m also not sure what you’re asking. But if you want to know how all of this works, read up on tcp/ip, dhcp and dns.

    Of course the former is a huge chunk so don’t sweat it.

  • hperrin@lemmy.ca
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 days ago

    I use Unifi stuff. It’s really nice, but quite expensive. I run my own controller for it with Docker.

    • Ek-Hou-Van-Braai@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 days ago

      I’ve been comparing managed switches that are 2.5Gbps all day and honestly Unifi isn’t that expensive, it’s often the cheapest option. The price jumps like crazy once you want a switch that’s managed and 2.5Gbps

    • cmnybo@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      Sure, their gear is a bit expensive, but their layer 3 switches are energy efficient and quiet. You can get an old, used switch for a lot less, but it will be expensive to run and the fans will be loud.

  • spaghettiwestern@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    2 days ago

    OpenWRT is amazingly flexible and would be a great place to start.

    I switched from DD-WRT last year and have been amazed how good OpenWRT is. There are thousands of software packages that allow you to do pretty much anything you can think of on inexpensive hardware. Used Netgear R7800s are available for less than $50 on ebay or there are plenty of newer hardware options if you want to spend more. Those thousands of downloadable software packages include Wireguard and Adguard Home, plus there are OpenWRT integrations for Home Assistant. The forum is full of people who are happy to help newcomers.

    I started by running OpenWRT in a virtual machine to get familiar with the UI and moved on to a live installation. Highly recommended, especially if you enjoy learning.

    • 9tr6gyp3@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 days ago

      I freakin love OpenWRT. I used it for a solid 5-6 years on some consumer grade routers and learned a lot about managing networks.

      Ive since moved to more powerful enterprise network gear because OpenWRT opened that door for me and taught me what is possible. I might not ever go back to it, but I will always recommend OpenWRT to people who want to rice out their routers and get the most out of it.

      • spaghettiwestern@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        2 days ago

        As a home user, what additional features have you found useful on enterprise networking equipment? Just because what I’m doing is already ridiculously complex doesn’t mean it can’t be more so.

        • 9tr6gyp3@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          2 days ago

          Its more about the hardware than software.

          • Able to have enough processing power to utilize the max speed that my ISP provides, while having IDS/IPS and other services enabled.
          • Port segregation so that each port can be on its own network with a full speed backplane.
          • PoE capabilities
          • SPF ports to utilize both fiber and copper connections
          • Multiple networks across many wireless access points
          • spaghettiwestern@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            2 days ago

            Thanks for that list. No need here for more advanced hardware so I’ll have to put off networking upgrades until I can come up with a reason to justify it.

  • pishadoot@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    2 days ago

    I’d recommend using unifi/ubiquiti switches. They’re a bit pricey but they’re incredibly solid and you can manage them with a self hosted container of unifi controller software.

    A good place to start is one of their 8port POE switches. I have a couple and they’re L3 switches (so you can do VLAN stuff like you want), and I’ve never ever had a problem with any of them. Even with the inexpensive ones their POE budget is pretty good, and great to power other switches or APs. They don’t power some cameras so you might need injectors for some thirsty gear.

    The controller software is pretty good, and will let you manage the switches without getting into command line config at first (which can be a crutch so be cautious of that, especially if you want to branch out into other cheaper switches or take advantage of good 2nd hand gear deals you find).

    But for your network I think an 8 port and a WAP are a good place to start. Get away from using your combo router as your wireless AP (or use both) and get some VLANs set up, and work on inter-VLAN routing and firewall rules.

    How do you want to segment your network?

    I recommend you have the following to start:

    -management VLAN

    -trusted devices

    -guest/IoT devices

    Just getting those three set up correctly will teach you a lot and let you environment. Firewall/routing rules to allow connections through in certain directions and not others is… fun to get the hang of if you’re new.

    What are you planning on using as your router? Your combo router might tie your hands if that’s what you plan to use for everything. Combo routers generally suck at everything. You can get a cheap router also, edgerouter er-x is a fine choice but it’s not the best, but it’ll still outdo whatever you currently have, I’m sure. Put it behind your modem at your network edge and you can manage your vlan routing and your firewall on one device.

    Additionally you can set up a VPN server on one of your PCs and set up static routes to allow you to tunnel in and access your network when you’re out (wireguard for the win).

    Good luck on your journey! There’s a lot to learn so don’t get frustrated then your stuff doesn’t work. Back up your configs so you can revert back and be REALLY careful because it’s easy enough to make your stuff insecure by trying to make stuff work. Yeah it’ll function but next thing you know you’ve got a ransomware virus on your entire network… Not fun, I hear.

    As you set up your VLANs look into VLAN traversal, it’s a means of network attack that allows attackers to cross over from one VLAN to another when you set up trunk/switch ports and VLAN tagging incorrectly. Again, your stuff will work but it’ll be vulnerable (not really a problem at home as long as your firewall works fine but still).

    Edit: you can go with a router with several ports but I’d recommend you shy away from that if you have the money for dedicated devices. Routers are better at routing (L3) and switches are better at switching (L2). Their guts are built for different things and your network will be much faster if you use them for their intended purpose.

  • foggy@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 days ago

    If you don’t have a specific goal, here are some ideas.

    Build a NAS.

    Use a bunch of small PCs or pis, build a CA, a DNS server. Make an db server and an app server.

    Get shit running on your network.

    Suit them all up with ELK stack.

    Misbehave on your own network. Go find evidence for your misbehaving.

    DoS yourself.

    Without goals it’s tough to give ideas beyond general like this.

  • ominous ocelot@leminal.space
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    The h4 already can be a managed switch itself (2" 2,5gbit + 4*1gbit with the nic addon.) if you want it to be one. Linux as the host OS (VLANs, bridges) - netplan works well for me. Some VMs and containers on top (lxd, incus, some use proxmox) for router/ firewall/ vpn-gateway (opnsense, ipfire,…) and other functionality which you don’t want to run on the host OS directly. The cpu is fast enough to run all your services at once. It all comes down to RAM.

    IMO there is not one right way. It all depends on what you want to achieve. Also a lot depends on, whether you want results fast or if you enjoy the tinkering while learning.

  • foremanguy@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    2 days ago

    Firstly the best way would normally be to have a separate switch and router.

    The router only having 2 ports WAN and LAN. And then get a great MANAGED switch for your lan.

    For your router basically any old x86 PC loaded with OPNSense would be great.
    The network card you will buy depends of your internet speed.
    (And try to find Intel chip network card)

    Next for the switch, definitely get a managed switch (you won’t regret it).
    The number of ports depends on your needs. Basically a 8 ports could be just enough or maybe very too little.
    That really depends.
    For the switch port speed it again really depends. Do not get 100Mb switches at least. But the sky is the limit.
    1G is plenty for a lot of people. But 2.5G could be good too. (In my opinion 10G is overkill for most of the people)
    The problem is that switches prices are exponential with the speed. You can get really good 1G for cheap. More difficult with 2.5G and impossible for 10G.
    And lastly PoE or not PoE that’s the question. I would say a huge NO (except specific use cases). If you got 20 cameras, 38 motion sensors and 76 APs, YES a PoE switch is a good idea.
    If you have a small amount of PoE devices, simply buy a cheap unmanaged PoE switch.
    If you only have one or two of them, just buy injector.

    If you have any questions concerning a brand or anything else feel free to ask

    EDIT : formatting