Minor thing: the /24 does not indicate a class. Classes were abandoned in the 90s :) See CIDR (the C stands for classless). In a classful network your 10.0.0/24 would not be 'possible' as it would technically be part of one of 128 class A networks (ranging from 0/8 to 127/8). To get a /24 you would have to use 192.0.0/24 to 223.255.255/24. Yes, classes were really that silly... (I know that 10/8 was private even in classful times but it is an illustration.)
Haha that physical shudder when mentioning "The Printer". We have a printer in our office and we also have that reaction when we actually have to use physical media. God its awful .
Imagine getting over 30 users on a vpn and having them print to their local printers through rdp, it's either really simple or a terrible nightmare, you can save A LOT of time by just using hp printers and their awesome hp universal printer driver.
@Chris Frizzell I dont know I have had good with the canon image class printers. The only printer that I ever had less problem with was a HP laserjet 4000, well once I got that pesky jet direct card set up.
Networking trainer here: Overall good job :-D If that Router isn't acting as your Firewall though you're going to need an additional network running between the Router and your Firewall, a default route on the Router pointing to your Firewall's LAN IP, and a static route on the Firewall pointing back to this router for each of the networks you've made. Keep having fun!
It's a NGFW. SVI's live there and L2 is just extended southbound. The default route is automatically configured to whatever the WAN port picks up. It's a prosumer all in one device very simple when comparing it to anything enterprise level. Think of it as a Meraki MX
I only occasionally alter my network settings when I'm dabbling with something new and VLANs have always been semi confusing. You helped clear some stuff up! On a completely separate note, a Four Loko would probably be an entertaining addition as the "post credits scene" drink. Just be prepared for the foggy memory that comes afterwards.
I'm with you about the HAZE CRAZE. They don't look like beer, and frustratingly simple. I do have a Managed switch in the mail to help tame my home network. Looking forward to digging in further.
This seems like such a good idea, but I am a bit scared to implement... careful planning... also don't want to mess up work situations with all the work from home going on...
One important note/warning about using the 10.x.x.x range: Some ISP uses this for clients and/or their own equipment. Don't know how common this is but if you pick the same range as the ISP use you'll run into issues. (I am using a 10... address myself but I have seen these address used both for clients in mobile networks as well as used for routers in ISP's infrastructure.)
Being a network engineer as my day job I particularly enjoyed this video! But for real... you ain’t styling with VLANS until you stretch them across geographic data centers!
perfect timing on the vid. Been considering a UDM pro. I wasnt sure what vlanning looked like. Tho im still not sure if i want too. As i currently have pfsense virtualized in proxmox with a pcie nic passed through.
When you mentioned the 192 address space as the default I was like, aww, he doesn't have a Unifi device. But then you set everything up in the exact same UDM Pro I have, so thanks so much for the video! Love your content, it's excellent.
With this setup you are still hitting your router each time you need to pass a packet across to another vlan. Router on a stick is not an ideal configuration. Having a layer 3 core switch that does inter vlan routing would be better.
Nice high level video. I'd like to give a heads up. A broadcast on a VLAN gets sent to every switchport the VLAN is assigned to. The switch isn't looking for a specific IP address, but a specific MAC address. All F's in the MAC header in the frame. Unifi makes it very easy but blurs the divide between layer 2 and layer 3. Otherwise great video. I love the topics you bring up!
When I switched over to my pfSense box, I set up different physical networks and made pfSense route between them instead. It's not feasable when you need more than however many ports you have, but in my case it was just enough (5+WAN).
I wonder if the flavors you're getting from the hazy IPAs are about temperature. What about cooling more for the initial open and taste and then considering the profile more as it warms? What if you just like hazy IPAs when they're colder?
Please do the pihole video? more VLAN videos in general would be great. This might have actually finally unlocked the concept of VLANs in my head. I have 1 question though and its the reason why I never could comprehend how to set this up: When you set up your IOT devices to their own vlan and your servers on a seperate vlan how can you get your IOT devices to communicate with your servers? Example: I have a temp sensor in my IOT VLAN and then I run a server on the Server VLAN that logs the temp data how would I be able to keep the communication between these two devices? I've always tried to setup VLANs and then lost the ability to access a web interface for the device or whatever and this always made me say ahhh forget this. EDIT: ahh 💡 I think Id have to have a device setup for inter-vlan communication as described by the "Corporate" setting for purpose in your video.
separating servers from clients can be tricky....you would then rely on the routing capacity of your router to route traffic between networks (unless you have a router on a stick configuration in which your switch is acting as a L3 switch and is doing inter-vlan routing) - this is fine if every vlan has its own physical interface, but becomes tricky if you use the same interface for many many vlans. You avoid broadcasting traffic at the expense of pushing all traffic through the same interface and saturating its bandwidth.
Have to correct at 6:45 , although you're using a /24 SNM it's still a class A network since it's in the A class "block". The three private ranges are each in a seperate class btw. 10 A Class 172 B Class 192 C Class
It's using a VLSM, and its called a classless address - that is very much a class C. The beauty of private networks is you can carve them up however you want. You can create any ip space you want you do not need to have a classfull address of 192.168.1.x to only use a /24. You can literally make any subnet a /24 but the rules of subnetting still apply to your host, and network bits. The mask is what determines your network size. Not your network address.
I don't know if this is something you would be intrested in doing but can you make a tutorial on how to build and setup a NAS and recommend to us the minimum specs we should use? i'm very confused on what parts should i buy, and i'm worried that if I buy low specs or old hardware it might not work properly
Over Covid, I used your videos to set up a simple Unifi home network (USG, 8 port unifi poe switch & Nano AP). Would you consider a video on how to set up Unifi to give the BEST possible Zoom meeting experience? I have 300mb Fios, and sometimes, intermittently, my Zoom meetings just come to a crawl or even disconnect. I'm hoping you might have some advice on settings for QoS to prioritize Zoom traffic. I saw something about enabling "Smart Queues ". The info icon says "Prioritizes traffic and reduces delays when the router/bandwidth becomes overloaded" I did that, but I don't really know what it did or if it helped yet. It seems to have reduced my network speed when I do a speed test. I have struggled to find a good video that walks me through this in a way that is easy to follow and understand. Thanks again, and keep up the GREAT work!!
Literally just hooked up my UDMP and saw this before powering it on - glad I stopped to watch this! always appreciate your videos and have learned so much this year from you a long with network chuck! Cheers!
I hear ya there, have recently set up a S5800 24 PoE, it's actually not super loud, but audible while I'm in bed. Fan swap seems to be the gist of quieting it, have yet to open the lid though.
Good info, thanks for the video. Maybe one day I'll get there, but I feel if I start shopping for servers my wife will need a better reason than "just to tinker".
Vlans are amazing if done right. If done wrong, like Ive seen, its a nightmare. Ive worked with people who have some weird mindset where they think absolutely everything ever need to be Vlanned off. Vlan for laptops when on ethernet, vlans for laptops when on wifi etc. Too many vlans becomes a support nightmare. I think its more of an older mindset though.
Nice to see VLANs getting promoted. I have used the 10 network range for the last 25 years. And vlans for about 8 years. Really helps trusted stuff, iot stuff, guest, cctv and voice all on separate networks. Networks like guests and iot go out to the internet through a vpn unlike the trusted stuff
Your timing is suspect Jeff...! I finished part one of my home lab changes last night. Look forward to what you present next. I agree with avoiding 192.168 .x.x.x scheme, have avoided that one for years.
I noticed this first I started watching his videos. Psivevri does the same thing. After a while, it becomes kinda natural for them if you don't focus on it. Just a mannerism
Not to mention that VLANs and strong firewall rules at the layer 3 routing layer are very important for security of things such as you servers and isolating those ssuper insecure hosts such as IOT devices.
Most homelabs aren't going to have that much broadcast or arp traffic on the collision domain to justify vlans. Its cool practice, but you should be exploring the security angle and not necessarily the speed angle.
Pihole doesn’t have GUI support for multiple DHCP ranges, but I am considering putting in the work in the config files manually to set it up. Please do make a video about it if you do this.
my former boss told me years ago he once ran out of IP addresses at his house...needless to say it made me pause. later on, he told me whatever was doing dhcp was for some reason not cleaning up address leases and kept using new addresses until the scope was exhausted. good reason for vLANs :)
Just wondering what the benefit is of using nordpass compared to chrome's built in password manager which is bassicly secured behind your gmail account.
Hey, thank you for the video. I'd like to see some firewall setup in future videos, is that possible? You know, what ports and protokolls are allowed from certain networks to certain networks and why?
Love it!!! I'll do it for sure... but please, please, please, do a video on Pi-Hole as DNS and DHCP server for the main network. Just to explain my idea. Here at my home I have a total of 5 computers, 5 portable devices, 3 game consoles, 1 rack server with some virtual servers (one being the Pi-Hole DNS as you teach in the past video), I also have some IP cameras in the network a NVR device for recording the cameras and Smart TV's. Mainly, what I want to achieve here is to separate the Computers, Consoles, Devices from the cameras and some servers. My router is a TP-LINK ER-6120 and it does support VLAN and also is the main DHCP server in my network. I can also use a MikroTik Hex Rb750gr3 but I'm still studding it. My main doubt is about having access to my cameras from different VLAN's, and still have my main network protected. Also, do a video on Pi-Hole DHCP, this is very interesting.
I'd like to also like to add to the 'asking nicely', have PiHole DNS and unbound working nicely, but the PiHole DHCP tutorial would be good since I can't find anything decent on the 'web explaining how to set this up for VLANs, and would be greatly appreciated
It's not the CIDR that determines the class of the network, it's the IP itself, you are just using a mask that is usually used in class C network in a class A network.
"Class C" actually has nothing to do with subnetting of private networks. In the olden times (before the introduction of CIDR in the mid-90s), you would request a "Class C" from the IP address registry and they would assign a publicly routeable block of 255 addresses to you. I mention this because new network admins seem to think that using /24 blocks is something to conform to, when you are probably better off using larger (or smaller) address spaces for different network setups. IPs for DHCP pools, for example, start adding up quick when you have redundant servers.
@Ioan Even though classful networking has been effectively dead since 1993, it was still being taught in IP theory classes well after the fact. It was so ingrained in the "old school" instructors minds that they couldn't stop referring to IP classes. This perpetuated well into the 2000s, my first IP theory class instructor went over classful networking then made a proclamation of "But don't worry about any of that stuff I just went over..." I think that within the last 10 years, we've finally seen classful networking not being taught in networking classes. This is actually the first time I've seen someone on the KZclips mention anything about a "Class C" network or any Class for that matter in a long long time.
Thanks for mentioning the history of classful networking in your correction. I was getting very confused why it was being brought up with private networking and when it has been superseded by CIDR.
In follow up videos can I request a focus on how to share things like printers and NAS drives across VLANS? I’ve had a go in the past but got stuck on that point.
No jokes, i could have used this on Monday. Using a UDM to set up a whole school and trying to figure this shit out on the fly! Thanks a million regardless!
I have just setup a PiHole VM with DHCP and Lancache Monolithic on my home network (st00pid new mobem/router has preset DNS settings - so disabling that DHCP and running my own is superb).
You would be surprised if you compare the efficiency of devices in and out of a Vlan. Let's talk about 100 clients. The difference is imperceptible even with heavy traffic. If you have less than 100 clients it is not worth the time wasted to manage the amount of documentation. Today 2020 a modern managed switch can handle very well with hi packages demand.
I must confess to some confusion. The way you seem to describe how you're re-doing your network - really until you get to tagging - seems more suited for subnets than VLANs. So you have one subnet for your servers, one for your IOT devices, and so on.
At which point do you pause to receive the beating over "Why my internet is not working today"? xD I love this video because you have Switch that is not also from Unifi so that you're showing how it should be set up and also explain everything on the way.
This video conflates VLANs (Layer 2) and subnetting (Layer 3). Both are valuable topics for discussion, and often go hand in hand, but it is worth distinguishing between the two. Reducing broadcast traffic is a layer 3 issue that can be solved through subnetting and using a router. VLANs are layer 2 segmentation, and are more akin to virtualization of switch hardware. You don't need VLANs to reduce broadcast traffic, you just need additional subnets on a router (or routers) with a sufficient amount of distinct ports and separate switch networks for each of those subnets. Obviously VLANs help solve the multiple ports and multiple switch networks by virtualizing all of that infrastructure on top of a single set of physical infrastructure, but VLANs are really only incidental to the reduction of broadcast domain sizes.
@Ten Gigabit "...All VLANs are subnets; but not all subnets are VLANs..." Not true in the general sense unless you define 'subnet' as 'a subdivision of a network'. While that definition is, in the absolute most technical sense true, it has only ever been implemented as a division of IP ranges. VLANs can include any arbitrary IP ranges just fine. You could have a VLAN that includes all odd numbered IPs in a class C and it would work just fine. The difference between the two is how they are done. Subnetting is done at the address level(layer 3) and includes contiguous addresses. VLANing is done by tagging frames(layer 2), or by trunking.
@thebadness don't forget you are the one who replied to me first. I wasn't even asking you for shit and second your answers weren't really any thing of substance unlike what Luc was able to offer.
I want to make a homelab/managed home network. I've thought about making physical connections between everything, a main DHCP/DNS and have it branch off to data storage/clients/WAPs each with their own subnet. Is a VLAN a better way of networking than that? It's cheaper I know that, less NICs needed per network. Is there a setup where it would be better to physically segregate a network?
IMO you'd only need to physically segregate a network if you need SUPER-high security, like NSA level security. However another benefit of using separate cables (but not necessarily physically separate hardware) is that each connection gets its own dedicated bandwidth.
just a heads up, some IoT devices can't handle having an IP address outside of the 192.168.X.X range. I can't remember if it was my chromecast or amazon fire stick that threw a fit, but it completely refused to connect to anything when I assigned it a 10.0.0.X address. It threw off all of my plans, and my network still doesn't look the way I want it to look.
I've never had anything complain about my networks in 172.16/16. That includes Chromecasts, google home devices, fire sticks, rokus, android TVs, smart bulbs and plugs, etc.
"[...] and one printer [shudders]" same. I've managed to keep my printer working pretty well but I don't have room near my router to hard-wire it and its WiFi support is... well... it exists... When I have a non-rented place of my own, I intend to put my printer somewhere where it can reach a network port or switch port so I don't have to worry about the wifi ever again.
So many vlan numbers to pick from and then you pick vlan numbers in the 1002-1005 range which are reserved for token ring and fddi.. You probably don't use either token ring of fddi, but still - thousands of vlans to pick from and you manage to use some of the very few that are reserved for other things.
Hi,I want to protect my Dedicated servers which host Virtual Private Servers. Unfortunately my data center does not provide it. How would I go about DDoS protecting them? What software would you suggest? I plan to use another server as a mitigation point.
how do you manage traffic between vlans? like if you want say devices on you guest network to have access to your plex server on an other vlan. is it just a matter of giving the plex server access to both vlans so that it has one ip address for each vlan?
So quick newbie question: how do the devices in one VLAN communicate with those on another? Is there some form of routing involved, hence the need for a DHCP server?
It's called inter-vlan-routing and it is most of the time handled by a core-router ... It's basically doing the same thing it does between your LAN and WAN but on the same side of the firewall *Yes this is a really short explanation and may trigger someone, I don't care as this is a youtube comment and not a network engineer course
Fun side quest: Count the number of times the elbows lift off the table. Have a drink for every 10 lifts.
@Spencer LeBlanc Oh, c'mon, man! You made it even worse, now I can't watch the video without giggling all the time! xD
@Joe B lol
CANT UNSEE. 👀
You just fricken had to didn't you? 🤣
Cannot... Un... See.... WHY
Minor thing: the /24 does not indicate a class. Classes were abandoned in the 90s :)
See CIDR (the C stands for classless).
In a classful network your 10.0.0/24 would not be 'possible' as it would technically be part of one of 128 class A networks (ranging from 0/8 to 127/8).
To get a /24 you would have to use 192.0.0/24 to 223.255.255/24. Yes, classes were really that silly...
(I know that 10/8 was private even in classful times but it is an illustration.)
came here to say this basically, thanks for point it out.
Haha that physical shudder when mentioning "The Printer". We have a printer in our office and we also have that reaction when we actually have to use physical media. God its awful .
Imagine getting over 30 users on a vpn and having them print to their local printers through rdp, it's either really simple or a terrible nightmare, you can save A LOT of time by just using hp printers and their awesome hp universal printer driver.
@Chris Frizzell I dont know I have had good with the canon image class printers. The only printer that I ever had less problem with was a HP laserjet 4000, well once I got that pesky jet direct card set up.
Any printer beyond a simple, dumb Brother B&W laser printer is an exercise in frustration.
Anytime I get asked to troubleshoot a printer issue it hurts me, that's an hour of my time im not getting back
Networking trainer here: Overall good job :-D If that Router isn't acting as your Firewall though you're going to need an additional network running between the Router and your Firewall, a default route on the Router pointing to your Firewall's LAN IP, and a static route on the Firewall pointing back to this router for each of the networks you've made.
Keep having fun!
It's a NGFW. SVI's live there and L2 is just extended southbound. The default route is automatically configured to whatever the WAN port picks up. It's a prosumer all in one device very simple when comparing it to anything enterprise level. Think of it as a Meraki MX
Two items....1)I would love to see a video on PIhole setup for dhcp/dns 2)I heard you mention Procurve. My first love of network switches it was :)
Asking nicely for that pihole dhcp video. Also would love to see more about configuring firewall rules across vlans on the udm pro
I only occasionally alter my network settings when I'm dabbling with something new and VLANs have always been semi confusing. You helped clear some stuff up! On a completely separate note, a Four Loko would probably be an entertaining addition as the "post credits scene" drink. Just be prepared for the foggy memory that comes afterwards.
Just want to say thanks for providing these videos man. Also, I'm a fan of how you go about presenting them. Good stuff my friend!
2:43 Yes, every IT guy knows the pain printers bring to us 😃
I'm with you about the HAZE CRAZE. They don't look like beer, and frustratingly simple. I do have a Managed switch in the mail to help tame my home network. Looking forward to digging in further.
Are you only going to do IPv4 networking? How about IPv6?
Oh, and I agree about hazy beers often becoming unpleasant after the first few sips.
IPv6 has very little use in a home network, or even a business network. I mean what are you gonna do with billons of IP addresses?
This seems like such a good idea, but I am a bit scared to implement... careful planning... also don't want to mess up work situations with all the work from home going on...
One important note/warning about using the 10.x.x.x range: Some ISP uses this for clients and/or their own equipment. Don't know how common this is but if you pick the same range as the ISP use you'll run into issues. (I am using a 10... address myself but I have seen these address used both for clients in mobile networks as well as used for routers in ISP's infrastructure.)
A nice in-depth video on PiHole with this setup would be handy for sure. I myself would love to see it.
Being a network engineer as my day job I particularly enjoyed this video! But for real... you ain’t styling with VLANS until you stretch them across geographic data centers!
perfect timing on the vid. Been considering a UDM pro. I wasnt sure what vlanning looked like. Tho im still not sure if i want too. As i currently have pfsense virtualized in proxmox with a pcie nic passed through.
The printer shiver. My god, I felt that. They're the bain of any technical person- myself included.
When you mentioned the 192 address space as the default I was like, aww, he doesn't have a Unifi device. But then you set everything up in the exact same UDM Pro I have, so thanks so much for the video! Love your content, it's excellent.
With this setup you are still hitting your router each time you need to pass a packet across to another vlan. Router on a stick is not an ideal configuration. Having a layer 3 core switch that does inter vlan routing would be better.
Nice high level video. I'd like to give a heads up. A broadcast on a VLAN gets sent to every switchport the VLAN is assigned to. The switch isn't looking for a specific IP address, but a specific MAC address. All F's in the MAC header in the frame. Unifi makes it very easy but blurs the divide between layer 2 and layer 3.
Otherwise great video. I love the topics you bring up!
When I switched over to my pfSense box, I set up different physical networks and made pfSense route between them instead. It's not feasable when you need more than however many ports you have, but in my case it was just enough (5+WAN).
I wonder if the flavors you're getting from the hazy IPAs are about temperature. What about cooling more for the initial open and taste and then considering the profile more as it warms? What if you just like hazy IPAs when they're colder?
Well, now I know what I'M gunna be doing with the home network this next weekend!!! Thank you for the great tutorials. 👍
Please do the pihole video? more VLAN videos in general would be great.
This might have actually finally unlocked the concept of VLANs in my head. I have 1 question though and its the reason why I never could comprehend how to set this up:
When you set up your IOT devices to their own vlan and your servers on a seperate vlan how can you get your IOT devices to communicate with your servers?
Example:
I have a temp sensor in my IOT VLAN and then I run a server on the Server VLAN that logs the temp data how would I be able to keep the communication between these two devices?
I've always tried to setup VLANs and then lost the ability to access a web interface for the device or whatever and this always made me say ahhh forget this.
EDIT: ahh 💡 I think Id have to have a device setup for inter-vlan communication as described by the "Corporate" setting for purpose in your video.
Perfect timing, was going to set something like this up to segment the clients, cameras and servers.
Good video dude.
I just got my UDM Pro installed last week, lit up Pi-hole several days ago. I'd love to see your implementation!
separating servers from clients can be tricky....you would then rely on the routing capacity of your router to route traffic between networks (unless you have a router on a stick configuration in which your switch is acting as a L3 switch and is doing inter-vlan routing) - this is fine if every vlan has its own physical interface, but becomes tricky if you use the same interface for many many vlans. You avoid broadcasting traffic at the expense of pushing all traffic through the same interface and saturating its bandwidth.
Have to correct at 6:45 , although you're using a /24 SNM it's still a class A network since it's in the A class "block".
The three private ranges are each in a seperate class btw.
10 A Class
172 B Class
192 C Class
It's using a VLSM, and its called a classless address - that is very much a class C. The beauty of private networks is you can carve them up however you want. You can create any ip space you want you do not need to have a classfull address of 192.168.1.x to only use a /24. You can literally make any subnet a /24 but the rules of subnetting still apply to your host, and network bits. The mask is what determines your network size. Not your network address.
I don't know if this is something you would be intrested in doing but can you make a tutorial on how to build and setup a NAS and recommend to us the minimum specs we should use? i'm very confused on what parts should i buy, and i'm worried that if I buy low specs or old hardware it might not work properly
Over Covid, I used your videos to set up a simple Unifi home network (USG, 8 port unifi poe switch & Nano AP).
Would you consider a video on how to set up Unifi to give the BEST possible Zoom meeting experience?
I have 300mb Fios, and sometimes, intermittently, my Zoom meetings just come to a crawl or even disconnect.
I'm hoping you might have some advice on settings for QoS to prioritize Zoom traffic. I saw something about enabling "Smart Queues ".
The info icon says "Prioritizes traffic and reduces delays when the router/bandwidth becomes overloaded"
I did that, but I don't really know what it did or if it helped yet. It seems to have reduced my network speed when I do a speed test.
I have struggled to find a good video that walks me through this in a way that is easy to follow and understand.
Thanks again, and keep up the GREAT work!!
Good stuff!
What about less common ip ranges reserved for carrier-grade NAT?
Literally just hooked up my UDMP and saw this before powering it on - glad I stopped to watch this! always appreciate your videos and have learned so much this year from you a long with network chuck! Cheers!
Procurve switch info would be very useful. Especially how to quiet the fans.
I hear ya there, have recently set up a S5800 24 PoE, it's actually not super loud, but audible while I'm in bed.
Fan swap seems to be the gist of quieting it, have yet to open the lid though.
Good info, thanks for the video. Maybe one day I'll get there, but I feel if I start shopping for servers my wife will need a better reason than "just to tinker".
Vlans are amazing if done right. If done wrong, like Ive seen, its a nightmare. Ive worked with people who have some weird mindset where they think absolutely everything ever need to be Vlanned off. Vlan for laptops when on ethernet, vlans for laptops when on wifi etc. Too many vlans becomes a support nightmare. I think its more of an older mindset though.
Nice to see VLANs getting promoted. I have used the 10 network range for the last 25 years. And vlans for about 8 years. Really helps trusted stuff, iot stuff, guest, cctv and voice all on separate networks. Networks like guests and iot go out to the internet through a vpn unlike the trusted stuff
Your timing is suspect Jeff...! I finished part one of my home lab changes last night. Look forward to what you present next. I agree with avoiding 192.168 .x.x.x scheme, have avoided that one for years.
You are now aware of Jeff’s restless elbows.
I noticed this first I started watching his videos. Psivevri does the same thing. After a while, it becomes kinda natural for them if you don't focus on it. Just a mannerism
It’s worse at 1.5x
Damn it!!
I had to put a window over the right side of the screen while he's talking.
Now I can't unsee them...
Not to mention that VLANs and strong firewall rules at the layer 3 routing layer are very important for security of things such as you servers and isolating those ssuper insecure hosts such as IOT devices.
I'm really interested in seeing how Pi-hole can support DHCP/DNS for multiple VLANs.
Nice! It's painful to switch but once you do it's well worth it!
I've got my own mDNS solution ;-)
Oh, and be prepared for the half baked mDNS with UniFI. I've been fighting it work months. Your printer may not be happy.
Most homelabs aren't going to have that much broadcast or arp traffic on the collision domain to justify vlans. Its cool practice, but you should be exploring the security angle and not necessarily the speed angle.
Nice timing. I just started looking into setting up vlan for home NVR.
Pihole doesn’t have GUI support for multiple DHCP ranges, but I am considering putting in the work in the config files manually to set it up. Please do make a video about it if you do this.
VLAN's are those things which make my homelab complicated. Got a dozend VLAN's hehe
Perfect timing!
I'm currently looking into using VLANs in my home network and have 0 knowledge about them.
my former boss told me years ago he once ran out of IP addresses at his house...needless to say it made me pause. later on, he told me whatever was doing dhcp was for some reason not cleaning up address leases and kept using new addresses until the scope was exhausted. good reason for vLANs :)
Awesome... I wanted to ask..
Why use pi-hole as DHCP too? Will it be better to use UniFi as DHCP and pi-hole as DNS like your other tutorial?
Just wondering what the benefit is of using nordpass compared to chrome's built in password manager which is bassicly secured behind your gmail account.
I usually try to steer clear of vlans 100-1100, due to the possibility of old token-ring stuff.
Hey, thank you for the video. I'd like to see some firewall setup in future videos, is that possible? You know, what ports and protokolls are allowed from certain networks to certain networks and why?
Nice video. Short, but very informative!
Love it!!! I'll do it for sure... but please, please, please, do a video on Pi-Hole as DNS and DHCP server for the main network. Just to explain my idea. Here at my home I have a total of 5 computers, 5 portable devices, 3 game consoles, 1 rack server with some virtual servers (one being the Pi-Hole DNS as you teach in the past video), I also have some IP cameras in the network a NVR device for recording the cameras and Smart TV's. Mainly, what I want to achieve here is to separate the Computers, Consoles, Devices from the cameras and some servers. My router is a TP-LINK ER-6120 and it does support VLAN and also is the main DHCP server in my network. I can also use a MikroTik Hex Rb750gr3 but I'm still studding it. My main doubt is about having access to my cameras from different VLAN's, and still have my main network protected. Also, do a video on Pi-Hole DHCP, this is very interesting.
One of these days he's going to hit us with a "..and as of today, I'm Craig"
Asking nicely for pi hole tutorials for DNS and DHCP!
For those wondering how to do DNS and PiHole with VLANS, you just do it exactly the same way you would without them, just on a network with VLANS.
I'd like to also like to add to the 'asking nicely', have PiHole DNS and unbound working nicely, but the PiHole DHCP tutorial would be good since I can't find anything decent on the 'web explaining how to set this up for VLANs, and would be greatly appreciated
Thank you for asking nicely. I join the motion!
Didn’t he already do this
A slightly off topic question, do you have any plans on making a caching server, for games, windows updates, etc, etc?
So glad I stumbled upon your channel! It’s great!
Yes PRTG is the best. The free trial is enough for most home labs and home networks
I have grown to appreciate the Procurve switches I have at work.
It's not the CIDR that determines the class of the network, it's the IP itself, you are just using a mask that is usually used in class C network in a class A network.
Technically the "A,B,C" CIDR Classes have been deprecated since 2006 with RFC 4632.
Wow , I have actually been wanting to research this for a small site.
Thanks
You are brilliant! Can't wait for the PRTG video
"Class C" actually has nothing to do with subnetting of private networks. In the olden times (before the introduction of CIDR in the mid-90s), you would request a "Class C" from the IP address registry and they would assign a publicly routeable block of 255 addresses to you.
I mention this because new network admins seem to think that using /24 blocks is something to conform to, when you are probably better off using larger (or smaller) address spaces for different network setups. IPs for DHCP pools, for example, start adding up quick when you have redundant servers.
@Ioan Even though classful networking has been effectively dead since 1993, it was still being taught in IP theory classes well after the fact. It was so ingrained in the "old school" instructors minds that they couldn't stop referring to IP classes. This perpetuated well into the 2000s, my first IP theory class instructor went over classful networking then made a proclamation of "But don't worry about any of that stuff I just went over..."
I think that within the last 10 years, we've finally seen classful networking not being taught in networking classes. This is actually the first time I've seen someone on the KZclips mention anything about a "Class C" network or any Class for that matter in a long long time.
Thanks for mentioning the history of classful networking in your correction.
I was getting very confused why it was being brought up with private networking and when it has been superseded by CIDR.
just curious how does your vpn gateway fit into this new Vlan structure?
In follow up videos can I request a focus on how to share things like printers and NAS drives across VLANS? I’ve had a go in the past but got stuck on that point.
I was just trying to plan out how to do this on a udm pro! Perfect timing!
No jokes, i could have used this on Monday. Using a UDM to set up a whole school and trying to figure this shit out on the fly! Thanks a million regardless!
It raises the question of why are you setting up a school network without knowledge of VLANs?
Why do you prefer a class A address ? Just curious
Also there are Vlans that are reserved
I love the *shudder*. I have nightmares about printers as well.
I have just setup a PiHole VM with DHCP and Lancache Monolithic on my home network (st00pid new mobem/router has preset DNS settings - so disabling that DHCP and running my own is superb).
Hey, definitely looking forward to a prtg video!
Your "progress bar" is a very cool idea :)
very interested in the pi hole tutorial !
You would be surprised if you compare the efficiency of devices in and out of a Vlan. Let's talk about 100 clients. The difference is imperceptible even with heavy traffic. If you have less than 100 clients it is not worth the time wasted to manage the amount of documentation. Today 2020 a modern managed switch can handle very well with hi packages demand.
I must confess to some confusion. The way you seem to describe how you're re-doing your network - really until you get to tagging - seems more suited for subnets than VLANs. So you have one subnet for your servers, one for your IOT devices, and so on.
I've been meaning to do VLANs in my home and homelab but Im lazy and suck at understanding it. I have subnets to divide up things rn though
Cool video, but I think it's a bit overkill. Sometimes simpler is better.
Thank you for a fun video to watch. I hope to see more!.
At which point do you pause to receive the beating over "Why my internet is not working today"? xD
I love this video because you have Switch that is not also from Unifi so that you're showing how it should be set up and also explain everything on the way.
The dog barking analogy was awesome
This video conflates VLANs (Layer 2) and subnetting (Layer 3). Both are valuable topics for discussion, and often go hand in hand, but it is worth distinguishing between the two.
Reducing broadcast traffic is a layer 3 issue that can be solved through subnetting and using a router. VLANs are layer 2 segmentation, and are more akin to virtualization of switch hardware. You don't need VLANs to reduce broadcast traffic, you just need additional subnets on a router (or routers) with a sufficient amount of distinct ports and separate switch networks for each of those subnets. Obviously VLANs help solve the multiple ports and multiple switch networks by virtualizing all of that infrastructure on top of a single set of physical infrastructure, but VLANs are really only incidental to the reduction of broadcast domain sizes.
@Ten Gigabit "...All VLANs are subnets; but not all subnets are VLANs..."
Not true in the general sense unless you define 'subnet' as 'a subdivision of a network'. While that definition is, in the absolute most technical sense true, it has only ever been implemented as a division of IP ranges.
VLANs can include any arbitrary IP ranges just fine. You could have a VLAN that includes all odd numbered IPs in a class C and it would work just fine.
The difference between the two is how they are done. Subnetting is done at the address level(layer 3) and includes contiguous addresses. VLANing is done by tagging frames(layer 2), or by trunking.
@thebadness don't forget you are the one who replied to me first. I wasn't even asking you for shit and second your answers weren't really any thing of substance unlike what Luc was able to offer.
@thebadness cry to some one who cares dude.
@thebadness good thing there are people willing to help others, you could learn some thing from Luc
I want to make a homelab/managed home network. I've thought about making physical connections between everything, a main DHCP/DNS and have it branch off to data storage/clients/WAPs each with their own subnet. Is a VLAN a better way of networking than that? It's cheaper I know that, less NICs needed per network. Is there a setup where it would be better to physically segregate a network?
IMO you'd only need to physically segregate a network if you need SUPER-high security, like NSA level security. However another benefit of using separate cables (but not necessarily physically separate hardware) is that each connection gets its own dedicated bandwidth.
Did I miss the Pihole DHCP and DNS server for the different VLANs video? Or did the fans not ask nicely enough?
just a heads up, some IoT devices can't handle having an IP address outside of the 192.168.X.X range. I can't remember if it was my chromecast or amazon fire stick that threw a fit, but it completely refused to connect to anything when I assigned it a 10.0.0.X address. It threw off all of my plans, and my network still doesn't look the way I want it to look.
I've never had anything complain about my networks in 172.16/16. That includes Chromecasts, google home devices, fire sticks, rokus, android TVs, smart bulbs and plugs, etc.
"[...] and one printer [shudders]"
same. I've managed to keep my printer working pretty well but I don't have room near my router to hard-wire it and its WiFi support is... well... it exists...
When I have a non-rented place of my own, I intend to put my printer somewhere where it can reach a network port or switch port so I don't have to worry about the wifi ever again.
Nice, I've been hoping you were going to do PRTG
Actually vlans do not deny multicast traffic @ layer 3 . Refer RFC 7761 .... just isolates broadcast to a single routing domain
Please do a video on your DHCP and DNS configuration. Cheers!
So many vlan numbers to pick from and then you pick vlan numbers in the 1002-1005 range which are reserved for token ring and fddi.. You probably don't use either token ring of fddi, but still - thousands of vlans to pick from and you manage to use some of the very few that are reserved for other things.
Hi,I want to protect my Dedicated servers which host Virtual Private Servers. Unfortunately my data center does not provide it. How would I go about DDoS protecting them? What software would you suggest? I plan to use another server as a mitigation point.
how do you manage traffic between vlans? like if you want say devices on you guest network to have access to your plex server on an other vlan. is it just a matter of giving the plex server access to both vlans so that it has one ip address for each vlan?
2:43 lol that printer reaction
Printer ptsd...
So quick newbie question: how do the devices in one VLAN communicate with those on another? Is there some form of routing involved, hence the need for a DHCP server?
It's called inter-vlan-routing and it is most of the time handled by a core-router ... It's basically doing the same thing it does between your LAN and WAN but on the same side of the firewall
*Yes this is a really short explanation and may trigger someone, I don't care as this is a youtube comment and not a network engineer course
Jeff: "I probably know the IP address of your router..." Everyone else! OMG!!!... Me...WRONG! LOL