How to structure networks with VLANs

Sdílet
Vložit
  • čas přidán 15. 06. 2024
  • In this video, I show you my new managed Switch from Sophos. I've split my network into multiple segments with VLAN, and created a fast transmission speed between the switch and my firewall system. #Sophos #VLAN #HomeLab
    Sophos XG Tutorial: • My new homelab Firewal...
    Sophos XG on Proxmox: • Protect your home netw...
    Follow me:
    TWITTER: / christianlempa
    INSTAGRAM: / christianlempa
    DISCORD: / discord
    GITHUB: github.com/christianlempa
    PATREON: / christianlempa
    MY EQUIPMENT: kit.co/christianlempa
    Timestamps:
    00:00 - Introduction
    00:55 - Disclaimer
    01:44 - My Home Network
    02:52 - Why I needed a managed Switch
    05:49 - Configure the LAG
    08:14 - Whare are VLANs?
    10:39 - Configure VLANs
    13:48 - PVID and Filtering
    16:43 - Advantages of VLANs in networks
    ________________
    All links with "*" are affiliate links.

Komentáře • 155

  • @mrd4233
    @mrd4233 Před 2 lety +42

    Great video! One friendly reminder: Cisco proprietary protocol for Etherchannel or LAG is PAgP.
    Primarily, the term "trunking" is not the same as LAG. We use the term "Trunking" when we want to pass multiple VLAN traffic over a single trunk link.
    LAG is when we aggregate multiple links such as Fast Ethernet or GigaEthernet ports into one! Cisco names it "Port-Channels" :))))

    • @JosephBradleyofAwesome
      @JosephBradleyofAwesome Před 2 lety +4

      I am a network engineer and was hoping on to see if someone had replied with this. The video was super informative and appreciate the content.😀

    • @christianlempa
      @christianlempa  Před 2 lety +4

      Thanks for sharing bro! :))))

    • @mrd4233
      @mrd4233 Před 2 lety +1

      @@christianlempa My pleasure Christian! Keep up the excellent work!

    • @christianlempa
      @christianlempa  Před 2 lety +2

      @@mrd4233 Thanks bro, of course I'll do!

    • @lordcarnorjax8599
      @lordcarnorjax8599 Před 2 lety +3

      I love how some vendors like HP/Aruba use the term "trunking" in reference to a LAG which is not confusing at all (/s) when mixing HP & Cisco switches.

  • @willianjaques
    @willianjaques Před 2 lety +1

    Hey great content! It’s really nice to see network related stuff as well in this channel. Much love ❤️

  • @han7l
    @han7l Před 8 měsíci

    Thanks. Great tutorial for VLAN understanding. For someone new to VLAN operation, this is priceless information! So many people throw jargon around and try to impress us with what they don't know. Your video is refreshing in its content, production and approach.

  • @rom_4938
    @rom_4938 Před 2 lety +3

    Christian you helped me a lot during the past years where I went back to school learn It administration, windows and linux.
    Again thanks for all the content you offer it is a great ressource for every beginner.

  • @canadianwildlifeservice8883
    @canadianwildlifeservice8883 Před 9 měsíci +1

    This video was my inspiration for finally getting a Sophos Switch. I did in fact purchase the 24 port model, and I will use this video as a tutorial to setting up VLANS . I look forward to many more great things from Sophos. :) This will hopefully replace my current TP-Link switches and Omada controller which are OK, but having the single pane of glass from Sophos will make things that much easier. Sophos Central is really coming along and just seems to get better and better all the time.

  • @viktornagy974
    @viktornagy974 Před 2 lety +5

    Good to see someone works such hard to create quality content for others. Just a hint to make VLAN tags and port types more clear and simple: From VLAN tag point of view we have two type of ports. Trunk ports and Access ports.
    The egress frames on an Access ports never have VLAN tag, because it is removed when exiting. This is why the whole VLAN mechanism is transparent to the end device attached to that Access port.
    The ingress frame on Access ports are tagged with VLAN tag when it is arrived (with the VLAN the port belongs to).
    So Access ports are like a smurf sitting on an Access port and he has a sponge in his left hand and a pencil (only one pencil with the one correct VLAN color) in his right hand. Each time a frame leaving the port, the smurf uses his left hand and erases the VLAN tag with the sponge. Each time a frame arrives (usually from an end device) and entering to the port, the smurf uses his right hand and tags the frame with the pencil.
    Normally Access ports never receive frames with VLAN tag from outside.
    The other type of port is Trunk. The main different is that the smurf sitting on the Trunk port does not have sponge in his left hand, so VLAN tags will remain on egress frames. So basically egress frames and ingress frames also will have VLAN tags. Also, trunk ports can send and receive frames from any configured VLAN. Trunk ports are connected to trunk ports on another devices.
    Also, as I wrote in an another reply you might not seen: Portchannels not increasing, or aggregating speed. They increasing bandwidth. And these two terms are often misused. I always say that Portchannel is like highway with multiple lanes. Even if you add more physical links to a Portchannel (more lanes to a highway) you still have the same speed (speed limit on that highway). But with more lanes the highway can have more traffic with that same speed. And the algorithm will decide which session will use which physical link within the Portchannel.
    I think people can understand more easily these technical concepts and mechanisms if they are described with analogy from life (who says smurfs dont exists? :D )
    Looking forward to see more content from you. ;)

  • @xShadoku
    @xShadoku Před 2 lety +5

    I've been watching your videos here and there for a while, but did not know you worked for sophos! My company is the number 1 sophos reseller in the united states, we eat sleep and breathe their products. I personally run a Sophos firewall running in Hyper-V for my home gateway. Great video!

  • @harrysearia1784
    @harrysearia1784 Před 7 měsíci

    Thank you! Very well done. I understood 80% of what you said without replaying it several times.

  • @SpadeQc123
    @SpadeQc123 Před rokem +14

    Great channel! LACP actually doesn’t add the speeds of single links. It adds concurrency. It just enables you to have 2 devices at 10Gbe instead of splitting the bandwidth over the same physical cable. It’s basically a kind of load balancing with failover.

    • @TheRayDog
      @TheRayDog Před rokem +1

      Technically correct, but a bit semantic. Single tcp link not doubled, but throughput doubled. In the end which really matters?

    • @TheOneOriginalPolo
      @TheOneOriginalPolo Před rokem +5

      @@TheRayDog I think we should not conflate throughput with speed. I believe that is what the previous commenter was trying to point out. Indeed double the throughput, but NOT double the speed. The analogy I have used for years is that it is another lane in the highway--it allows for more traffic to come through. But the speed limit is the same (the posted limit, anyway ;) )

    • @slayercft
      @slayercft Před 10 měsíci

      ​​@@TheOneOriginalPoloaha but now your 45 min drive home is only 35 because less traffic 😎 😎 /s

  • @seanwoods1526
    @seanwoods1526 Před 2 lety +2

    I think you would be helping the Sophos team with your videos. The way you go about presenting the information is personable and easy to understand.

  • @engyazicohenvolcano3603

    thank you christian .. you change my lyf .. all the best brother

  • @rallegade
    @rallegade Před 2 lety +5

    As usual really good video! I always enjoy watching them and you inspire so much!
    The part about 10 gigabit ports in LAG giving you 20 gigabit is to some extend true, just remember that it still is two different cables and as so one single session can not be split between them meaning that that total throughput between them is 20 gigabit but for a single transfer using a single session for the transfer only 10 gigabit is available.
    Also you were talking about it as speed, but in the case of LAG it is also seen as bandwidth as the LAG Wil probably be used to allow more sessions through a "bigger" interface 😊
    If you do a lot of transferring of files, having vm's running from external storage etc between storage and servers I would suggest you look into making a storage vlan with a higher MTU of 9000 (jumbo frames) 😁
    Keep up the videos! Love your content

    • @christianlempa
      @christianlempa  Před 2 lety +1

      Thanks mate! :)

    • @rallegade
      @rallegade Před 2 lety

      @@christianlempa no problem! Hope it can inspire you to make more network videos 😊

    • @viktornagy974
      @viktornagy974 Před 2 lety +1

      @@rallegade @The Digital Life This is what I also wanted to say. Portchannels not increasing speed, they increasing bandwidth. And these two terms are often misused. I always say that Portchannel is like highway with multiple lanes. Even if you add more physical links to a Portchannel (more lanes to a highway) you still have the same speed (speed limit on that highway). But with more lanes the highway can have more traffic with that same speed. And the algorithm will decide which session will use which physical link within the Portchannel.

  • @nichdiekuh
    @nichdiekuh Před rokem

    Sehr schönes Video. Das sind Grundlagen die ich immer schon mal verstehen wollte, wo ich aber nie den Einstieg fand. Ich hatte einige AHA-Erlebnisse beim Anschauen. Danke!

    • @christianlempa
      @christianlempa  Před rokem

      Vielen Dank! :) freut mich total dass es dir geholfen hat

  • @domenicoragosta2690
    @domenicoragosta2690 Před rokem

    Good job, man! More about VLAN config and topics like that, please

  • @HowToITLLC
    @HowToITLLC Před 2 lety +4

    On your B roll of your switches you have your F Stop to high on your camera. Lower your Fstops and raise your ISO or lengthen your shutter speed. What this will do is give you a deeper depth of field for your camera when showing B roll so the only thing in focus will not only be the closes point of the Ethernet cables.

  • @blackryan5291
    @blackryan5291 Před rokem

    Awesome video man. Thank you for making this. I watched a few videos and read a bit about VLAN's. I sort of got the idea but not the full concept. Others would explain it and I get the facts but.....the facts don't contain a lot of data I can turn into something visual when they explain it. Its like IRL CMD....you get all data fed to you in text. You gotta focus. Its not as easy as if you could turn the data into something visual for your mind to attach to. But the way you explained it.....you basically told us about your network setup in reference to VLANs. If this was a podcast with no video I would have still gotten more than enough information because the explanation was packed with a lot of information that I could easily turn into something visual. No longer like IRL CMD. Now its like IRL File Explorer where you can easily visualize the data fed to you. You see the folders and where they are at as well as the files. Your explanation not only had the facts of what VLANs are...but a good chunk of why was explained so that I am not sitting here taking educated guesses as to what one might do with this. Simultaneously you also gave better understanding to a newb on the concepts of a VLAN deployment in a real scenario (totally better than me taking an educated guess) and even took the time to throw in a bonus link aggregation tutorial. You freaking nailed it man. I learned a great deal about VLANs in 20 minutes. Somebody get this man a fruit basket....NOW!!! This my first time here. You easily gained a like and sub from me on the first try. I was able to setup my VLAN network and understand because you made it easy. I don't normally do this...but... You did good bro. You did good

    • @christianlempa
      @christianlempa  Před rokem

      Thank you so much! I'm glad you enjoy the style of the video tutorials 😀

  • @canadianwildlifeservice8883
    @canadianwildlifeservice8883 Před 9 měsíci

    Great video and explaination of vlans, Christian! I would love a sophos switch. They are a bit on the expensive side, but I think that it is a nice touch to the sophos ecosystem and integrates into Sophos Central. I would replace my tp link Omada switch with one and have a proper switch. You are an asset to the Sophos community. Hope you are doing better.

    • @christianlempa
      @christianlempa  Před 9 měsíci +1

      Thanks! Good to see some Sophos fans here, maybe I need to do some more content for you :D

  • @ivanarteaga2500
    @ivanarteaga2500 Před rokem

    Very interesting video and good explanation! thank you

  • @johnvanwinkle4351
    @johnvanwinkle4351 Před 5 měsíci

    I love the ASCII diagram! Cool idea.....grin

  • @Saganis
    @Saganis Před rokem

    You could show the LAG Mode as well (LACP Mode on firewall and Switch). Those modes can be important to max the performance.

  • @Pro2buf
    @Pro2buf Před rokem

    Thank you for a very interesting and informative video. Sophos is an interesting firewall. It's a pity that you can't study it in my country.

  • @crgr83
    @crgr83 Před 2 lety

    Great Video. Helped me a lot, thank you.

  • @whiskerjones9662
    @whiskerjones9662 Před 2 lety +6

    When talking about vlans it's important to understand what a broadcast domain is - each vlan is a unique layer 2 broadcast domain meaning something in vlan 2 won't be able to talk to something in vlan 3 without enabling inter vlan routing and enabling FW polices. In your case you want your firewall to be your default gateway for each vlan this way you can apply policies to the traffic within that vlan/subnet/broadcast domain.
    - one point of clarification about your LAG - you won't "see" 20GB worth of link speed, but instead you'll have more concurrent traffic streams available on your 20GB link compared to just a single 10GB port. This gives you more bandwidth, not line rate speed.

    • @RoboticParanoia
      @RoboticParanoia Před 2 lety

      I'm having my ass kicked by inter vlan routing. I use a Cisco router with zoned based firewall and a physical network port for each vlan (because it came crammed with HWICs, so why not?) and some vlans in my setup can talk with others, some can't talk with no one besides internet and some can only have traffic in one way. Works beautifully when testing with an endpoint in each port. My 3com layer 3 switch f*cks everything and lets anyone talk with everyone. I don't know how to disable it on them.

    • @whiskerjones9662
      @whiskerjones9662 Před 2 lety +1

      @@RoboticParanoia Sounds like you have a lot going on there. I'd suggest removing the layer 3 portion of your 3com switch. You want your routing and policy matching to take place on your router in this case. Trunk your vlans up from your switch to your router and work on your policies and test as you build out.

    • @RoboticParanoia
      @RoboticParanoia Před 2 lety +1

      @@whiskerjones9662 just found out in the switch's web interface the routing disable feature. Everything is how it should be now. Thanks!

  • @vuhuy8952
    @vuhuy8952 Před 10 měsíci

    very intuitive . You enlighten me alot :)

  • @reinerhohn9617
    @reinerhohn9617 Před 8 měsíci

    You should do a revise of your networkcables shown in your rack. Especially the twistedpair ones. Some of them are far away more bend than allowed.

  • @axehead15
    @axehead15 Před 3 měsíci

    I would love to see more Sophos videos, it is hard to find good Sophos content on the web.

    • @christianlempa
      @christianlempa  Před 3 měsíci +1

      Thanks! We'll have to see... currently, I'm more excited about other topics :D

  • @chapagawa
    @chapagawa Před 3 měsíci

    Just in case no one commented, the LAG does not “double” the speed; it just allows different processes to use the two 10Gbps ports separately. So if you clocked the performance, you would only get 10G, but if you had multiple tests going on, each one could achieve 10G rather than sharing one 10G connection.

  • @minhhaine1698
    @minhhaine1698 Před 2 lety

    Great video

  • @bassman87
    @bassman87 Před 2 lety +1

    One thing to note about LAGs is that the bandwidth is the aggregated speed, but your throughput will still only be the speed of a single link. If you were to run a speed test across the link you would see this. The reason is how LACP and other LAG protocols work. They will use the source MAC, destination MAC, or both to pin that connection to a single link. (this is usually configurable) This allows for less congestion for multiple devices that need to talk at the same time, but doesn't help for increasing the speed coming from a single connection.
    The analogy I like to use is think of LAG member ports as different lanes on a highway. While driving you can only occupy one lane at a time, and each lane has a maximum speed limit. When there isn't any congestion to you having 4 lanes to choose from means nothing to you. however when there is congestion the added lanes increases the capacity of the road so cars don't have to slow down to wait for one another.
    Otherwise great video.

  • @gmcenroe
    @gmcenroe Před 7 měsíci

    Great video on your networking, probably more sophisticated than what I need. Is your Sophos firewall better than the firewall in my ASUS router? I plan to just add a managed switch between my router and computers that I want on VLAN so I can still use wireless connection on my router for those computers that don't require additional security provided by the VLAN. I want the computers on the VLAN (old SGI computers to have access to the printer on the network as well.) The old SGIs are not as secure on the internet and require careful security setup within the IRIX operating system for hardening. I am hoping that the VLAN essentially makes them invisible to the internet but visible on my home network side. I will probably use a CISCO Catalyst 1000 switch.

  • @juanmondragon
    @juanmondragon Před 8 měsíci

    Geeat video! Just a quick question. Why wouldnt you just want to have everything tagged instead of leaving the native vlan on for your dmz? Wouldnt it be better for security to use a different vlan for those and drop the native vlan altogether?

  • @troyd-motorsport9933
    @troyd-motorsport9933 Před rokem

    Good video thanks, what about if you connect an AP with two separate VLANs for two wifi points?

  • @shetuamin
    @shetuamin Před 2 lety

    Thanks for vlan topics. Watch later.

  • @stevendonaldson1216
    @stevendonaldson1216 Před 2 lety

    Thank you! Thank you! Thank you!

  • @emmanuelagenya5356
    @emmanuelagenya5356 Před 5 měsíci

    Thank you for this amazing guide. It has helped me a lot.
    Could you please make another one for a case like this... I have created 5 VLANs on my Sophos switch and I want each VLAN to have its own IP address and maybe a different subnet if possible. I'm using Sophos XG as my router.
    I will really appreciate.

    • @christianlempa
      @christianlempa  Před 5 měsíci

      Basically, you can follow the same guide as described in the video. You just need to add 5 VLAN interfaces to XG, and they will all have their own IP settings

  • @JeDeXxRioProKing
    @JeDeXxRioProKing Před 2 lety +2

    As always , Perfect Vid but you can use same boundle(LAGG) and create what is called Sub Interface (On firewall side ) and prevent using didicated LAGg for each VLAN, you will archive same goal with more scalability!

    • @christianlempa
      @christianlempa  Před 2 lety +1

      Thanks mate! I'll have a look!

    • @rallegade
      @rallegade Před 2 lety +1

      Just be aware that this can mean performance penalties depending on how the firewall handles the subinterfaces. This setup is known as router on a stick and can be helpful in situations where a simpler network is wanted, but is often substituted with layer 3 switches running virtual interfaces per vlan instead.
      This is also why enterprise networks utilize L3 switches in core and distribution layer as they can do L2 at wirespeed because of dedicated ASIC's as well as offloading L3 routing to hardware.

    • @whiskerjones9662
      @whiskerjones9662 Před 2 lety

      @@rallegade I'm not sure what you're saying is technically correct - instead I'd say for the situation you're describing you'd be better off doing something like OSPF between your firewall and your switching infrastructure and "force" traffic to your firewall. If you're forwarding packets outside a firewall policy (ie layer 3 switch/svi on your switch) you're opening yourself up for potential unintended traffic flows which will be harder to manage because you're limited to simple ACLs policies and end up with too many management points to deal with.

    • @rallegade
      @rallegade Před 2 lety

      @@whiskerjones9662 I totally agree with this! The inherent problem is that all routing between the subnets will happen on the switch now and the firewall can not do anything about it.
      I must admit that I have not heard about this type of setup where OSPF can force the the traffic to be forwarded onto the firewall. It sounds like a dream scenario to be able to offload layer 2 to 3 traffic on the switch and then forward it to the router for it to do what it is supposed to do, separate, segregate and inspect the traffic.
      Could you possibly point me to a paper on a setup like this as I would be very interested in trying it out in my own lab, as I am having the before mentioned setup because of the penalties of intervlan routing on the firewall.
      Love learning new things!

    • @whiskerjones9662
      @whiskerjones9662 Před 2 lety +1

      @@rallegade When I say force, I'm really talking about using routing to influence your traffic flows. Longest match wins so this involves a bit of traffic engineering and planning to deploy but is very common in the wild. I'd suggest looking over the Cisco validated design guides for more specifics as a starting point. As with anything in life there are a million ways to accomplish the same goal so a lot of network design comes from experience with a focus on the KISS principle. Unfortunately a lot of the times we think we're really smart doing some fancy deployment only to find out that we end up with unintended consequences and a network/environment that's next to impossible to troubleshoot. I don't pretend that i'm the end all be all but I've certainly been in a lot of networks in my time - feel free to reach out and we can discuss more outside YT comments :)

  • @RodrigoYamamoto
    @RodrigoYamamoto Před rokem

    Very very very nice!

  • @pixma140
    @pixma140 Před 2 lety +1

    Hi, nice and interesting video! I was a little fascinated by the ASCI Diagramm, may I ask what tool do you use for that?

    • @christianlempa
      @christianlempa  Před 2 lety +3

      Hey thanks :D I'm using asciiflow and nerdfonts for the icons

    • @pixma140
      @pixma140 Před 2 lety

      @@christianlempa thank you very much!

  • @majormajors
    @majormajors Před rokem

    Thanks!

  • @IroxX0
    @IroxX0 Před 2 lety

    Great video, learned a lot.
    Maybe I'm a fool to suggest this but it seems to me that a product that is managed switch and firewall would spear one all the sending back and forth?

    • @christianlempa
      @christianlempa  Před 2 lety

      Thank you! :) Firewalls and Switches really have different use cases, a Firewall might have some features of a Switch and a Switch might have some features of a Firewall. But I always tend to buy these devices separately, as they're best at what they're built for.

  • @WizardsWoW
    @WizardsWoW Před 2 lety +3

    Hello :) Sorry, what app/website did you use to create the network diagram? Also, do you have any idea for a software that can create some similar diagram but automatically via SNMP or something maybe?

    • @christianlempa
      @christianlempa  Před 2 lety

      I use asciiflow for that

    • @papyconfig
      @papyconfig Před rokem

      If you want a complete solution for mapping your network, you can check what a CMDB is. It also provides a lot more features like tracking all your different server configurations
      It's way more overkill though

  • @RoboticParanoia
    @RoboticParanoia Před 2 lety

    Great video! What do you think of a Juniper Isg 2000 for a home lab firewall?

    • @christianlempa
      @christianlempa  Před 2 lety +1

      Thanks mate! Can't say anything good or bad about juniper, never tested

    • @RoboticParanoia
      @RoboticParanoia Před 2 lety

      @@christianlempa I was actually trained in juniper firewalls in 2000, but the isg didn't existed. This is the second one I touch. I'm kinda overwhelmed by the sheer power and the amount of resources it have. I didn't had time to tinker deep with it, I only set up two of its ports and trusted and untrusted and put standard rules so it can work, but I'm pretty sure I've seen something about virtualization. And surf shark. I'll definitely lose some nights of sleep on it after I finish the new cabling here and the rack arrives. It's everything piled on a coffee table of sorts. Even the no breaks. Poor table.

    • @RoboticParanoia
      @RoboticParanoia Před 2 lety

      @@christianlempa and again, loving your channel!

  • @ChristianWorks
    @ChristianWorks Před rokem

    Welches Tool hast du genutzt für das erstellen der Netzwerktopologie in Minute 2:16 ? Tolles Video!

    • @christianlempa
      @christianlempa  Před rokem

      Asciiflow, aber ich mach bald ein neues diagram mit einfacherer Software :) danke übrigens!

  • @victorshane4134
    @victorshane4134 Před 2 lety +2

    I use MikroTik devices only. I run my own WirelessISP and for home i have an overkill setup. I have 18 different VLANS for different stuffs and man, configuring a new AP or Switch can be painful :D

  •  Před 2 lety

    Interesting setup. Well explained.
    You mentioned you use the Fritzbox as a gateway.
    How do you handle the ITV from the ISP coming in on the Fritzbox? Or haven't you tried yet how to handle it coming from the Fritzbox? I ask this because I have trouble to route ITV on a L3 switch to a different vlan.
    Maybe you have a tip for me how to solve this.
    Vlan 4 internet, vlan 6 ITV, vlan 7 iptel is incoming from my ISP to my fritzbox.
    The only way I get it working is to have ITV on vlan 1 (default) on the switch. if i try to reroute to different vlan i get issues (stuttering & freezing). Any ideas???

    • @christianlempa
      @christianlempa  Před 2 lety

      Hmm no I haven't used ITV before, what is that?

    •  Před 2 lety

      @@christianlempa digital tv. We're I'm from were used to say ITV to that. It's more same as what happened to phones that are now VoIP. Hopefully it clears up the question.

  • @lumpiataoge9536
    @lumpiataoge9536 Před 9 měsíci

    that untagged and tagged VLAN configuration to fw was pretty smart. I haven't thought of that approach. Will this work if my switch doesn't have the PVID feature?

    • @christianlempa
      @christianlempa  Před 9 měsíci

      Thanks :) There are some switches that don't have a separate paid flag, in this case they usually treat the incoming packets the same as the outgoing.

  • @ShaileshYadav-jt1go
    @ShaileshYadav-jt1go Před 5 měsíci

    share more on sophos switch

  • @patrikgrguric535
    @patrikgrguric535 Před 2 lety +1

    This is amazing, but how much does this part 10gbit kind of network setup cost?

    • @christianlempa
      @christianlempa  Před 2 lety

      Wow, hard to say, but it's not cheap if you'd buy all this stuff

  • @jwspock1690
    @jwspock1690 Před rokem

    top video

  • @shamik464
    @shamik464 Před rokem +1

    How do we draw the ascii diagram like yours ?

  • @MichaelDoornbos
    @MichaelDoornbos Před měsícem

    What did you use to make the ASCII diagram?

  • @TheLateral18
    @TheLateral18 Před 8 měsíci

    Is it a good idea, to create a vlan for the ps5, pc and firestick? Using a managed switch

  • @johnharrison712
    @johnharrison712 Před rokem

    What is the cost of the firewall and switch with licenses, wanting to add something like this in my homelab.

  • @ierosgr
    @ierosgr Před 2 lety

    When you added sophos did you setup the router to be in bridge mode?

  • @Maik.iptoux
    @Maik.iptoux Před 10 měsíci

    Can you explain vlan interfaces in Proxmox?

  • @t-lm
    @t-lm Před rokem

    if you have multiple Unifi APs which have lets say 2 wifi networks (stuff and guest created in Unifi Controller) and connected to sophos on the same port (vlan1 &vlan2) via unmanaged switch how to prevent the two network see each other?

  • @danielberglv259
    @danielberglv259 Před rokem

    You should properly make a video on the various types of managed switches, as most videos on CZcams seams to indicate that a switch is either managed or unmanaged. However a managed switches does not all have the same feature sets, which I learned after buying one and found myself missing things like ACL. Especially TP-Link has very poor marketing with their naming schemas like having both "Smart Switch" and "Easy Smart Switch", where "Easy" just means that it's missing a lot of features.

  • @greenchapter
    @greenchapter Před 2 lety

    Which tool do you use for the markdown diagrams?

  • @a_landstander
    @a_landstander Před 3 měsíci

    What tools did you use to generate the ascii art network diagram?

  • @popquizzz
    @popquizzz Před 2 lety

    On a separate question: Is that Sophos firewall actually capable of deep packet inspection and processing those packets at WireSpeed of 20Gbps?

    • @christianlempa
      @christianlempa  Před 2 lety +2

      Yes it does DPI, the throughput depends on the hardware sizing though, you should check out the tech specs on the XGS devices and IPS/DPI throughput

  • @lopeschannel
    @lopeschannel Před 10 měsíci

    Hello, what tools do we use to make the diagrams in ASCII?

  • @AS-os3lj
    @AS-os3lj Před 4 měsíci

    How would I put all my unsecure WiFi IoT Devices in one group? Since I cant assign them to a specific vlan port? Or I am missing something?
    Do I have to use a separate access point just for my IoT Devices? Not sure if thats smart idea to have one access point for my trusted devices and one for my untrusted (IoT) devices.

  • @zaluq
    @zaluq Před 17 dny

    A question , could i use sophos XG as a switch and firewall for my network with a 4 port intel ethernet card or do I have to get a L2-3 switch also ?

    • @christianlempa
      @christianlempa  Před 16 dny +1

      You could use the XG as a switch, however, I would still recommend a L2-3 switch, which might be more performant and flexible for those tasks.

  • @David-bq2qh
    @David-bq2qh Před 2 měsíci

    Is it possible to have one pihole work in multiple vlans?

  • @Berkshire-Hathaway
    @Berkshire-Hathaway Před 2 lety

    Hello Christian,
    I still have big problems with my switch and my OPNsense FireWall.
    Could you maybe help me configure the Switch correctly?
    I'm still very confused by why my network doesn't work.

    • @christianlempa
      @christianlempa  Před 2 lety

      Hey, sorry I'm a little short on time, did you join the discord yet? Let's meet there and maybe me or somebody else can help you

  • @paulg117
    @paulg117 Před 6 měsíci

    how can i apply this so i can seperate my IoT devices from my private lan?

  • @benarcher372
    @benarcher372 Před 11 měsíci

    At around 01:50, does anyone know how to create these network maps/diagrams? I need to store the diagram in a markdown document. Thank you!

  • @billymorgan4611
    @billymorgan4611 Před rokem

    What do you mean by "Management" zone?

    • @christianlempa
      @christianlempa  Před rokem

      It's a different network that I use for my network devices

  • @actng
    @actng Před 2 lety

    what about the VMs? what VLAN are they on ?

  • @echobucket
    @echobucket Před 10 měsíci

    Did you use mermaid to create that network diagram?

  • @popquizzz
    @popquizzz Před 2 lety +1

    :yt:Some great comments below from Mr D, Jason Davis, and R G. I would only add as being a network engineer that goes back to the days of Wellfleet Routers, Cisco MGX Brouters and ArcNet, Banyan Vines, and good ole Token Ring. It is important to keep the syntax of packet and frame associated properly with the OSI layer being discussed. In almost every case where you prefaced "Frame" with Ethernet you were correct, but there were a few forgivable errors where you interchange a Layer 2 technology with the term packet which is Layer 3. Easy to do, but a gotcha term in some early career certification tests like CCNA and CompTIA . And if you get asked, ATM is a 53byte cell, 48 bytes payload, 5bytes header. And ask them what the hell are they using ATM for, if A) yhey are not a telco and B) when Ethernet is so much easier 🤣🤣🤣

    • @christianlempa
      @christianlempa  Před 2 lety +1

      Ouch, I thought I got it right 🤣

    • @popquizzz
      @popquizzz Před 2 lety

      I even made the error in my comment where this should read 48bytes payload not bits. Big difference.

  • @AllahomAnsorGaza
    @AllahomAnsorGaza Před 2 lety

    i hope you back to docker tuts
    and docker tools like portiner
    and mail cow tools thats was awesome and I look for more

  • @mistakek
    @mistakek Před 2 lety +1

    This is why I prefer Unifi. It's just so simple. Create the VLANS, click the port, select the VLAN from the drop down menu. DONE.

  • @PowerUsr1
    @PowerUsr1 Před rokem

    LAG doesn’t increase speeds it increases throughout. Flows are still limited by the speed of the member link….

  • @thelitepredator
    @thelitepredator Před 6 měsíci

    @16:29 my gah seems so hard 😓

  • @notta3d
    @notta3d Před rokem

    Helpful video but I am still struggling with it. I think I've watched every VLAN video on CZcams and I don't think I've seen a single example of Inter-vlan routing on the same switch. For example and take the router and the needed firewall rules out of play here, you have vlan for a single workstation. Another VLAN for a single printer. Lastly, another vlan for file server. All these devices are all plugged into the same switch (48 port in my case.) Now workstations without printing and access to a file server would be useless don't you agree? In this case should the port for the workstation and printer be set as access(untagged?) I guess the server port would be trunked(tagged) because the 2 vlans need to talk? Don't even get me started on the PVID!!! I just don't understand why I can't grasp this concept.

    • @christianlempa
      @christianlempa  Před rokem

      I agree the concept is hard to understand. You can use tagged ports if your device is aware of vlans and you configure the different ids and networks on the interface. Typically you use it to send multiple virtual networks through a single port. Untagged means the port is not aware of vlan ids and just bound to one specific vlan. The PVID should be configured according to the vlan Id of an untagged port.

  • @krisboeckx8997
    @krisboeckx8997 Před 2 lety +5

    You should NOT put your local servers in a DMZ, DMZ is normaly used for internet faced servers. Not local servers. So DMZ in used wrongly here.

    • @christianlempa
      @christianlempa  Před 2 lety +4

      Sorry but that is just pedantic, a DMZ is a separate zone between your LAN and WAN where to put devices that are controlled by firewall rules. Nobody says it can't be used for this and that. The point here is to show how to protect your home servers.

  • @adrianbonde4675
    @adrianbonde4675 Před 2 lety +1

    /16 Network in an Home Environment doesnt make any sense :D

  • @resonanceofambition
    @resonanceofambition Před 8 měsíci

    20 jesus christ the times we are living in.

  • @MorgorDre
    @MorgorDre Před 6 měsíci

    1) your Internet is most likely slower than 20Gbit/s, the argument of needing LAG for Internet is … lame at best
    2) most people fail to explain what actually makes VLAN „secure“
    You are until now, the most close as you at least mentioned that the traffic goes over firewall
    But
    As most VLAN teachers you did not mention the downsides
    3) unfortunately most people come from cost-saving perspective, so instead of buying 2 cheap switches and run them over firewall, they buy one big one with more ports and start fiddling around, replicating the experience you would have if you just would have used 2 instead
    Espescially worse if you have 2 unused laying around, but feel the urge to buy a new one

  • @Notjohhnn
    @Notjohhnn Před 10 měsíci

    Please slow down Ur speed mate

  • @Alex-sc2rc
    @Alex-sc2rc Před rokem

    Well I bet you work in german public services. There is no other reason for using Sophos :D

  • @emsicz
    @emsicz Před 7 měsíci

    This was too complex of a setup for me to understand concept of VLANs.