Quote from: pfry on March 22, 2025, 09:07:50 PMIs having the PC connected directly to igc1 a long-term plan? Your initial troubleshooting effort was good, but under normal operation would you expect any reliability issues from the switch?I don't know if you saw my reply to your message but I added a little extra detail:
Quote from: simonmb on March 22, 2025, 06:41:25 PMlet's start afresh with what I'm currently doing and maybe there's a better way.
I have my router, switch and AP all on 192.168.11.0/24.
I've configured an interface on the router to carry 5 vlans (192.168.11.0/24, .12, .13, .19) to a switch, which an AP (carrying same vlans) is connected.
One port on my router (192.168.14.0/24) is connected to an NVR.
I mostly manage my networking equipment from a computer on 192.168.12.0/24 which is connected to the switch (access controlled by firewall rules).
Occasionly I've connected a laptop directly to the router (the port assigned to 192.168.11.0/24) when I've suspected problems with the switch, or if I've misconfigured access from 192.168.12.0/24, although I can't even remember the last time I did it, but because I had spare ports I thought I'd replicate it.
Quote from: pfry on March 22, 2025, 09:07:50 PMAs for the WAN/Internet interface, you have... well, lots of options, depending on how you want to plug it up.To be honest I want to keep things as simple as possible because my knowledge in this area is limited. I want the vlans to do the heavy lifting for network segregation, and a handful of firewall rules to allow access from HOME (.12) to CCTV (.14) and mDNS and SSDP between HOME (.12) and IOT (.13) for audio streamers.
With a bridged ".11" subnet you could place other devices in the subnet, connected through the firewall, and filter them (e.g. other devices on the ".11" bridge, like your PC on igc1). This has the advantage of allowing you to connect said equipment directly to your router and bypass the firewall if necessary/desired.