Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Basic networking/subnetting question.

Basic networking/subnetting question.

Scheduled Pinned Locked Moved Selfhosted
selfhosted
65 Posts 15 Posters 465 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M This user is from outside of this forum
    M This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

    Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

    Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

    What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

    If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

    Thanks!

    C B C lettuceeatlettuce@lemmy.mlL ? 12 Replies Last reply
    1
    1
    • System shared this topic on
    • M [email protected]

      Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

      Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

      Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

      What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

      If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

      Thanks!

      C This user is from outside of this forum
      C This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      I would just get a basic layer 2 managed switch and use VLANs. The 5 port and 8 port switches are super cheap these days.

      M 1 Reply Last reply
      0
      • C [email protected]

        I would just get a basic layer 2 managed switch and use VLANs. The 5 port and 8 port switches are super cheap these days.

        M This user is from outside of this forum
        M This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        It's not that they are expensive, it's that they run archaic proprietary OSes which the consumer cannot control. I cannot trust such a switch when the rest of my network depends on it. Please let me know if something in the post didn't make sense.

        C 1 Reply Last reply
        0
        • M [email protected]

          It's not that they are expensive, it's that they run archaic proprietary OSes which the consumer cannot control. I cannot trust such a switch when the rest of my network depends on it. Please let me know if something in the post didn't make sense.

          C This user is from outside of this forum
          C This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Put a multi port NIC in your router PC and use a separate unmanaged switch for each network then.

          M 1 Reply Last reply
          0
          • C [email protected]

            Put a multi port NIC in your router PC and use a separate unmanaged switch for each network then.

            M This user is from outside of this forum
            M This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Thanks but as I mentioned that will not scale. I'm interested in if separating computers by subnets will work. Have you tried something like this?

            pogogunner@sopuli.xyzP 1 Reply Last reply
            0
            • M [email protected]

              Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

              Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

              Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

              What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

              If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

              Thanks!

              B This user is from outside of this forum
              B This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

              Ok, so you are trusting the PCs which you need to keep separate.

              There's no way to know if one of them is hoovering all the traffic from the other, if they are both connected to the same unmanaged switch.

              https://youtube.com/playlist?list=PLjVwd8FlHBASO5vLBtMYNOzm8Q9DegSjO

              M 1 Reply Last reply
              0
              • M [email protected]

                Thanks but as I mentioned that will not scale. I'm interested in if separating computers by subnets will work. Have you tried something like this?

                pogogunner@sopuli.xyzP This user is from outside of this forum
                pogogunner@sopuli.xyzP This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                It's been a long time since I actually used subnets, but IIRC you will need a physical interface for each network on the router regardless.

                So let's say you set up your /24 network into 2x /25's, you will need an interface for the .0 network, and another for the .128 network

                If you just have an interface for the switch, and another for the WAN connection, I don't think subletting will work for what you're trying to do

                M 1 Reply Last reply
                0
                • B [email protected]

                  I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

                  Ok, so you are trusting the PCs which you need to keep separate.

                  There's no way to know if one of them is hoovering all the traffic from the other, if they are both connected to the same unmanaged switch.

                  https://youtube.com/playlist?list=PLjVwd8FlHBASO5vLBtMYNOzm8Q9DegSjO

                  M This user is from outside of this forum
                  M This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  The computers will be running OpenBSD. I am researching hardening methods for them and also seeing if it is feasible for me to get Corebooted hardware. I didn't mention it because I didn't think it was important.

                  I feel like my post is being taken very negatively with people finding faults in my words rather than in the networking concept. Would you happen to know why?

                  B 1 Reply Last reply
                  0
                  • M [email protected]

                    Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

                    Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

                    Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

                    What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

                    If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

                    Thanks!

                    C This user is from outside of this forum
                    C This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    One of the PCs can spoof the MAC of the other and receive its Ethernet frames.

                    M 1 Reply Last reply
                    0
                    • pogogunner@sopuli.xyzP [email protected]

                      It's been a long time since I actually used subnets, but IIRC you will need a physical interface for each network on the router regardless.

                      So let's say you set up your /24 network into 2x /25's, you will need an interface for the .0 network, and another for the .128 network

                      If you just have an interface for the switch, and another for the WAN connection, I don't think subletting will work for what you're trying to do

                      M This user is from outside of this forum
                      M This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #10

                      Hmm, so virtual interfaces on the router won't work? I admit I'm a bit stumped, would you be able to give me an ELI5 on why this is the case? I will try and read up more, of course

                      1 Reply Last reply
                      0
                      • C [email protected]

                        One of the PCs can spoof the MAC of the other and receive its Ethernet frames.

                        M This user is from outside of this forum
                        M This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        Thank you for that. I'd also like to ask you: is that a possibility too if one were to configure a trunk port on a switch and plug the PCs in?

                        C 1 Reply Last reply
                        0
                        • M [email protected]

                          Thank you for that. I'd also like to ask you: is that a possibility too if one were to configure a trunk port on a switch and plug the PCs in?

                          C This user is from outside of this forum
                          C This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          That would be worse, because then it would send and receive traffic for multiple vlans.

                          Unless your switch uses that to refer to link aggregation instead of vlan trunking. Network terminology like that can mean different things to different vendors.

                          M 1 Reply Last reply
                          0
                          • M [email protected]

                            The computers will be running OpenBSD. I am researching hardening methods for them and also seeing if it is feasible for me to get Corebooted hardware. I didn't mention it because I didn't think it was important.

                            I feel like my post is being taken very negatively with people finding faults in my words rather than in the networking concept. Would you happen to know why?

                            B This user is from outside of this forum
                            B This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            You are basically asking for people to solve a solved problem, there's no actual need for keeping the PCs separate since you control them both, and oh and you want it done cheap. A bespoke custom solution will not scale regardless if you need it to or not, you should know that.

                            https://hometechhacker.com/great-choices-for-opnsense-hardware/

                            A firewall device with as many ports as you need is your best bet.

                            M 1 Reply Last reply
                            0
                            • C [email protected]

                              That would be worse, because then it would send and receive traffic for multiple vlans.

                              Unless your switch uses that to refer to link aggregation instead of vlan trunking. Network terminology like that can mean different things to different vendors.

                              M This user is from outside of this forum
                              M This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              I'm using Cisco terminology so it likely means VLAN trunking unfortunately (unless I missed something)

                              1 Reply Last reply
                              0
                              • B [email protected]

                                You are basically asking for people to solve a solved problem, there's no actual need for keeping the PCs separate since you control them both, and oh and you want it done cheap. A bespoke custom solution will not scale regardless if you need it to or not, you should know that.

                                https://hometechhacker.com/great-choices-for-opnsense-hardware/

                                A firewall device with as many ports as you need is your best bet.

                                M This user is from outside of this forum
                                M This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                asking for people to solve a solved problem

                                Solved using devices that run proprietary software (which is, I imagine, frowned upon in such communities) which we don't control at all. Heck, even Mikrotik who has a good rapport with this community uses a proprietary Linux distro with a severely outdated kernel for their devices. For something as critical as internal networking, I'm surprised I do not see more dialogue on improving the situation.

                                Let me try and explain the problem. I want to build a setup where I have multiple clustered routers (I'm sure you've heard of the clustering features in PFSENSE/OPNSENSE/DIY approach using Keepalived). But if I want to use VLANs without using a switch running god-knows-what under the hood, I'm going to need a LOT OF ports. Unfortunately, 6+ port PCIe cards are quite expensive and sometimes have many other problems.

                                This is why I'm trying to find simpler solution. The solution that you mention doesn't seem to be a solution at all, but just the community giving up on trying to find one and accepting what is given. I was hoping for a better outcome.

                                B 1 Reply Last reply
                                0
                                • M [email protected]

                                  asking for people to solve a solved problem

                                  Solved using devices that run proprietary software (which is, I imagine, frowned upon in such communities) which we don't control at all. Heck, even Mikrotik who has a good rapport with this community uses a proprietary Linux distro with a severely outdated kernel for their devices. For something as critical as internal networking, I'm surprised I do not see more dialogue on improving the situation.

                                  Let me try and explain the problem. I want to build a setup where I have multiple clustered routers (I'm sure you've heard of the clustering features in PFSENSE/OPNSENSE/DIY approach using Keepalived). But if I want to use VLANs without using a switch running god-knows-what under the hood, I'm going to need a LOT OF ports. Unfortunately, 6+ port PCIe cards are quite expensive and sometimes have many other problems.

                                  This is why I'm trying to find simpler solution. The solution that you mention doesn't seem to be a solution at all, but just the community giving up on trying to find one and accepting what is given. I was hoping for a better outcome.

                                  B This user is from outside of this forum
                                  B This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  Not liking the solution you have doesn't mean you don't have a solution.

                                  Anyway, watch the playlist I sent, it's a great overview of the OSI model with some other stuff. You mentioned not understanding some layers, once you do you will understand the limitations of the hardware you have.

                                  1 Reply Last reply
                                  0
                                  • M [email protected]

                                    Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

                                    Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

                                    Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

                                    What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

                                    If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

                                    Thanks!

                                    lettuceeatlettuce@lemmy.mlL This user is from outside of this forum
                                    lettuceeatlettuce@lemmy.mlL This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #17

                                    Have you looked into Tailscale or an equivalent solution like Netbird?

                                    You could set up a tailnet, make create unique tags for each machine, add both machines to the tailnet, and then set up each machine's network interface to only go through the tailnet.

                                    Then you just use Tailscale's ACLs with the tags to isolate those machines, making sure they can only talk to whatever central device(s) or services you want them to, but also stopping them from talking to or even seeing each other.

                                    M 1 Reply Last reply
                                    0
                                    • M [email protected]

                                      Sorry for being such a noob. My networking is not very strong, thought I'd ask the fine folks here.

                                      Let's say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

                                      Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

                                      What I'm asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

                                      If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

                                      Thanks!

                                      ? Offline
                                      ? Offline
                                      Guest
                                      wrote on last edited by
                                      #18

                                      If computers are in same network, even with different ip addresses, they still can see all broadcast and multicast traffic. This means for example dhcp.

                                      If you fully trust your computers, and are sure that no external party can access any of them, you should be fine. But if anyone can fain access any computer, it is trivial to gain access to all networks.

                                      If you need best security, multiple switches and multiple nics are unfortunately only really secure solution.

                                      M N 2 Replies Last reply
                                      0
                                      • lettuceeatlettuce@lemmy.mlL [email protected]

                                        Have you looked into Tailscale or an equivalent solution like Netbird?

                                        You could set up a tailnet, make create unique tags for each machine, add both machines to the tailnet, and then set up each machine's network interface to only go through the tailnet.

                                        Then you just use Tailscale's ACLs with the tags to isolate those machines, making sure they can only talk to whatever central device(s) or services you want them to, but also stopping them from talking to or even seeing each other.

                                        M This user is from outside of this forum
                                        M This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        I never considered tailscale for my LAN, but it's certainly an intriguing idea. I suppose running Headscale as a VM on my router isn't that difficult. Thank you, I will think about it a bit more

                                        lettuceeatlettuce@lemmy.mlL 1 Reply Last reply
                                        0
                                        • ? Guest

                                          If computers are in same network, even with different ip addresses, they still can see all broadcast and multicast traffic. This means for example dhcp.

                                          If you fully trust your computers, and are sure that no external party can access any of them, you should be fine. But if anyone can fain access any computer, it is trivial to gain access to all networks.

                                          If you need best security, multiple switches and multiple nics are unfortunately only really secure solution.

                                          M This user is from outside of this forum
                                          M This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20

                                          No, I do not trust my computers that much. Quite unfortunate, really that I'll have to build a whitebox switch to get what I want

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups