Question Router/Firewall + POE WiFi Access Points?

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Mr Bob

Golden Member
Sep 6, 2004
1,757
12
81
I'm currently updating a fairly complex / device-rich network at our house. When we moved into a new house, I had to quickly deploy 4 Google WiFi points just to setup an inexpensive network with WiFi, having full coverage. The new setup will be mostly hard wired, with POE runs to 2-3 areas for WiFi coverage.

Hard wired to modem is just below gigabit speeds via the ISP, so I'd like to keep the wired network as close to that as possible.

So now I need a router / firewall / gateway, as well as 2 or 3 POE WiFi access points to provide coverage, and with only 1 device running, being able to pass that gigabit speed through to the router.

I've looked around, it seems like Cisco has a few cloud solutions, Zyxel listed a handful of routers but they weren't true gigabit when the firewall was enabled. Kind of pointless to lose that much bandwidth...

Any suggestions? The more management options/information, the better... Ideally, I'd like to keep it under $1k.
 

SamirD

Golden Member
Jun 12, 2019
1,489
276
126
www.huntsvillecarscene.com
So I ordered a UniFi Dream Machine Pro to go along with 3 POE WiFI APs and 1 POE Outdoor WiFi AP. Hope this doesn't turn out to be super cheap / low grade hardware... Seems like there's even an option to power cycle the modem when it detects loss of connection. I totally could see that being used.
I think you'll be pretty happy with the performance. I haven't seen any ubiquiti stuff personally, but I've read so many people's setups and satisfaction with the overall performance that I think you'll be really satisfied. And I'm very interested in hearing what you think of it and any oddities.
 

Genx87

Lifer
Apr 8, 2002
41,095
513
126
Go to Ebay, look for an used Sophos SG135 or 200 series or higher. Grab free Sophos XG Home edition. It will provide every feature the paid for version offers except Sandstorm. It is also limited to 50 concurrent devices. Install free version onto Sophos device and away you go. I grabbed SG230s for ~$170 a couple months ago. You could put them into HA for double the price.

Ubiquiti makes nice switches\WAPs. But not impressed with their edge devices.

Edit: Oops didnt see you already ordered.
 

Mr Bob

Golden Member
Sep 6, 2004
1,757
12
81
This system has to be the best piece of technology I've ever owned or configured. So many small business type features.

Assuming the hardware holds up, I'm able to cover a 3500sqft home with 2 APs instead of the 4 Google WiFi devices we had previously.

Every click on the internet just moves instantly, no matter where you're at.

 

Mir96TA

Golden Member
Oct 21, 2002
1,949
37
91
As a full UniFi echo system user, I would say their F.W. are from yesterday days, and limited in IDS/IPS. PFsense are days better, you can run off dedicated computer (Laptop or low energy computer) or VM ware.
I do like UniFi DPi and echo system, but world has move to SSL, and DNS over https. Their echo system of dashboard, traffic info, user info, hardware info etc is nice glass gadget to look at it.
It is a time to look L7 F.W. i.e. PaloAlto P220 may be. Not sure about the cost
With DPi on I can easily it 1Gige wire speed.
 

Attachments

  • Topology.JPG
    64.6 KB · Views: 3
  • OverView.JPG
    47.4 KB · Views: 3
  • DPi.JPG
    23.3 KB · Views: 3
  • Dshboad.JPG
    98.4 KB · Views: 4
Reactions: SamirD

Mir96TA

Golden Member
Oct 21, 2002
1,949
37
91
As of right now UniFi switches are L2 switches, not a big deal for SOHO setup.
In bigger network, there would be lot of over utilization of Router interface (Router on Stick concept).
 

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126
world has move to SSL, and DNS over https.

Believe Unifi will improve its firmware over time.

Chrome and Fiefox already supports DNS over https. You just have to enable them.



Windows 10 will integrate DNS over HTTPS too in the future.
 

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126
O sorry it is
How about this beast.
Well, no home user needs that kind of beast, which weighs 41 lb and use avg 270 watts. UDM-Pro max out at 33w.
 

Genx87

Lifer
Apr 8, 2002
41,095
513
126
PFSense or Sophos Home provide NGFW capabilities that can run on minimal bare metal. I run XG Home v18 on a pair of Sophos SG 230s I got off Ebay for a combined ~350 bucks. That is my gripe with Unifi edge devices. The world has moved onto TLS, including the scammers. In a cruel twist TLS which was to make us more secure actually made us less. As a lot of our legacy firewalls lacked the capability or performance to play man in the middle for TLS connections. Thus allowing the scammers a way around some of the most vital part of a defense.
 
Reactions: mxnerd

Genx87

Lifer
Apr 8, 2002
41,095
513
126
It truly amazes me how far the 'home' network as come. If you're talking Palo Alto gear, you're definitely up there with enterprise costs (and performance/features). Too rich for my blood, lol.

A lot of this technology has finally filtered down to the home user space. It is great for people who are willing to invest time to learn it as these technologies will provide a level of safety unseen in the home space before.
 

Mir96TA

Golden Member
Oct 21, 2002
1,949
37
91
PFSense or Sophos Home provide NGFW capabilities that can run on minimal bare metal. I run XG Home v18 on a pair of Sophos SG 230s I got off Ebay for a combined ~350 bucks. That is my gripe with Unifi edge devices. The world has moved onto TLS, including the scammers. In a cruel twist TLS which was to make us more secure actually made us less. As a lot of our legacy firewalls lacked the capability or performance to play man in the middle for TLS connections. Thus allowing the scammers a way around some of the most vital part of a defense.
Because, it would require SSL session inspection, meaning F.W. good beefy hardware & software for SSL sessions. That mean devices need certificate or some sort of trust certificate pinning system. IT-PC support admin can't even handle that let alone average home office user.
It is best not go there.
 

Mr Bob

Golden Member
Sep 6, 2004
1,757
12
81
I'm just not sure that in a home type of environment, with a basic modem, how anything above an old WRT54G wouldn't provide the necessary firewall protection. Nothing would handle a home connection against a DDos attack, so that's not the level of concern I have nor something I would try to prevent against.. not going to run the CPU power to stop that.

Can anyone explain why I would NOT be protected without this high level firewall? Seems like if you're not opening up your network so much to the outside, it's pretty tough to take advantage.

I have to account for things like the fact there's an internet cord outside the house, connected to a camera 20 ft from the ground. So I have to protect against things like that so people can't plug in directly and access my network (yay for VLANs). I just don't see how if I ran Ubiquiti why I would need to run the advanced firewall features.

I haven't had time to play around with that yet, cords are still running through the floor of the house.

Apparently one of the Google WiFi points was left powered on while my new network was being created. This was causing the UDM Pro to throw "Rogue Access Point Detected" errors, all enabled by DEFAULT. That's some good out of the box protection.
 

Genx87

Lifer
Apr 8, 2002
41,095
513
126
I'm just not sure that in a home type of environment, with a basic modem, how anything above an old WRT54G wouldn't provide the necessary firewall protection. Nothing would handle a home connection against a DDos attack, so that's not the level of concern I have nor something I would try to prevent against.. not going to run the CPU power to stop that.

Can anyone explain why I would NOT be protected without this high level firewall? Seems like if you're not opening up your network so much to the outside, it's pretty tough to take advantage.

I have to account for things like the fact there's an internet cord outside the house, connected to a camera 20 ft from the ground. So I have to protect against things like that so people can't plug in directly and access my network (yay for VLANs). I just don't see how if I ran Ubiquiti why I would need to run the advanced firewall features.

I haven't had time to play around with that yet, cords are still running through the floor of the house.

Apparently one of the Google WiFi points was left powered on while my new network was being created. This was causing the UDM Pro to throw "Rogue Access Point Detected" errors, all enabled by DEFAULT. That's some good out of the box protection.

People believe firewalls are there to protect them from traffic coming inbound(internet). Truth is it is there to stop traffic leaving your network. NAT will stop anything originating from the outside to an inside address. But they actually will need a firewall to stop endpoints from dialing home to a botnet, or going to a website that is known for malware, or stop malware\virus in it's tracks when the endpoint requests the payload. Further advanced features delve into IPS\IDS\ATP, Application layer filtering, web filtering(URL) and HTTPS decryption. Ubiquiti can do many of the previous features. But my complaint is if they are going to offer enterprise like features. They need to offer HTTPS decrypt. Without HTTPS decrypt capability web filtering takes a hit and sets them back about a decade compared to the competition. Many malware sites are now encrypting their traffic. Without HTTPS the malware will come through because the firewall cant inspect the traffic due to being encrypted.

And yes it does take setting up with the firewall's certificate installed on the endpoint. But this can also be accomplished with an agent install that hooks into the firewall ala Z-Scaler. An agent would make certificate install seamless.
 
Last edited:

Mir96TA

Golden Member
Oct 21, 2002
1,949
37
91
People believe firewalls are there to protect them from traffic coming inbound(internet).
That is what F.W. do. It's security called policy. I mean it cannot stop traffic is trying to enterin . However it will get dropped or permitted depending on security policy at the outside interface.
Truth is it is there to stop traffic leaving your network.
Again security policy can do that.
NAT will stop anything originating from the outside to an inside address.
NAT is basically address forwarding table. Nothing more than that.
Yes if NAT table does not have an entry (Dynamic) for return traffic, it may get forwarded by NAT static table or get droped
But they actually will need a firewall to stop endpoints from dialing home to a botnet, or going to a website that is known for malware, or stop malware\virus in it's tracks when the endpoint requests the payload. Further advanced features delve into IPS\IDS\ATP, Application layer filtering, web filtering(URL) and HTTPS decryption. Ubiquiti can do many of the previous features. But my complaint is if they are going to offer enterprise like features.
IPS/IDS and other threat prevention can inspect data at network level.
L7 that is for control the access beyond port and IP

And yes it does take setting up with the firewall's certificate installed on the endpoint. But this can also be accomplished with an agent install that hooks into the firewall ala Z-Scaler. An agent would make certificate install seamless.
If they are using certificate pining MS OS system, all F.W. need Root CA, and and sign off subordinate certificate from local CA authority. No distribution is required.
if it is SOHO (AKA no CA ) setup install manually
However SSL inspection requires lot of processing power on F.W. picking a right size of F.W. is key for success.
 

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126
Thanks folks.. sounds like I might have a website or two to whitelist if I turn a few things on.

I use ad-blocking/malicious DNS Pi-Hole a few months ago and I gave up finally.

It blocked so many websites that my local grocery store's ads can't be viewed. I had to debug the DNS log to find out what's blocked.

Now I use Chrome extension Ghostery instead.
 
Last edited:
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |