Network Gear
jjames
Posts: 2,908
So what's your network gear of choice? (i.e. switches, routers, access points, etc.)
We had been using standard Linksys stuff, and have recently decided to fiddle with Cisco gear. Boy do I miss the Linksys interface.
We had been using standard Linksys stuff, and have recently decided to fiddle with Cisco gear. Boy do I miss the Linksys interface.
0
Comments
We use Linksys on the low end and Cisco on the high end. For most our larger systems we pretty much insist the client go with an enterprise level network.
In the grand scheme of the project, it's not that much money comparitively.
Thanks
Sure . . . let me find some words to describe it: $!@#$!, and ##$$!$#!, and #$!#$!# a royal #$!#$!#$ in the #$#!$!!!!!!!
Definitely not friendly if you have no experience whatsoever setting up a Cisco router. They're not plug and play like many of the standard routers out there (i.e. your RV082 or RV016s.) Trust me, having some of the Cisco features is nice, i.e. NAT (setting it up so outside port 5901 goes to 192.168.1.51:5900 and outside port 5902 goes to 192.168.1.52:5900) and static DHCP (though haven't played with that), but to be honest . . . it provides nothing that we couldn't do with an RV016. I've talked to several people who deal with Cisco equipment on a daily basis and they say that unless you're going to deal with it on a daily basis, don't sign up for the training - it'd be a waste because there's SO MUCH to know / learn.
I'm going to suggest to my boss that we switch back over to the Linksys RVxxx series stuff, though those were the exact pieces we were having problems with that made want to go with Cisco. Even their access point stuff is a bit screwy for every day usage. Want to do WPA with a Cisco AP? You'll need to either have a RADIUS server at hand or configure your AP to handle the local authentication which involves a 19 step process; which all of course all documentation is for the command line interface, even though there is a section in the GUI to set it up . . . it's a royal pain. A standard $80 Linksys WAP54G can do WPA in a heart beat, but a $600 Cisco 1100 Series AP takes 19 steps (at least.)
So . . . perhaps this is more detail but this explains why I'm looking for suggestions and seeing what you guys use for your networking gear.
Licensing is on-going for the firewall, but it's well worth it. Since installing these in place of an RV*** series business class linksys, we've had not a lick of trouble. Previously we were having issues almost weekly with the units. The RV*** series units seem to be rock solid in a single service provider environment,but when you place them into a multi-service provider configuration, they do seem to have issues.
Brad
We had worked with Linksys and Netgear on their low end product and really was having problems. Actually this morning we are going out to a job to fix some stuff on these routers. Yes, they are simple, but they've had DHCP assigning issues and in this particular job have had to be reset.
So we changed manufactures. We use Secure Computing for our routers, Pakedge for our WAPs and switchers. In our newer jobs once they are deployed they just work. We ended up swapping out our office with these devices. Another good thing is they are rather easy to implement, and rather profitable without 2 years of certification (although it is justified).
I don't know about anyone else, but I always put the control system onto a static address range, and with the ProSafe, I can easily assign those static addresses to the relevent MAC addresses within the DHCP tables once they are online - personnally I think this its a safer approach. I can leave DHCP available with a small free pool of addresses for any visiting laptops etc that may need access.
Of course you need keep a copy of the router configuration just in case it craps out.
The Waps work well and have dual A/G. You can also easily setup clusters of Waps. The switches are nice with rack mounted ears and integrated power.
My preference has always been Netgear, though there are some older models that don't play nice at 100k speeds with AMX, I don't think any of the current models have that issue.
Okay . . . just wanna make sure, when you say NAT, you do mean something comes in on port 5901 and you can route it to a specific IP on port 5900 . . . right?
Is that what you wanted?
Thanks for posting the information, I should have done that when I found out.
I am looking for the a robust router, switch, and AP solution that will hopefully keep me south of the Cisco price point and learning curve. I have experimented with a few entry level and lower SMB class routers without being completely satisfied with any of them.
Typical goal for a Netlinx controlled residence:
A Single Cable Internet (or DSL) Service
VNC that can access all VLans
Minimum 2 VLAN setup
Port Translation would be nice, but is not necessary
VLan1 - Automation Equipment (AMX, Security, AV, APs for TPs)
VLan2 - Home Owners Computers and APs for Laptops
VLan3 - (optional) Kids Computers/Guest Computers access internet only
The basic system would be able to use a managed switch and only use the VLans to optimize network overhead, but for larger homes I would like to be able to setup security to keep kids computers from accessing VLAN1 and Home Owners computers to require a separate password to access the Request or Virtual Keypads.
The solutions I am starting to research right now are Netgear, 3com, and Secure Computing. Any thoughts, or am I asking for too much free info?
So far the managed switches are way over my head but I'm hoping that as I use them I'll get to know them a little better. There are also some issue with managed switches and MAX and possibly something else I read recently where the spanning tree's (if enabled) ports should be set to "port fast" or soemthing to that affect.
Has anyone here ever come across the Sonicwall range of products (TZ180 router or the Sonicpoint WAP)?I have been recommended it by a network professional here in Ireland but cannot be certain how well it works with AMX gear.
Jeff
Shane
I would suggest reading the documentation to get an idea about how to set it up, the administrator's manual is 843 pages long. http://www.sonicwall.com/us/support/5939.html
As a disclaimer, I was also thrown into a last second, no notice job in Hawaii and was under extreme duress to get everything working properly when I was trying to set up the TZ180, so that may have been part of it. I was traumatized enough that I haven't wanted to look at the manual again, but I'll have to since we're going back pretty soon.
From what I haven't blocked out of my mind about the whole experience, I believe the TZ180 was pretty robust though and has so far proven to be extremely reliable.
--John