Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. The KISS principal really applies to networks...

The KISS principal really applies to networks...

Scheduled Pinned Locked Moved The Lounge
sysadminalgorithmsjsonworkspace
23 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J jschell

    My understanding is that fiber does not get run to a house. Might not even be all that close. So it would never fix what you are describing.

    dandy72 wrote:

    I had DSL through Bell Canada

    Where I live utilities are beholden to a 'utilities commission'. Looks like most of Canada is also. That is where you should file grievances. Also perhaps find an individual on it and start contacting them directly. A Guide to All Provincial Utility Commissions in Canada – EnergyRates.ca[^]

    D Offline
    D Offline
    dandy72
    wrote on last edited by
    #10

    If I was a Twitter user, and one who didn't mind having his name splattered all over the place, I would've been very, very tempted to make this a very public thing. But, you have to pick your battles, and I, for one, don't see myself going toe-to-toe with the likes of freaking Bell Canada. Right now, I have a working replacement. Bell is going to be completely out of the picture very soon.

    1 Reply Last reply
    0
    • D dandy72

      I know enough about networking--clearly enough to be dangerous--but not enough to resolve all problems. My network configuration started simple, but grew in complexity over time (years in the making). Trying to reconfigure everything all at once just proved to be too much. I recently switched ISPs (there's a long and sad story that goes with that, which I won't get into), and I had to put the KISS principal into practice. The theory was that I'd only have to disconnect the wire from my DSL modem (which went into my router) and hook it up to the new provider's router. A full day later, I: a) removed 2 routers, both providing wi-fi b) had the new provider's router bypassing the router and going directly into a switch c) removed a pair of Ethernet-over-powerline adapters altogether d) replaced one of the routers with a second switch e) ran a cable between both switches f) got Pi-hole out of the equation This means the ISP's router is now doing all the heavy lifting (whereas it used to be my own router's responsibility), including wifi, which means I'm now more at the mercy of that one router than I've ever been. But the rest of it is comparatively soooo simple... The complete saga is just way too long to get into in detail. Suffice it to say that having multiple routers on the same network is just going to end up badly, with each router trying to assert itself as being in charge of everything, and it's a fight to the death. Do that over wireless on both ends, and that's just a recipe for disaster. At the very least I want to eventually re-introduce Pi-hole, as I've now been reminded just how bad some pages are without some serious ad-blocking. But I've been seriously burnt this weekend, and I want to take it a step at a time.

      J Offline
      J Offline
      Jeremy Falcon
      wrote on last edited by
      #11

      dandy72 wrote:

      This means the ISP's router is now doing all the heavy lifting (whereas it used to be my own router's responsibility), including wifi, which means I'm now more at the mercy of that one router than I've ever been.

      I do the same, just to keep it simple. But, I still buy my own router that just works with their service. So, in effect, it's not really different than having my own router inside the network elsewhere. Just less stuff to mess with.

      Jeremy Falcon

      D 1 Reply Last reply
      0
      • D dandy72

        That is exactly my concern right now. Every system on my LAN is now back on the internet, and I seriously stressed out about it, so I'm not quite ready to tackle this. But this is how I was set up previously - the ISP's modem (and that's all it was, a DSL modem, not a router) just played dumb, and *my* router--outside of their control--was responsible for everything. But I'm now dealing with a router from my new ISP, and I really don't like it this way.

        S Offline
        S Offline
        Shuqian Ying
        wrote on last edited by
        #12

        You could try to call your ISP and let them to set the router to bridge mode (it most likely can be done remotely) by telling them you know how to setup an internal private router when you are ready. The default settings of the ISP (not in Canada) I am using is also use the router they provide, which is not that good, but I asked them to allow using my own one.

        D 1 Reply Last reply
        0
        • S Shuqian Ying

          You could try to call your ISP and let them to set the router to bridge mode (it most likely can be done remotely) by telling them you know how to setup an internal private router when you are ready. The default settings of the ISP (not in Canada) I am using is also use the router they provide, which is not that good, but I asked them to allow using my own one.

          D Offline
          D Offline
          dandy72
          wrote on last edited by
          #13

          Here's a theoretical question. If I didn't want to reconfigure their router (or only apply the absolutely minimal number of changes), but introduce one of my own routers between *it* and my main switch...how should *my* router be configured? If I introduce my own router between theirs and my switch (to which all of my other systems are connected), they would have no visibility into my own network, right?

          S 1 Reply Last reply
          0
          • J Jeremy Falcon

            dandy72 wrote:

            This means the ISP's router is now doing all the heavy lifting (whereas it used to be my own router's responsibility), including wifi, which means I'm now more at the mercy of that one router than I've ever been.

            I do the same, just to keep it simple. But, I still buy my own router that just works with their service. So, in effect, it's not really different than having my own router inside the network elsewhere. Just less stuff to mess with.

            Jeremy Falcon

            D Offline
            D Offline
            dandy72
            wrote on last edited by
            #14

            Yeah, I think right now that's my next goal: DON'T change their router's configuration at all, if I can help it...but introduce my own router in-between *it*, and my switch (to which all my other systems are connected). I'm not sure how to configure it however. My router's running DD-WRT.

            1 Reply Last reply
            0
            • D dandy72

              Here's a theoretical question. If I didn't want to reconfigure their router (or only apply the absolutely minimal number of changes), but introduce one of my own routers between *it* and my main switch...how should *my* router be configured? If I introduce my own router between theirs and my switch (to which all of my other systems are connected), they would have no visibility into my own network, right?

              S Offline
              S Offline
              Shuqian Ying
              wrote on last edited by
              #15

              The WAN port of your router should be connected to one of the LAN ports on your ISP's router. Use DHCP to acquire an IP address for the WAN port from your IPS's router when it starts up. Then, choose and setup your internal LAN IP network (block) to be different from the one the router from ISP uses. For example if the ISP assigned 192.168.0.0/24 network to their own router for the LAN, then your LAN network could be 172.16.x.0/24 where x=(0-255) or it could be 192.168.x.0/24 where x=(1-255) with x=0 excluded. As to how to bootstrap the LAN network setup of your router, it should be in the manual. Here is a simple one. If the router has a factory setup LAN network that is different from the one assigned by your ISP, then you don't have to mess with it, just setup the WAN port (see below); in case it is the same, then do not wire connect the WAN port when performing the LAN network setup. Configuration can be done by connecting a computer with a browser to one of the LAN ports of your router using a network wire and then use the admin web interface, which should be described in the manual, to do job. Note restarting the router is required when the LAN network is changed. The WAN port should be wire connected when the LAN is properly setup. You are right. A router is also a simple firewall by default in the sense that the internal LAN is invisible to the WAN part unless the one who can control it add specific rules to open part or all of it.

              D 1 Reply Last reply
              0
              • S Shuqian Ying

                The WAN port of your router should be connected to one of the LAN ports on your ISP's router. Use DHCP to acquire an IP address for the WAN port from your IPS's router when it starts up. Then, choose and setup your internal LAN IP network (block) to be different from the one the router from ISP uses. For example if the ISP assigned 192.168.0.0/24 network to their own router for the LAN, then your LAN network could be 172.16.x.0/24 where x=(0-255) or it could be 192.168.x.0/24 where x=(1-255) with x=0 excluded. As to how to bootstrap the LAN network setup of your router, it should be in the manual. Here is a simple one. If the router has a factory setup LAN network that is different from the one assigned by your ISP, then you don't have to mess with it, just setup the WAN port (see below); in case it is the same, then do not wire connect the WAN port when performing the LAN network setup. Configuration can be done by connecting a computer with a browser to one of the LAN ports of your router using a network wire and then use the admin web interface, which should be described in the manual, to do job. Note restarting the router is required when the LAN network is changed. The WAN port should be wire connected when the LAN is properly setup. You are right. A router is also a simple firewall by default in the sense that the internal LAN is invisible to the WAN part unless the one who can control it add specific rules to open part or all of it.

                D Offline
                D Offline
                dandy72
                wrote on last edited by
                #16

                Very interesting, I think this lines up with my expectations, and certainly sounds feasible. Thanks so much for that - I'm saving this and will absolutely refer back to it when I feel ballsy enough again to try it out. In theory, as you said, I *should* be able to completely set up my router with one machine wired to it, and - once it looks okay (as far as I can tell), I *should* be able to just hook up a cable between my router's WAN port back to the ISP router's LAN port without further change? That would be ideal. The ISP's router is using 192.168.1.1. My router was previously set up to use 192.168.0.0/16 (subnet mask = 255.255.0.0). I'd like to keep that, except maybe excluding 192.168.1.[0-255] (so that'll remain the ISP router's own playground). Most of my machines have static IPs that I've assigned from various ranges, and with subnet mask set to 255.255.0.0, for example: - 192.168.1.[0-50] = various physical machines - 192.168.1.199 = my Windows DC's static IP - 192.168.1.[200-255] = the range for DHCP, assigned by my router (for whoever shows up and wants to get on my network without me giving them an explicit static IP) - 192.168.50.[0-255] = my printers - 192.168.100.[0-255] = my Windows virtual machines - 192.168.200.[0-255] = various Linux virtual machines I don't know if it makes sense to segregate things this way, but it did in my mind when I set it up, and I'd like to keep it that way (more or less). However, I do realize since 192.168.1.xyz will become (remain) what the ISP router manages, I think I'd change the 3 first items in the above to 192.168.10.xyz (otherwise I'd clash with other addresses the ISP's router would own). I'd hook up wireless devices to use my router's Wifi. I could leave (or turn off) the ISP router's Wifi - I don't think I'd care all that much; it does, after all, have its own password you'd have to know to use. Does all of this make sense to you?

                S 1 Reply Last reply
                0
                • D dandy72

                  Very interesting, I think this lines up with my expectations, and certainly sounds feasible. Thanks so much for that - I'm saving this and will absolutely refer back to it when I feel ballsy enough again to try it out. In theory, as you said, I *should* be able to completely set up my router with one machine wired to it, and - once it looks okay (as far as I can tell), I *should* be able to just hook up a cable between my router's WAN port back to the ISP router's LAN port without further change? That would be ideal. The ISP's router is using 192.168.1.1. My router was previously set up to use 192.168.0.0/16 (subnet mask = 255.255.0.0). I'd like to keep that, except maybe excluding 192.168.1.[0-255] (so that'll remain the ISP router's own playground). Most of my machines have static IPs that I've assigned from various ranges, and with subnet mask set to 255.255.0.0, for example: - 192.168.1.[0-50] = various physical machines - 192.168.1.199 = my Windows DC's static IP - 192.168.1.[200-255] = the range for DHCP, assigned by my router (for whoever shows up and wants to get on my network without me giving them an explicit static IP) - 192.168.50.[0-255] = my printers - 192.168.100.[0-255] = my Windows virtual machines - 192.168.200.[0-255] = various Linux virtual machines I don't know if it makes sense to segregate things this way, but it did in my mind when I set it up, and I'd like to keep it that way (more or less). However, I do realize since 192.168.1.xyz will become (remain) what the ISP router manages, I think I'd change the 3 first items in the above to 192.168.10.xyz (otherwise I'd clash with other addresses the ISP's router would own). I'd hook up wireless devices to use my router's Wifi. I could leave (or turn off) the ISP router's Wifi - I don't think I'd care all that much; it does, after all, have its own password you'd have to know to use. Does all of this make sense to you?

                  S Offline
                  S Offline
                  Shuqian Ying
                  wrote on last edited by
                  #17

                  Sure, just don't clash with the WAN part of the your networks. But I don't know if excluding a sub-network from a larger one will be ok from security point of view, your LAN 192.168.0.0/16 seems to be too large. The firewall rules are IP network based, it would very likely that your WAN network will be able to visit you LAN in your settings for not a sophisticated enough router. If you'd like to use a larger network for the LAN, use one of the 172.[16-31].x.x/16 network (class B) instead, that way, there will be no conflict.

                  D 2 Replies Last reply
                  0
                  • S Shuqian Ying

                    Sure, just don't clash with the WAN part of the your networks. But I don't know if excluding a sub-network from a larger one will be ok from security point of view, your LAN 192.168.0.0/16 seems to be too large. The firewall rules are IP network based, it would very likely that your WAN network will be able to visit you LAN in your settings for not a sophisticated enough router. If you'd like to use a larger network for the LAN, use one of the 172.[16-31].x.x/16 network (class B) instead, that way, there will be no conflict.

                    D Offline
                    D Offline
                    dandy72
                    wrote on last edited by
                    #18

                    That would mean reconfiguring the static IPs for the vast majority of my systems, which is not going to be a small endeavor. But, if that's the right way to do it...I'll do it. I did say I know enough about networks to be dangerous. :-)

                    S 1 Reply Last reply
                    0
                    • D dandy72

                      That would mean reconfiguring the static IPs for the vast majority of my systems, which is not going to be a small endeavor. But, if that's the right way to do it...I'll do it. I did say I know enough about networks to be dangerous. :-)

                      S Offline
                      S Offline
                      Shuqian Ying
                      wrote on last edited by
                      #19

                      I have missed the security problems in the above reply, it is modified. Please read it again.

                      D 1 Reply Last reply
                      0
                      • S Shuqian Ying

                        Sure, just don't clash with the WAN part of the your networks. But I don't know if excluding a sub-network from a larger one will be ok from security point of view, your LAN 192.168.0.0/16 seems to be too large. The firewall rules are IP network based, it would very likely that your WAN network will be able to visit you LAN in your settings for not a sophisticated enough router. If you'd like to use a larger network for the LAN, use one of the 172.[16-31].x.x/16 network (class B) instead, that way, there will be no conflict.

                        D Offline
                        D Offline
                        dandy72
                        wrote on last edited by
                        #20

                        Edumacate me: Wouldn't 172.16.x.x/16 and 192.168.0.0/16 allow for the same number of endpoints (65534), given that /16 essentially means a subnet mask of 255.255.0.0? I think I need to brush up on my subnet literature.

                        S 1 Reply Last reply
                        0
                        • S Shuqian Ying

                          I have missed the security problems in the above reply, it is modified. Please read it again.

                          D Offline
                          D Offline
                          dandy72
                          wrote on last edited by
                          #21

                          Gotcha. It makes sense. If my router allowed a rule to be defined as such, would it be possible to explicitly block 192.168.1.[0-255]? Not that it sounds like the best idea in the world. I'm warming up to the idea of using 172.* instead of 192.168.*. There should be *no* way for the networks to see each other if they're working off of entirely different subnets.

                          S 1 Reply Last reply
                          0
                          • D dandy72

                            Edumacate me: Wouldn't 172.16.x.x/16 and 192.168.0.0/16 allow for the same number of endpoints (65534), given that /16 essentially means a subnet mask of 255.255.0.0? I think I need to brush up on my subnet literature.

                            S Offline
                            S Offline
                            Shuqian Ying
                            wrote on last edited by
                            #22

                            Right, they are the same, namely 256*256-2 (2 excluded are special ip addresses ends with 0 or 255).

                            1 Reply Last reply
                            0
                            • D dandy72

                              Gotcha. It makes sense. If my router allowed a rule to be defined as such, would it be possible to explicitly block 192.168.1.[0-255]? Not that it sounds like the best idea in the world. I'm warming up to the idea of using 172.* instead of 192.168.*. There should be *no* way for the networks to see each other if they're working off of entirely different subnets.

                              S Offline
                              S Offline
                              Shuqian Ying
                              wrote on last edited by
                              #23

                              It's likely that the firewalls in most routers are not that sophisticate that they can detect and exclude a subset of ip addresses from within a given set of the same in building default forwarding rules.

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups