Not really, though a cheap switch that doesn't support igmp snooping would probably resort to flooding all ports vs dropping. I am speaking about typical unicast traffic. In general any time the switch doesn't know what specific port the destination MAC is on it floods the ports with the unicast...
I can't speak for OP but my guess is good old fashion $$. I have a new be AP I am testing that needs bt poe and my otherwise perfectly good poe switch can't provide enough power. I spent $55 on a 95watt injector vs a couple grand on a new 48port bt enabled switch. That said, I will be getting a...
LOL there are many legitimate reason for a switch to forward traffic to all ports/all ports in a vlan. There are also many not so legitimate reason to do so. Also, technically per standard, there is no such thing as a gigabit hub.
There's more to switches than forwarding traffic. Sure they might apparently handle line rate but are they flooding ports doing it? Many do. I've got a tp link switch placed inline between an ONT and a certain ISP's gateway specifically because it doesn't handle vlan tags correctly and forwards...
You might can "get by" with it but you shouldn't. All consumer networking gear is utter garbage and it is because it's garbage we are stuck with stupid standards. Anyone in the security realm will tell you wired and wireless should **NOT** be treated the same yet almost if not all home networks...
As I said there are a very few exceptions. I'll point that it get's worse before it gets better, essentially what you're saying, is also often used and generally untrue. I honestly prefer a government that is deadlocked and can accomplish little to nothing outside the necessary and net...
We're from the government and we're here to help. Most of you should know well enough that with very few exceptions everything a bureaucracy as big and convoluted as the US government gets involved with gets worse not better.
Generally speaking on most firewalling devices once a packet is dropped the firewall is done with it. There is no additional processing. You generally start by denying traffic to known malicious destinations and/or geographies then drop specific traffic ordered by volume highest to lowest. Once...
The same reason we have DoT and its bastard should be killed cousin DoH ... ISPs behaving badly. The assholes started with answering nxdomain with ads and went downhill from there. The entire community should have raised hell when that started but instead the unwashed masses thought it useful.
The whole HTTPS everywhere thing is getting worse. Encrypted client hello (ECH) is going to make web filtering a nightmare. The plus side is it will either force businesses to finally break down and do TLS inspection or push everyone to fully managed endpoints.
Please tell me your boxes were not bright green or depend on an add in accelerator card. :)
Going to add that a VM still lives on my ESXi box named SR-XP-Test. The SR standing for secure remote.
to be clear BLS said hotspot not website. As far as a sketchy or more to point malicious website goes, visiting would be enough. How long you stay matters not.
That is generally the side effect of websites detecting an address used by commercial VPNs. This would almost certainly not happen...
Thanks for the vids! Placed the order for ER and AP. Will do most of the preconfig here and do the install over Easter. After all, what are holidays with the family for if not tech support? :)
Have almost the exact same need ie replacing parent's ancient gear. Would prefer not to buy more Fortigear for them and these TP-Link devices may do the job. Nail up an ipsec tunnel and manage it all from here. Just to be clear the router and AP have built in ui and no sort of app or cloud...