If you have to ask then unmanaged is likely all you need..
If you have to ask then unmanaged is likely all you need..
I can probably answer for everyone this forum when I say, if you know how to utilize a managed switch, you would prefer a managed switch. If you don't know how to use the management function of a managed switch, you should save yourself some money and get an unmanaged switch.
Unless you feel like experimenting with the management functions, then spend the extra $20 or so to get a managed.
I just got the ZyXEL GS1100-8HP (unmanaged 8 port Gigabit switch with four 802.3AT POE ports) and the first couple days kinda kicked myself for not spending the extra $20 for the managed version. Then after a few days of it just up, running and doing its damn thing all by itself and I completely forgot it existed, I rememberd why I got unmanaged. Just plug it in and boom, it works and you don't have to spend time messing around with it. (edit: a managed switch Will also plug right in and start working, you might need to set an IP address for it but other than that I meant that you'd be tempted to screw around with the settings. Wasting your valuable time)
Also, go read (and/or re-read) nayr's VPN primer. The switch has nothing to do with anything VPN related. And a managed/unmanaged switch definitely doesn't matter as far as a VPN is concerned.
OK, PS about the only positive thing I can think about for managed vs unmanaged is the ability to remotely reboot the switch. This would reboot any POE devices you have on it. That could be a good thing or a bad thing depending on why your wanting to do it.
Not sure about the TP link price, but my ZyXEL is POE+ as well. For normal cameras that's not necessary, but I figured I'd be set if I ever want to add a PTZ or something that requires POE+ I'll be set. Was also worried about only getting four POE ports, but with the +I can always get the POE+ to regular POE that nayr reviewed if I find I need more POE ports.
I figured with 70W available, I could put two of those splitters on it, and end up with 10 POE ports. At 8W max for the Turret Starlight 5231 cameras, I could potentially run 8 of those cameras from one switch and 2 splitters.
It is an additional hassle though with a managed switch.
I wouldn't say that. When I purchased my main 24 port switch years ago I went managed, was only recently when I decided to VLAN my network was thankful that I didn't have to get another switch.
Right. You can run a managed switch just as an unmanaged switch if you want. But if you never end up using the full features you wasted money up front. But.. If 1 year from now you decide to use those features, you just saved yourself money by not having to upgrade.
I wouldn't say that. When I purchased my main 24 port switch years ago I went managed, was only recently when I decided to VLAN my network that I was thankful it was managed.
if you want to isolate your cameras with external PoE you need a VLAN Capable Switch and Router, or a 2nd router and some static routes defined.
isolating the cameras from the rest of your LAN dont nessicarly provide security, if they are isolated from the internet the threat they pose on your network is dramatically reduced and the attack surface is minimal..
The main reason for isolating your cameras from your LAN is becuase you dont trust your LAN; not the other way arround.. ie, you have employees that should not be able to access the recorder or cameras.
Same with me.I wouldn't say that. When I purchased my main 24 port switch years ago I went managed, was only recently when I decided to VLAN my network that I was thankful it was managed.
From what I understand, you also need a VLAN capable router to take advantage of those, not just a VLAN capable switch, correct?
Correct. When you use a router with a Layer 2 switch it's referred to as a "Router on a Stick".
Alternatively you can use a Layer 3 switch which does the routing for you.
In my situation, there is the need to isolate certain PC's from my main network which is why I segmented everything and applied firewall rules to stop inter-vlan communication. The cameras are also on their own VLAN.
My router is not VLAN aware (Asus RT-AC68), but I implemented VLANs in my managed switch.
It worked since I have my BI PC, all the cameras, and the router connected to the managed switch.
Simple Port based VLAN
Randy
Port based on my switch was easy to do, and it works, so I just used that.Yep, if you cannot use 802.1Q then port based is another option.