There have been little discussions in other threads about this product. I'm going to try to pull them into this one common place. Some features of these switches make them a good candidate for a security camera system:
1. Professional high performance product.
2. Good POE support.
3. Reasonably low power consumption.
4. Very reasonable used prices.
For instance, the SF300-24P has 24 100 mbps POE ports, 4 gigabit ports, and can be found for under $100 on ebay.
I have found 2 major drawbacks:
1. Nasty loud fan noise. I have replaced the fans in mine. I don't think it's going to overheat in my situation. With a full POE load and a hot room, it could have a problem.
2. Unlike some other managed switches, this one will not allow you to set up "overlapping" VLANs, with one or more ports in multiple VLANs, to allow a camera to talk to the NVR and/or computer, while blocking it from accessing the outside Internet. (See further discussion for possible solutions).
Pulling messages from another thread, cyph wrote:
Cisco SF300 24PP with 24 ports POE and 2 gigabit upstream port managed switch with the ability to isolate the cameras to its own VLAN can be bought used on EBay for less than a new dumb 8 port POE switch...
tigerwillow1 replied:
Have you set one of these up? Unlike other managed switches, mine can't be set up to allow a port to access 2 VLANs, making it useless to isolate the cameras from the WAN while allowing the NVR to access the WAN. If there is a way to do this, I'd sure like somebody to tell me how. There might be a way to do it at level 3, but I really want to stay at level 2 and not have to become a network expert to configure the system.
cyph posted 2 responses:
I have not used the SF300 yet, but based on past experience, you have to create a trunk (look up trunking). Alternatively, treat it as separate switches and create a routing table. Allow camera vlan1 to route to NVR vlan2, then drop all packets from vlan1 to internet uplink port.
set system mode {router} will switch it into router mode.
---and---
Hey, I just received the SF300. The easiest way to accomplish what you're doing is to make all the ports for the cameras "protected ports" then also make the uplink port a protected port. Since protected ports can never communicate with each other, the cameras will forever be isolated from each other and from the Internet up-link port. It's an automatic walled garden without the use of VLANs.
Discussion continues any further posts.
1. Professional high performance product.
2. Good POE support.
3. Reasonably low power consumption.
4. Very reasonable used prices.
For instance, the SF300-24P has 24 100 mbps POE ports, 4 gigabit ports, and can be found for under $100 on ebay.
I have found 2 major drawbacks:
1. Nasty loud fan noise. I have replaced the fans in mine. I don't think it's going to overheat in my situation. With a full POE load and a hot room, it could have a problem.
2. Unlike some other managed switches, this one will not allow you to set up "overlapping" VLANs, with one or more ports in multiple VLANs, to allow a camera to talk to the NVR and/or computer, while blocking it from accessing the outside Internet. (See further discussion for possible solutions).
Pulling messages from another thread, cyph wrote:
Cisco SF300 24PP with 24 ports POE and 2 gigabit upstream port managed switch with the ability to isolate the cameras to its own VLAN can be bought used on EBay for less than a new dumb 8 port POE switch...
tigerwillow1 replied:
Have you set one of these up? Unlike other managed switches, mine can't be set up to allow a port to access 2 VLANs, making it useless to isolate the cameras from the WAN while allowing the NVR to access the WAN. If there is a way to do this, I'd sure like somebody to tell me how. There might be a way to do it at level 3, but I really want to stay at level 2 and not have to become a network expert to configure the system.
cyph posted 2 responses:
I have not used the SF300 yet, but based on past experience, you have to create a trunk (look up trunking). Alternatively, treat it as separate switches and create a routing table. Allow camera vlan1 to route to NVR vlan2, then drop all packets from vlan1 to internet uplink port.
set system mode {router} will switch it into router mode.
---and---
Hey, I just received the SF300. The easiest way to accomplish what you're doing is to make all the ports for the cameras "protected ports" then also make the uplink port a protected port. Since protected ports can never communicate with each other, the cameras will forever be isolated from each other and from the Internet up-link port. It's an automatic walled garden without the use of VLANs.
Discussion continues any further posts.