I do not know whether they would work with EdgeRouter 4.
No, you can use your existing AP's. Does not' have to be an Ubiquity AP.
That would make sense why I couldn't start with eth4 range and DHCP server and why I couldn't get back in after changing eth1 range. (Didn't manually set my up) I'll play around with it. And don't get me wrong, I dont have to change it, just figured why not give er' a whirl and see if I can make it work/learn something.If you really must change the IP range for your main network, you must do so while connected to the main LAN (Eth1). The other sub LAN's are not permitted to access the router configuration page. Remember, those are limited intentionally.
Change the IP range on the main router page. You will lose connection until you manually set your computer to an address in the new IP range.
DHCP won't work until you also change the DHCP server range in the services tab.
I think you will also do some work with the VPN address ranges, but I'd have to dig into my router to check.
if I want using a NVR, the camera should be connected from NVR LAN, does it means I should buy a NVR built-in switch ? why I cannot plug directly together with camera in the same switch ?
If you buy an NVR with a "built-in-switch", I assume you mean a POE model? Then your camera's are out-of-the-box "isolated" in their proper lan (eg 10.x.x.x). However the NVR does "magic" tricks so you can inbound connect to these camera's (temporary port forward to 10080 for dahua for example), so it's unsafe to assume all outbound traffic is blocked out-of-the-box. So putting the LAN port of the NVR in a vlan is the most secure you can get. If you buy an NVR without POE ports, you indeed simply deploy your camera's in that "cam-vlan", all together with your NVR itself, and configure all those to work together (eg in 192.168.x.x)
Hope this helps!
CC
192.168.91.*,
192.168.92.*
192.168.93.*
192.168.94.*
it is fine if I uncheck the eth2 port from hairpin and mdns ?LANS 3 and 4 are limited networks and I typically don't let those devices do much beyond their local duties.
You could add more rules to give them additional functionality, but I didn't for simplicity's sake.
it is fine if I uncheck the eth2 port from hairpin and mdns ?
You will lose ability to use DYN DNS names to reference devices in your LAN.
Yes, if you are OK with always using IP numbers from inside your LAN
Also will lose DNS lookup for all devices on LAN2
Just try it and see what breaks.
I'm trying to get a push notifications (GDMSS Plus), I've created a ruleset in WAN_OUT source camera_ip destination port 2195, but it seems not working, any idea where should I put the outbound for port 2195 ? thank you
rule 40 {
action accept
description "Allow TCP/2195"
destination {
port 2195
}
log disable
protocol tcp
source {
group {
network-group IPC_catcamstarvlan
}
}
}
I've tried this and its seems still not working, from the apps side, its working if all the OP ruleset disabled. I guess I should try again with different rulesetInteresting question and why it doesn't work. There are couple of "schools" on how to implement the firewall on an Edgerouter, either you put it on WAN_OUT, or on the "local"_(vlan)_OUT. I opted for the latter:
Code:rule 40 { action accept description "Allow TCP/2195" destination { port 2195 } log disable protocol tcp source { group { network-group IPC_catcamstarvlan } } }
If you are unsure what is happening: enable "LOG DEFAULT" in the EdgeMAX web browser, and then "tail -f /var/log/messages", and you'll see which IP/Port/Destination gets "blocked".
Good luck!
CC