NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
IamOzymandias
Jun 22, 2020Aspirant
Help with topology and approach
I'm hoping to get some advice on topology and approach to accomplish my goals using the Netgear stack identified here. Please let me know what additiona info would be helpful to have. Thanks in advan...
- Jun 24, 2020
Well, the switch can be configured into three VLANs of course. Each VLAN is it's own broadcast domain, think of three different non-managed switches. On the IPv4 layer, each VLAN does require it's own IP subnet.
Your consumer router can handle only one LAN, do many2one NAT for one IP subnet, inlcuding limited port forwarding to IP addresses on that very same subnet. If using that network as an intermediate transport net for connecting it's hard to hide - certainly with that same consumer router again.
That's why DaneA correctly pointed to a basic small business router with the ability to deal with multiple LANs/VLANs, multiple subnets, many-to-one NAT for multiple subnets ... Of course, you can "design" an experimental environment with one or two similar crap routers esblishing double-NAT, .... Personally I would look into a small but performant security router appliance.
DaneA
Jun 24, 2020NETGEAR Employee Retired
Welcome to the community! :)
Since the R7800 does not support VLAN, I recommend you the BR500. The BR500 supports VLAN and can be configured to provide local IP addresses to each VLAN configured on the GS110TPP. To know more about the BR500, check its data sheet here.
Kindly check the article below and use it as reference guide:
How do I set up one or more VLANs between a NETGEAR ProSAFE firewall and a smart switch?
Regards,
DaneA
NETGEAR Community Team
IamOzymandias
Jun 24, 2020Aspirant
So, the managed switch is not sufficient to create VLANs to accomplish this work?
- schumakuJun 24, 2020Guru - Experienced User
Well, the switch can be configured into three VLANs of course. Each VLAN is it's own broadcast domain, think of three different non-managed switches. On the IPv4 layer, each VLAN does require it's own IP subnet.
Your consumer router can handle only one LAN, do many2one NAT for one IP subnet, inlcuding limited port forwarding to IP addresses on that very same subnet. If using that network as an intermediate transport net for connecting it's hard to hide - certainly with that same consumer router again.
That's why DaneA correctly pointed to a basic small business router with the ability to deal with multiple LANs/VLANs, multiple subnets, many-to-one NAT for multiple subnets ... Of course, you can "design" an experimental environment with one or two similar crap routers esblishing double-NAT, .... Personally I would look into a small but performant security router appliance.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!