Sorry for being such a noob. My networking is not very strong, thought I’d ask the fine folks here.

Let’s say I have a Linux box working as a router and a dumb switch (I.e. L2 only). I have 2 PCs that I would like to keep separated and not let them talk to each other.

Can I plug these two PCs into the switch, configure their interfaces with IPs from different subnets, and configure the relevant sub-interfaces and ACLs (to prevent inter-subnet communication through the router) on the Linux router?

What I’m asking is; do I really need VLANs? I do need to segregate networks but I do not trust the operating systems running on these switches which can do L3 routing.

If you have a better solution than what I described which can scale with the number of computers, please let me know. Unfortunately, networking below L3 is still fuzzy in my head.

Thanks!

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    7
    ·
    19 days ago

    One of the PCs can spoof the MAC of the other and receive its Ethernet frames.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        19 days ago

        That would be worse, because then it would send and receive traffic for multiple vlans.

        Unless your switch uses that to refer to link aggregation instead of vlan trunking. Network terminology like that can mean different things to different vendors.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    19 days ago

    I would just get a basic layer 2 managed switch and use VLANs. The 5 port and 8 port switches are super cheap these days.

    • marauding_gibberish142@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      19 days ago

      It’s not that they are expensive, it’s that they run archaic proprietary OSes which the consumer cannot control. I cannot trust such a switch when the rest of my network depends on it. Please let me know if something in the post didn’t make sense.

          • Pogogunner@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            19 days ago

            It’s been a long time since I actually used subnets, but IIRC you will need a physical interface for each network on the router regardless.

            So let’s say you set up your /24 network into 2x /25’s, you will need an interface for the .0 network, and another for the .128 network

            If you just have an interface for the switch, and another for the WAN connection, I don’t think subnetting will work for what you’re trying to do

            • marauding_gibberish142@lemmy.dbzer0.comOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              19 days ago

              Hmm, so virtual interfaces on the router won’t work? I admit I’m a bit stumped, would you be able to give me an ELI5 on why this is the case? I will try and read up more, of course

    • marauding_gibberish142@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      19 days ago

      I’d either have to do it in the router (which would need a lot of PCIe network cards which can get expensive + difficult to accommodate enough physical PCIe lanes on consumer hardware) or run it on a switch running a proprietary OS that I can’t control and don’t know what it’s doing underneath.

      • kylian0087@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        19 days ago

        Can you elaborate why you think you need much more PCIe network cards? Technically you can do with 1 single LAN port with all your VLANs.

        You configure the VLANs on the router then make a single trunk port to a switch. then have that switch divide the VLANs on the ports you desire. this can be a L2 switch.

      • Clearwater@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        19 days ago

        As a heads up, almost all OpenWRT routers function as managed switches with vlan capabilities. Not truly all, but a very good number.

  • Goingdown@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    19 days ago

    If computers are in same network, even with different ip addresses, they still can see all broadcast and multicast traffic. This means for example dhcp.

    If you fully trust your computers, and are sure that no external party can access any of them, you should be fine. But if anyone can gain access to any of your computers, it is trivial to gain access and sniff traffic in all networks.

    If you need best security, multiple switches and multiple nics are unfortunately only really secure solution.

    • marauding_gibberish142@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      19 days ago

      The computers will be running OpenBSD. I am researching hardening methods for them and also seeing if it is feasible for me to get Corebooted hardware. I didn’t mention it because I didn’t think it was important.

      I feel like my post is being taken very negatively with people finding faults in my words rather than in the networking concept. Would you happen to know why?

        • marauding_gibberish142@lemmy.dbzer0.comOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          19 days ago

          asking for people to solve a solved problem

          Solved using devices that run proprietary software (which is, I imagine, frowned upon in such communities) which we don’t control at all. Heck, even Mikrotik who has a good rapport with this community uses a proprietary Linux distro with a severely outdated kernel for their devices. For something as critical as internal networking, I’m surprised I do not see more dialogue on improving the situation.

          Let me try and explain the problem. I want to build a setup where I have multiple clustered routers (I’m sure you’ve heard of the clustering features in PFSENSE/OPNSENSE/DIY approach using Keepalived). But if I want to use VLANs without using a switch running god-knows-what under the hood, I’m going to need a LOT OF ports. Unfortunately, 6+ port PCIe cards are quite expensive and sometimes have many other problems.

          This is why I’m trying to find simpler solution. The solution that you mention doesn’t seem to be a solution at all, but just the community giving up on trying to find one and accepting what is given. I was hoping for a better outcome.

          • bane_killgrind@slrpnk.net
            link
            fedilink
            English
            arrow-up
            2
            ·
            19 days ago

            Not liking the solution you have doesn’t mean you don’t have a solution.

            Anyway, watch the playlist I sent, it’s a great overview of the OSI model with some other stuff. You mentioned not understanding some layers, once you do you will understand the limitations of the hardware you have.

  • Lettuce eat lettuce@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    19 days ago

    Have you looked into Tailscale or an equivalent solution like Netbird?

    You could set up a tailnet, create unique tags for each machine, add both machines to the tailnet, and then set up each machine’s network interface to only go through the tailnet.

    Then you just use Tailscale’s ACLs with the tags to isolate those machines, making sure they can only talk to whatever central device(s) or services you want them to, but also stopping them from talking to or even seeing each other.

    • marauding_gibberish142@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      19 days ago

      I never considered tailscale for my LAN, but it’s certainly an intriguing idea. I suppose running Headscale as a VM on my router isn’t that difficult. Thank you, I will think about it a bit more

  • nottelling@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    What you are asking will work. That’s the whole point of subnets. No you don’t need a VLAN to segregate traffic. It can be helpful for things like broadcast control.

    However, you used the word “trust” which means that this is a security concern. If you are subnetting because of trust, then yes you absolutely do need to use VLANs.