As I'm in the beginning steps of sorting out my homelab, I'm starting to ask questions I haven't asked before and come across conundrums I hadn't considered previously. One of which is how to sort out pi-hole given that my ISP has locked down the router tighter than a tight thing.
As I had been reading about and watching YouTube videos, I had stumbled across Tailscale and the idea of VLANs is a nice one. That coupled with wanting to block ads and a new router seemed to the optimal choice.
Another thing is that I eventually want to get a Reolink POE video doorbell and Reolink E1 outdoor camera for my garden and so I'm trying to think somewhat ahead as the last thing I want is a server rack in my house. Aesthetically speaking.
So I stumbled across all the recommendations for Mikrotik and they're really reasonably priced, especially compared to the Netgear Nighthawk thing I was looking at for ten times the price.
The Mikrotik HAP AX Lite is reasonably priced, does all the cool new stuff, let's me set up virtual local area networks, has room for growth and has PoE capabilities. It seems to be the perfect choice. But is it? Because it seems almost too good to be true.
When you say separate access points, what do you mean? I'm probably not understanding you correctly, because I'm interpreting it as you're saying that I should buy separate devices for WiFi?
To me that pretty much defeats the point completely. Most of my house runs on WiFi and I also don't want a server rack or loads of different pieces of equipment strewn around the place, hence why the Mikrotik is so appealing, as it can route, firewall and do POE all at an incredibly reasonable price. That said, reading some comments online, it's got a steep learning curve and it's really hands-on.
I'm not that picky in terms of routers, as long as it is rack mounted. I happen to use a Fortigate 101E that was no longer needed at work.
While it does support VLAN, I don't do that on the router, as Fortigate can be a bit of a pain in the ass when it comes to VLAN tagging. I instead have dedicated ports for the various network I serve, each of which connect to the same switch.
On this switch I have each of those uplink tagged as access ports for the VLANs they represent. Then the remaining ports can be tagged as I please. A few extra patch cables, but only dealing with VLAN tags on aruba makes it so much better.
As for PoE, that's best done on a switch. My Aruba powers all of my access points this way.
Be aware that some Reolink cameras (B800 for certain) require a reolink DVR. The alternative is neolink, a program that reverse engineers the protocol.
You can purchase wireless access points for fairly cheap from ubiquiti. Wire it into a switch and once you configure it you're done. You don't need the software for it running 24/7 unless you like metrics.
Naw not dumb but thats kinda your call, I just put my old WiFi router in Access Point mode and hooked it up to the machine I’m using and it works great. I’m sure it’s possible to use a pcs internal radio to broadcast but I’ve never researched that myself
Looks like it's 2.4ghz only, which is really odd. Mikrotik is also really difficult to configure in my experience.
Typically a better setup is a dedicated router, and at least 1 dedicated WiFi AP, that way you've separated the 2 and can upgrade one without the other as technology evolves. TP-Link Omada APs are decent, as are Unifi.
One of which is how to sort out pi-hole given that my ISP has locked down the router tighter than a tight thing.
Easy way in that case is use Pihole for DHCP and DNS together. Assuming you can disable DHCP on your router.
Oops meant the AC Lite. I think I was obsessed for multiple reasons, including intimidation, but I'm now coming around to the idea of trying something new. I guess I won't get to do it as cheaply as I wanted to.
Since you mentioned Tailwind, you should check out Tailscale too. I believe it to be better suited for personal Homelab use over tailwind, I could be wrong though.
I don't know about Mikrotik, but it might also be interesting to buy something, that is running on OpenWRT, an open source router OS. That way you would have maximal configurability. I recently purchases a GL.iNet AXT1800 for my own home lab (though I'm currently only using it for the isolated homelab, not for the rest of the house). You can even host stuff directly on the router with OpenWRT. I currently have Centos 9 repos hosted there and DHCP/TFTP for network installation of VMs via PXE boot.
After digesting everything people have been recommending, I'm now looking at this an Intel N100 Celeron N5105 Soft Router Fanless Mini PC 4x Intel i226 i225 2.5G LAN HDMI pfSense Firewall Appliance ESXI AES-NI