jonelr70115
asked on
Sonicwall TZ-215 with Linksys Velop Wireless Mesh
I had this question after viewing Connect a wireless router to a sonicwall firewall.
Presently using Sonicwall TZ-215 with 3 TP-Link EAP 330 - (coverage decent but not perfect.) in small business environment:
1. Would using the Linksys Velop in bridged mode give me better coverage (turning off wireless on Sonicwall TZ-215; turning off DHCP on Linksys Velop) ?
2. Since the Sonicwall TZ-215 would be the main router, will the network be secure?
Presently using Sonicwall TZ-215 with 3 TP-Link EAP 330 - (coverage decent but not perfect.) in small business environment:
1. Would using the Linksys Velop in bridged mode give me better coverage (turning off wireless on Sonicwall TZ-215; turning off DHCP on Linksys Velop) ?
2. Since the Sonicwall TZ-215 would be the main router, will the network be secure?
ASKER
2. Since the Sonicwall TZ-215 would be the main router, will the network be secure?
What exactly do you mean? Everything would be behind the Sonicwall, so you do have that layer of security. So it now becomes a question of whether the wireless and wired clients should be on the same network. And whether you intend to have a guest wireless network.
1. Yes, wired and wireless clients will be on same network and they would need access to shared printers.
2. There will be a guest network (presently (TZ-215) on different IP range.)
What exactly do you mean? Everything would be behind the Sonicwall, so you do have that layer of security. So it now becomes a question of whether the wireless and wired clients should be on the same network. And whether you intend to have a guest wireless network.
1. Yes, wired and wireless clients will be on same network and they would need access to shared printers.
2. There will be a guest network (presently (TZ-215) on different IP range.)
Sounds good.
As for your guest network, I am assuming that you're going to have a separate AP for that. Appears that the Linksys doesn't support VLANs, which would've made your life easier.
As for your guest network, I am assuming that you're going to have a separate AP for that. Appears that the Linksys doesn't support VLANs, which would've made your life easier.
ASKER
The Velop does allow for a guest network - I don't know what IP range it uses.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
At present, my home network consists of a Linksys EA9500 as the main router with 3 Velops in bridge mode supplying the wi-fi. The main network with the EA95 as DHCP server is using the 192.168.1.1 range. The Velops wifi is in that same range. The Guest wifi from the Velop is using the 192.168.3.1 range. Is it safe to assume that in the office environment, the Sonicwall would continue to use its existing range and I could setup the velop guest network and it would use a different range (i.e., like the house) or would it be better just to setup another AP? Thanks so much for yous help with this issue.
I just looked and noticed about the 192.168.3.x range (the manual I looked at didn't spell that out too well).
As for your assumption, that would be correct. However, because of the fact that everything for the guest network is defined by the Velop, you won't be able to create separate filtering rules in the office environment because the Sonicwall would only see the ranges that exist in its own configuration.
As for your assumption, that would be correct. However, because of the fact that everything for the guest network is defined by the Velop, you won't be able to create separate filtering rules in the office environment because the Sonicwall would only see the ranges that exist in its own configuration.
ASKER
So, if I were to use another device as a separate AP, i would be able to create separate filtering rules?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
I am not at all familiar with Ubiquiti UniFi AP - what is the difference between the Ubiquiti UniFi AP and the TP-Link EAP330 which we are presently using as extenders for the wi-fi from the Sonicwall?
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Ah, now I understand - thanks for the assistance
You're quite welcome... is there anything you feel hasn't been covered?
Also worth noting, I'm assuming that you have antivirus and antimalware protection on the network already, as well as good spam filtering for your emails.
Also worth noting, I'm assuming that you have antivirus and antimalware protection on the network already, as well as good spam filtering for your emails.
ASKER
antivirus and antimalware protection on the network already, as well as good spam filtering for your emails. Answer is YES
Sounds good. Anything else you want to cover in relation to this?
ASKER
No, thank you. With you assistance, I think I know how to proceed. Thanks for everything
You're quite welcome. Feel free to open another question if anything else pops up!
ASKER
Actually, I do have another question. In our office environment we have an SBS 2011 server that supplies the dhcp addresses to the network instead of the router. If we were to try the Velop devices that we discussed earlier (in bridge mode), would they be able to get their up addresses from the server and work or would they have to get their addresses from the router to work in bridge mode? I am looking at all options before making a decision on which way to go. Thanks in advance for your help.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thanks again for your help.
You're very welcome.
Answered to author's satisfaction
What exactly do you mean? Everything would be behind the Sonicwall, so you do have that layer of security. So it now becomes a question of whether the wireless and wired clients should be on the same network. And whether you intend to have a guest wireless network.