You ever get this set up? The 2.4 I'd imagine working for you just fine. 200Yrds isn't all that far, and while they don't penetrate all that well they are designed to go much further So I'd imagine it'd be just fine.
The reason I used the M900's for my sister's location is because it was for a...
You can try the 2.4 ghz options, probably will work just fine especially at only 200yrds and if it doesn't work Amazon has a great return policy
Something like this
Ubiquiti LocoM2 2-PACK Nanostation LocoM2 AirMax Outdoor PoE CPE 2.4GHz 5+km https://a.co/d/3eJD9Y6
But you're paying extra...
Do a wireless bridge, Ubiquity has options for them, people make the mistake of just getting the "best" and most expensive, don't do that. The most expensive ones are 5GHZ, they don't penetrate trees for shit, 2.4 GHZ is better at penetration, but still not great. They have 900MHz ones that work...
If you haven't checked them out, I'd suggest Aunty Aprils a really good chicken and waffle place in SF, personally I think they are better than Roscoe's, but last time I went was before the pandemic really hoping they survived
I'd add a switch to this environment, create a VLAN for your IOT devices, set your PC's up on another VLAN this could be VLAN for Trusted-Wifi and your wired PC's(and anything else you trust), perhaps a third VLAN for your NVR equipment. Do the VLAN's at the switch level, set up a trunk port...
A decent router honestly shouldn't allow that, but I'm used to enterprise gear. I'd be surprised if you aren't dropping packets in this setup, unless Mikrotik is essentially a consumer router with a built-in switch with some enterprise software capabilities. I haven't used their products.
A routers job is to route between different subnets, aka different subnet on each port, I'd honestly be surprised is the router allows for this configuration, home routers allow it because their ports are basically an inbuilt switch. In this layout you are treating the router as a switch, it...
Do you use port security or sticky mac?
Try clearing the arp cache on the firewalls and switches that are needed to get through. Had issues before where our FW wouldn't let go of an old MAC,
Clear ARP and bounce the port the printer is on, check the config and make sure there isn't another...
Hidden SSIDs are the equivalent of hiding your pornstash on multiple nested folders, anyone who knows how to search files will find it, it's security through obscurity, which isn't really security. Same with MAC whitelist its really east to get the MAC of nearby devices and spoof them. But that...
You really need a vpn if you want to rdp externally to your machines on the network, without it...it's like a bank asking how to keep criminals from climbing in the open window and robbing them, you tell them to close the window and they do, but they open another window and the criminals climb...
If you indeed have two routers(the providers gateway router that you would have no control over), and than your own internal router(one you control) and the provider is setting routes to your internal router than if you change the IP address of your router they would need to update their routes...
What versions are you running? This looks like an earlier bug with dnsmasq and ooenwrt but should be fixed https://bugs.openwrt.org/index.php?do=details&task_id=673
Create a new subnet and dhcp pool separate from your main network, assign the port that is connected to your wireless bridge to a VLAN, confirm VLAN is working by checking IPs of devices in other building should be on the new network you created, normally you'd have to set-up inter-vlan routing...
Check your phone's IP, than check your DHCp lease on your router, if your phone is connected it's getting the IP from the router, you can confirm its your phone based in the MAC address in each, the router may not be showing the name, but thats ok confirm first with IP and MAC
That isn't that far, and if it's connecting to a Spectrum Wireless wifi(which is usually pretty weak) the easiest/cheapest solution would honestly be to get an outdoor LR AP, either ubiquity or another brand, use the POE injector and mount the AP on the outside of the house pointing at the...
Of course there is a reason, first you need to understand that there is a BIG difference between an IDS and an IPS, an IDS is an "intrusion detection system" it simply detects and alerts you, it's than up to the user to take some sort of action on the alert, but if you have no one looking at...
Tons of monitoring is only good if you have someone analyzing those logs for signs of compromise, I've seen too many companies buy all sorts of logging security tools, endpoint, network, deep packet inspection, etc, but they don't hire the right people to look at those logs, or worse they don't...
The more you try to secure the easier you are to track actually look as browser fingerprinting, there comes a point where adding additional security is actually not good thing, you're never going to be 100% safe online, you'll never be 100% anonymous online, you can continue to try, but you're...
Personally i think the udm pro is a bit much in this setup, from my understanding the main selling point is that it has router/switch/ap all in one machine, you're already purchasing a separate switch and separate APs so honestly i don't see why'd you'd want the udm pro, instead I'd look at...
Delete the job history on the printer, manual can be found here http://downloads.dell.com/Manuals/all-products/esuprt_printers_main/esuprt_printers/dell-5110cn_User%27s%20Guide_en-us.pdf
After deleting the job history check again in a few weeks and see if you're still getting weird reports
Why do a bridge at all? Just set one router into AP mode amd let the main router handle the rest, bridges are really for longer distances not across an apartment, the other option is Ethernet over power adapters for cheaper, uses your in-house electrical wire no need to get anymore complicated...
Public IPs are more of a security risk because you can get location information and there are online tools that can scan them to see if there are any vulnerabilities(aka weaknesses) that could allow them in, private IPs aren't as bad, because honestly they are defined ranges all ready, just less...
That's probably because of the rest of the network, your IP scheme is all messy and its probably getting confused, I'd set all the SSID and passwords the same on all routers, personally I'd set up the ISP modem in bridged mode and disable the wifi on it(unless you need it of course) and the...
Are you defining these networks? Or are you just taking whatever network the router gives you? Where is your dhcp server? Do you have a dchp server for each network or are these VLANs and you've defined the scope off of a primary DHCP server?
As with everything it depends on the use case, Ubiquity/Unifi was in a niche market for awhile "prosumer" gear they are NOT by any means up to enterprise standards, but their price also reflects that reality. They do have more expensive offerings but I wouldn't say they are enterprise grade...
I have all ubiquity, harder to initially get set up than normal consumer gear, but once it's set up and configured it just runs, i haven't had any issues except with then cloud-keys(burned up on me), but other than that no issues here set it up, configured everything, and it just works, and is...