qiangduan
发表于 2024-3-3 17:35
小魔头 发表于 2024-2-19 14:12
不是的,我自己做的智能家居,12个摄像头全家全覆盖,利用视觉识别来实现一些控制反馈。 ...
请问下摄像头和智能家居选的哪家的?我也是打算四层大概十三四个 目前想用小米蓝牙mesh方案,但是他们家用摄像头都是无线的
小魔头
发表于 2024-3-4 08:34
海康的摄像头,poe供电。
智能家居是我用FPGA自己焊自己写程序做的。传感器和灯光用485通讯
ljdooo
发表于 2024-3-4 08:41
ynix2002 发表于 2024-2-19 12:34
42U机柜,12个摄像机,豪就一个字。
羡慕嫉妒,其他不看,PC都5W,已经是顶层了
zgpnhhy
发表于 2024-3-4 08:58
推荐ubnt呀,帅就完事了.
监控,门禁,ap全部接管到ubnt控制台.
小魔头
发表于 2024-3-4 16:04
zgpnhhy 发表于 2024-3-4 08:58
推荐ubnt呀,帅就完事了.
监控,门禁,ap全部接管到ubnt控制台.
主要是UBNT新出的那个U7的AP看了看赶紧性能很一般,cisco、aruba这些品牌国内又没有上线wifi7的产品,比较了下华为新华三**,看了看还是华为的性能好,所以才想着搞华为全家桶。
Krakenius
发表于 2024-3-4 16:16
要是有单独的房间或位置隔音放S5736-S24UM4XC,完全没必要换掉,这是个好东西
小魔头
发表于 2024-3-5 08:53
Krakenius 发表于 2024-3-4 16:16
要是有单独的房间或位置隔音放S5736-S24UM4XC,完全没必要换掉,这是个好东西 ...
有单独的一个小机房来放,想换主要是2个问题,1是这个噪音确实是个问题,普通不隔音的柜子门那种关上还是听得见。二是这个东西功率太大了(即使不插任何设备空载就70W,我只有几个AP是需要万兆POE供电的,赶紧24口POE没必要)
zgpnhhy
发表于 2024-3-5 13:29
小魔头 发表于 2024-3-4 16:04
主要是UBNT新出的那个U7的AP看了看赶紧性能很一般,cisco、aruba这些品牌国内又没有上线wifi7的产品,比 ...
额,我还没有上wifi7的,没有测试过.
手机就是用wifi6,pc跟nas主要还是万兆.
zhqiang
发表于 2024-3-6 19:46
Krakenius 发表于 2024-3-4 16:16
要是有单独的房间或位置隔音放S5736-S24UM4XC,完全没必要换掉,这是个好东西 ...
借楼问一下,这个交换机好配置么?以前用的都是傻瓜交换机,感觉这种企业的都是要通过命令行配置,不知道复杂不复杂?谢谢
Krakenius
发表于 2024-3-6 20:42
本帖最后由 Krakenius 于 2024-3-6 21:09 编辑
zhqiang 发表于 2024-3-6 19:46
借楼问一下,这个交换机好配置么?以前用的都是傻瓜交换机,感觉这种企业的都是要通过命令行配置,不知道 ...
要是有个模板的话就不难,要是自己没有之前存起来用过的配置,对新手还是有一点难度的,我这个是H3C的,华为的应该差不多。里面的配置基本上接口都是类似的,二层交换机就配置一下vlan和接口是access还是trunk,允许哪些vlan通过,三层交换机就再配置个网关和路由还有dhcp,但也可以当二层用不起网关
#
version 7.1.070, Release 6351P06
#
sysname switch
#
clock timezone Beijing add 08:00:00
clock protocol ntp
#
telnet server enable
telnet server acl 2000
telnet server ipv6 acl ipv6 2000
#
link-aggregation global load-sharing mode ingress-port destination-mac source-mac destination-ip source-ip destination-port source-port
#
dhcp snooping enable
#
dns server 223.5.5.5
dns server 119.29.29.29
#
ipv6 savi strict
#
ipv6 dhcp snooping enable
#
undo transceiver third-party alarm enable
password-recovery enable
#
poe ai enable
#
vlan 1
ipv6 nd detection enable
dhcp snooping binding record
ipv6 dhcp snooping binding record
#
vlan 10
ipv6 nd detection enable
dhcp snooping binding record
ipv6 dhcp snooping binding record
#
vlan 20
ipv6 nd detection enable
dhcp snooping binding record
ipv6 dhcp snooping binding record
#
vlan 45
#
vlan 100
ipv6 nd detection enable
dhcp snooping binding record
ipv6 dhcp snooping binding record
#
stp instance 0 priority 4096
stp mode rstp
stp global enable
#
interface Bridge-Aggregation1
port access vlan 100
link-aggregation mode dynamic
stp root-protection
ipv6 nd detection trust
ipv6 nd raguard role router
dhcp snooping trust
ipv6 dhcp snooping trust
#
interface NULL0
#
interface Vlan-interface1
ip address 172.16.0.2 255.255.255.0
dhcp client identifier ascii 982044b0c3f8-VLAN0001
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/4
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/5
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/6
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/7
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/8
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
poe enable
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/9
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/10
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/11
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/12
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/13
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/14
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/15
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/16
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/17
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/18
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/19
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/20
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface GigabitEthernet1/0/21
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
packet-filter 3000 outbound hardware-count
packet-filter ipv6 3000 outbound hardware-count
port link-aggregation group 1
dhcp snooping trust
ipv6 dhcp snooping trust
#
interface GigabitEthernet1/0/22
port access vlan 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
packet-filter 3000 outbound hardware-count
packet-filter ipv6 3000 outbound hardware-count
port link-aggregation group 1
dhcp snooping trust
ipv6 dhcp snooping trust
#
interface GigabitEthernet1/0/23
port access vlan 45
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
undo stp enable
ipv6 nd detection trust
ipv6 nd raguard role router
dhcp snooping trust
ipv6 dhcp snooping trust
#
interface GigabitEthernet1/0/24
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
#
interface Ten-GigabitEthernet1/0/25
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface Ten-GigabitEthernet1/0/26
port access vlan 10
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
stp edged-port
stp tc-restriction
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface Ten-GigabitEthernet1/0/27
port link-type trunk
port trunk permit vlan 1 10 20 45 100
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
stp root-protection
ipv6 nd raguard role host
dhcp snooping rate-limit 64
dhcp snooping check request-message
dhcp snooping check mac-address
ipv6 dhcp snooping rate-limit 64
ipv6 dhcp snooping check request-message
#
interface Ten-GigabitEthernet1/0/28
port link-type trunk
port trunk permit vlan 1 10 20
flow-control receive enable
broadcast-suppression 1
multicast-suppression 1
unicast-suppression 1
ipv6 nd detection trust
ipv6 nd raguard role router
dhcp snooping trust
ipv6 dhcp snooping trust
#
scheduler logfile size 16
#
line class aux
authentication-mode scheme
user-role network-admin
#
line class vty
authentication-mode scheme
user-role network-operator
#
line aux 0
user-role network-admin
#
line vty 0 63
user-role network-operator
#
ipv6 nd detection port-match-ignore
#
info-center format unicom
info-center source default console deny
#
ssh server enable
ssh server acl 2000
ssh server ipv6 acl ipv6 2000
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
password simple password
service-type ftp
service-type telnet http https pad ssh terminal
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
#
security-enhanced level 1
#
ftp server enable
ftp server acl 2000
ftp server acl ipv6 2000
#
ip http acl 2000
ip http enable
ip https acl 2000
ip https enable
#
cloud-management server port 19443
#
return
cowboy
发表于 2024-3-6 20:47
楼主这套配下来,功耗还是很感人
zhqiang
发表于 2024-3-7 07:36
Krakenius 发表于 2024-3-6 20:42
要是有个模板的话就不难,要是自己没有之前存起来用过的配置,对新手还是有一点难度的,我这个是H3C的, ...
谢谢, 我先研究下
5957788
发表于 2024-3-14 23:39
zhqiang 发表于 2024-3-6 19:46
借楼问一下,这个交换机好配置么?以前用的都是傻瓜交换机,感觉这种企业的都是要通过命令行配置,不知道 ...
有网页版的,可以傻瓜式配置
zhqiang
发表于 2024-3-15 10:17
5957788 发表于 2024-3-14 23:39
有网页版的,可以傻瓜式配置
好的,谢谢
就爱TJ
发表于 2024-3-15 11:10
本帖最后由 就爱TJ 于 2024-3-15 11:11 编辑
最近刚刚买了一个h3c的交换机S6520系列,我买的具体型号是S6520-30SG-SI,22个SPF+万兆光,8个GBE千兆电,官方数据显示空载15w,满载也就60w出头,感觉非常适合家用这种功耗敏感型的环境,毕竟噪音问题可以改风扇,改温控,但是功耗基本无解。机器还在路上,等到货了我看看实际功耗以及噪音怎么样。
就爱TJ
发表于 2024-3-19 22:45
启动时,12W
进入系统以后,14~15W
我自己是使用了AOC一体线缆,两头的模块各消耗0.5~0.6w
gravely
发表于 2024-3-19 23:03
Krakenius 发表于 2024-3-6 20:42
要是有个模板的话就不难,要是自己没有之前存起来用过的配置,对新手还是有一点难度的,我这个是H3C的, ...
这个配置v6能出各vlan能获取到公网地址吗?公网路由通吗?
jiano
发表于 2024-3-20 00:09
几个点位万兆,其他2.5g,即好用又省事。
所有点位预留光纤+网线,几个PC+NAS+AP位置用万兆做主干,剩余用2.5g,而且即便日后其他2.5g点位需要提升,直接增加设备即可,主干也不用动。
Krakenius
发表于 2024-3-23 09:49
本帖最后由 Krakenius 于 2024-3-23 09:54 编辑
gravely 发表于 2024-3-19 23:03
这个配置v6能出各vlan能获取到公网地址吗?公网路由通吗?
这个配置是二层交换机的配置,要前面的路由器发v6地址,我不喜欢三层交换机,我不希望vlan互通,前面的路由器有防火墙可以隔离vlan,要是网关起在交换机这些vlan就互通了,下面这个是拨号并在vlan10发ipv6地址的配置:
interface Dialer0
mtu 1492
ppp chap password simple 密码
ppp chap user 宽带账号
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 宽带账号 password simple 密码
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
tcp mss 1460
ipv6 mtu 1452
connection-limit apply policy 1
connection-limit apply ipv6-policy 1
ipv6 address auto
ipv6 address auto link-local
ipv6 address dhcp-alloc
ipv6 dhcp client pd 1 rapid-commit
interface Vlan-interface10
ip address 192.168.1.1 255.255.255.0
dhcp server apply ip-pool lan
dhcp client-detect
ipv6 dhcp select server
ipv6 dhcp server apply pool lan
ipv6 address 1 ::1/64
ipv6 nd autoconfig managed-address-flag
ipv6 nd autoconfig other-flag
undo ipv6 nd ra halt
ipv6 nd ra interval 60 20
ipv6 nd ra dns server 2400:7FC0:849E:200::4 sequence 0
ipv6 nd ra dns server 2404:C2C0:85D8:901::4 sequence 1
gateway 192.168.1.1
超极限01
发表于 2024-3-23 10:12
请问下,华为有像ubnt那样子的统一管理界面来配置所有设备吗?
xu089757
发表于 2024-3-23 10:25
1. 拓扑拓扑上没啥建议,你的网络也比较简单
2. 网关选型看你的诉求是什么
1)是否考虑万兆?
你是否确实存在超千兆的互联网接入,你的光猫是否具备超千兆的下联端口?如果这些有一个不具备,其实也没必要上万兆设备。
2)软or硬?
如果追求稳定,建议还是使用靠谱的硬路由,软路由的所有能力基本都可以通过一个内网服务器实现。
3)具体品牌?(以下是我个人浅见,如果您不同意,那您就是对的)
经济实惠爱折腾:MikroTik。
有国内应用识别、流控的需求:没钱上ikuai,有钱上panbit(其实ax50c纪念版999也不贵,但是首发没买到的话,咸鱼补票就贵了)。
对国际流量识别有要求:fortigate(别看全新,咸鱼有惊喜)但要注意低端型号跑pppoe性能较差,毕竟别人是个防火墙……
不差钱有售后,不折腾了直接上华为吧,该买的license都买上。
3. ap选型要慎重考虑企业级设备
1)单终端的速度:企业ap的优点是高负载下的稳定,或者其他家用一般都用不上的能力。单终端的速度不是企业级设备关注的重点。
2)信号强度:而且企业级ap的场景一般也都是空旷区域的覆盖,真要有隔断一般也是加设备,所以穿墙能力也不是他们的目标。
具体可以看看这两个视频:
5分钟告诉你在家用企业级AP的坑有多深
Aruba的WiFi用了很久,今天有些话不吐不快
如果你看完还对企业级设备感兴趣,那最无脑的建议是用Aruba(虽然我是用的fortiap,因为已经有了fortigate和fortiswitch,凑个全家桶)。魔力象限还是有一定参考性的。
nineapple
发表于 2024-3-23 10:53
目前还没有万兆口的POE交换机吧
小魔头
发表于 2024-3-25 08:26
xu089757 发表于 2024-3-23 10:25
1. 拓扑拓扑上没啥建议,你的网络也比较简单
2. 网关选型看你的诉求是什么
感谢回复。
1.我这个主要是考虑内网万兆,甚至25G、40G这种。外网反正千兆我觉得是够用的。我主要是照片、视频剪辑这种,素材再NAS里,所以对内网速度要求很高。
2.感觉这么一说,还是硬件路由器+内网服务器靠谱?但是好像内网服务器的玩法网上看到说的不多,有没有入门教程,求推荐。
xu089757
发表于 2024-3-25 09:29
nineapple 发表于 2024-3-23 10:53
目前还没有万兆口的POE交换机吧
还挺多的,就是看准备出多少米了……
xu089757
发表于 2024-3-25 09:37
小魔头 发表于 2024-3-25 08:26
感谢回复。
1.我这个主要是考虑内网万兆,甚至25G、40G这种。外网反正千兆我觉得是够用的。我主要是照片 ...
那还是具体要看你有什么需求了,感觉并没有什么全套方案。
比如你如果需要ddns,而你的硬路由又不支持,就可以在服务器上定时任务去curl一个能获取当前外网ip的地址,然后再调用对应服务商的api设置dns。
其他的也是差不多的意思,一般的需求搜一下有没有能实现的docker镜像,能省不少事。
baoziking
发表于 2024-3-29 15:29
楼主,你那台华为的交换机有多少分贝?
小魔头
发表于 2024-3-30 21:57
baoziking 发表于 2024-3-29 15:29
楼主,你那台华为的交换机有多少分贝?
凑近有60分贝,距离1米大概52分贝。
这个还是温度低,风扇最低负荷(25%)下的情况
goat
发表于 2024-3-31 03:34
国内除非开6G,不然AP用上代6760足矣。就算加了rtu也就半台8771的价格,性能基本一样。当然口袋不痛直接上8760,虽然说同样价格买上代产品可能觉得有些那啥,但是8771没6G实在是[流汗]
Krakenius
发表于 2024-4-6 22:47
goat 发表于 2024-3-31 03:34
国内除非开6G,不然AP用上代6760足矣。就算加了rtu也就半台8771的价格,性能基本一样。当然口袋不痛直接上8 ...
6GHz以后可能会开放吧,8771-X1T硬件是支持6GHz的
goat
发表于 2024-4-6 23:29
Krakenius 发表于 2024-4-6 22:47
6GHz以后可能会开放吧,8771-X1T硬件是支持6GHz的
wifi的6Ghz目前看就是挂起晾着,自然风干状态。等移动通信的6G试商用发现6Ghz基本没用或许会吐点出来...问题那时候应该开始/已经卷wifi8了
另外8771还不能关三频用8x8,只能4x4+4x4,不过最近发现多射频比多天线更有用[流汗]