Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Home Lab Explorers

1k members • Free

31 contributions to Home Lab Explorers
Looking For Recomadations
I'm looking for a network switch with Home Assistant monitoring capabilities, budget around $100. I'm new to homelabbing and currently have a TP-Link BE9700 Tri-Band Wi-Fi 7 Router with Cat8 cabling from the router. My office is in the basement, where I need to connect an old desktop being used as a server, two laptops, and a work computer via Ethernet. Current internet speed is 1Gbps (not fiber yet). Any recommendations?
3 likes • 6d
Your router has 4 x 2.5GbE RJ45 ports. So I would think you would want to stay with 2.5GbE as a minimum with your switch. With that said you might want to take a look at this review:https://www.servethehome.com/the-ultimate-cheap-2-5gbe-switch-mega-round-up-buyers-guide-qnap-netgear-hasivo-mokerlink-trendnet-zyxel-tp-link/. You mention Home Assistant monitoring capabilities. The switch is not going to monitor Home Assistant itself. If you get a managed switch it will monitor the port that your Home Assistant instance is connected to if that instance is a bare metal install and connected to this switch. An unmanaged switch will not monitor anything. All you will get with an unmanaged switch is the blinking LED's that are on either side of the RJ45 port. If you are looking for a switch that you can monitor with Home Assistant then you should look for one with a good integration. Ubiquiti has an "Official" integration. TP-Link, NetGear, D-Link, and Mikrotik have community integrations in the HACS store. I have no idea how well any of these will work. You may end up having to use SNMP, which Home Assistant as an integration for, you just need to make sure that your switch also supports SNMP, some do and some don't. You also might want to look at the used market (eBay) etc. You might find something that will meet your needs there. When buying used make sure you can determine what "Version" your switch is. TP-Link will have a switch with a part number then a version 1, 2, or 3, etc. As their software is updated a certain version may end up becoming "end of life (EOL)" meaning you won't get any more updates for that version. Other brands do the same thing, that is not just a TP-Link thing. You also might want to think about POE with your switch. If you think that IP cameras or IP phones might be in your future then POE would be real handy. Also think about the number of ports. You said you need at least (4). There are some with 8 ports that are generally desktop switches (not rack mountable).
1 like • 3d
@Tj Hoag Not a problem. Let us all know what you end up with. Also @Brandon Lee just did a blog post about upgrading your Homelab equipment which has several switches you might want to look at. I am working on pre-configuring my MikroTik switch with their routerOS. It is not for the "faint of heart". Big learning curve. But that is what this is all about learning :>)
Proxmox Container Guide now that we have OCI containers in 2025
Complete Guide to Proxmox Containers in 2025: Docker VMs, LXC, and New OCI Support https://www.virtualizationhowto.com/2025/11/complete-guide-to-proxmox-containers-in-2025-docker-vms-lxc-and-new-oci-support/
Proxmox Container Guide now that we have OCI containers in 2025
1 like • 10d
I quickly spun up a TriliumNext Notes Docker image and it seemed to work flawlessly. I didn't setup persistent storage so I destroyed the container after logging in and taking a look around. I intend on trying again when I get a chance. However if this works it would be a game changer for me. I guess my question would be the pass through of devices. I had trouble trying to pass through USB devices to an LXC container when trying to setup a NUT server with persistent device names and keeping the correct permissions on them. When I couldn't get it to work I decided to just do it natively on the Proxmox OS.
Proxmox VE 9.1 has been released! Going to upgrade your home lab?
Check out my write up on the new features here: https://www.virtualizationhowto.com/2025/11/proxmox-ve-9-1-launches-with-oci-image-support-vtpm-snapshots-and-big-sdn-upgrades/
Proxmox VE 9.1 has been released! Going to upgrade your home lab?
1 like • 15d
Already done also! No issues, smooth as can be. The reboot gave me an excuse to shutdown the server and install my new (to me) 10GbE PCIe SFP+ NIC. When I restarted the new interfaces were recognized by Proxmox. Now I have to get my DAC cables (due today) and start configuring my new (to me) Mikrotik switch that has (4) SFP+ ports. :>)
TP-Link in the USA
I read an article and have seen it confirmed I think on Wired that the US Commerce Department along with several other US Government agencies have recommended that the US ban the sale of TP-Link routers in the US. The consensus for this is that TP-Link USA (a separate company) is beholden to their previous owner TP-Link China and that the Chinese government holds sway over them. With this and the popularity of TP-Link routers in the US (reportedly upward of 50% of US home/SoHo routers in the US are TP-Link) these other agencies feel like the Chinese government would have too much possible access to sensitive US data. With that said I really don't want this post to be some sort of political tit for tat discussion. I have recently become heavily invested in TP-Link products. I have two of their switches within the last 3 months and 3 of the AP's within the last year, along with running the Omada software controller to administer these devices. I also have over 40 TP-Link WiFi smart switches, outlets, and multi-outlet strips. I consulted with Gemini :>) and per its research the reported problems with TP-Link products are no more and really no less than other manufacturers (Netgear and LinkSys). So it is really a matter of whether the Chinese government could gain access to US data. Again with that said my questions become do I believe that this could happen (government access), what is my exposure, and do I really consider replacing all these products if TP-Link and their products are banned from this country? What do you all think?
1 like • 16d
I don't disagree but I guess my question really is if the US bans the sale of TP-Link routers in the US, do you think they would ban their AP's, Switches, and other TP-Link products. If they are banned what do consumers (Me) do? Because of my network design I don't believe my access switches are really exposed. The weakest point of my system are my ap's through my guest network. The IOT stuff is already pretty much shut out of the internet, but there are other things I can do to isolate them further without making them useless. With that said I had contemplated making some changes and have started to move forward with them. Instead of (3) Proxmox servers in a (3) node cluster, I have gone to (1) Proxmox server as an application server. (1) Truenas Scale server as a storage server, and (1) small server as a Frigate NVR. Along with this I wanted to add multi-gigabyte Ethernet to the picture. I decided on replacing (2) TP-Link Omada access switches with (1) Mikrotik (24) 1GbE ports POE+ switch that has (4) 10GbE SFP+ ports on it. I have purchased (2) 10 GbE network cards and will get (2) DAC cables day after tomorrow. I will install them in the above mentioned application server and storage server to form a 10GbE "backbone". As I move forward I will start to think about replacing my AP's with Ubiquiti AP's. An excuse to upgrade to 10GbE in my network. Now all I need to do is to get all this stuff I have replaced/upgraded sold to recoup some of my costs :>)
1 like • 16d
@John Lohman In my interaction with Gemini it did not necessarily quote "the company's" own words. In fact see the following conclusion that it gave me: ⚖️ Conclusion It is difficult to definitively say one manufacturer has "more exploits," but the data suggests: - Total Reported Vulnerabilities (CVEs): Cisco and Fortinet generally have a higher total number of CVEs recorded due to their complexity, product volume, and transparent disclosure practices. - Mass-Exploitation: TP-Link and similar consumer brands are frequently involved in large-scale botnet attacks due to widespread deployment and often-unpatched consumer firmware, making them a significant concern for general internet security. The most important factor for any user or organization is not the overall vendor count, but how quickly and effectively you apply patches and updates to your specific devices. And that last line is probably the most important "advice" given, "apply patches and updates to your specific devices". The question then becomes will you continue to get updates. If the "ban" stops the updates then all your equipment immediately becomes obsolete and thus vulnerable to any future exploits. As a used equipment purchaser I am becoming more aware of EOS and EOL issues, especially with vendors such as TP-Link, Netgear, Linksys, etc. It will be interesting to see how this all plays out, but like you I have already made the move to change out my TP-Link switches and will make a plan to change out my TP-Link AP's.
n8n Exposure
Hey everyone, I’m exploring the safest way to expose an n8n instance to the internet so it can work with external services, and I’d love your input on hardening practices. I see a lot of deployment guides but far fewer security deep-dives. My setup - Proxmox cluster - Virtualized pfSense - Ubuntu 24.04 server (Docker) - Official n8n Docker behind Traefik - Isolated VLAN for this stack (blocked from other VLANs) - Cloudflare Tunnel connector on a separate VM (same LAN) - UFW: default-deny inbound; SSH allowed only from a specific IP - Docker publishes 80/443 for Traefik (UFW doesn’t interfere with Docker’s chain) - SSH via keys (no passwords) - Fail2Ban enabled What I’m asking: 1. What additional layers would you add for an internet-facing n8n (especially auth, network controls, rate-limiting)? 2. Any Traefik or Cloudflare Tunnel rules you recommend (mTLS, WAF, IP allow-lists, Cloudflare Access, etc.)? 3. Gotchas you’ve hit with Docker/UFW/Traefik interplay or n8n webhooks under tunnels? 4. Monitoring/logging tools you’ve found helpful for detecting abuse (and sane defaults for alerts)? 5. Goal: A practical, defense-in-depth checklist others can reuse. Suggestions, examples, and “don’t do this” stories are all welcome. Thanks in advance!
1 like • Nov 1
If I am not mistaken you could setup Wireguard between the machines and use the virtual private tunnel to have the API's request received and handled without opening any ports on your router. Tailscale installed on both machines with a free Tailscale account would make it even easier and Tailscale is based on Wireguard and for what its worth I believe the founders are ex-Googlers. I used Wireguard but it can be a pain to setup, Tailscale is as easy as pie :>)
1-10 of 31
Chuck Rudolphy
4
57points to level up
@chuck-rudolphy-2863
Retired Salesman, Linux enthusiast, home-labber.

Active 3d ago
Joined Apr 30, 2025
Conroe, Texas USA
Powered by