Hello everyone.
For our new build (single-family house), I am planning a network cabinet. A total of 13 Cat7 cables will terminate in the utility room.
I would like to store the router, switch, patch panel, and a power strip inside the cabinet.
The provider will supply a FritzBox 7590 AX. In my shopping cart, I currently have a 10" switch, 10" patch panel, and 10" power strip. What wall-mounted cabinet would you recommend? I am currently considering a 10" cabinet with 6U of rack space.
We will also have outdoor cameras and a doorbell with PoE. I would prefer to store the data centrally instead of on the camera’s SD card. What kind of system would you suggest for this? The hardware should ideally also fit inside the cabinet.
Best regards
For our new build (single-family house), I am planning a network cabinet. A total of 13 Cat7 cables will terminate in the utility room.
I would like to store the router, switch, patch panel, and a power strip inside the cabinet.
The provider will supply a FritzBox 7590 AX. In my shopping cart, I currently have a 10" switch, 10" patch panel, and 10" power strip. What wall-mounted cabinet would you recommend? I am currently considering a 10" cabinet with 6U of rack space.
We will also have outdoor cameras and a doorbell with PoE. I would prefer to store the data centrally instead of on the camera’s SD card. What kind of system would you suggest for this? The hardware should ideally also fit inside the cabinet.
Best regards
D
DaGoodness28 Aug 2023 16:46Basically, I agree with you. However, I see the internet connection itself as more of an entry point than an external socket.
Why would a malicious hacker leave their dark basement — from where they can basically access all the “unsecured” houses — to roam the streets and spend time searching for a socket?!
The average burglar has no IT knowledge and just takes whatever they can sell.
A skilled hacker knows so much that they don’t even need to be physically at the house to access the “unsecured” network.
Why would a malicious hacker leave their dark basement — from where they can basically access all the “unsecured” houses — to roam the streets and spend time searching for a socket?!
The average burglar has no IT knowledge and just takes whatever they can sell.
A skilled hacker knows so much that they don’t even need to be physically at the house to access the “unsecured” network.
DaGoodness schrieb:
Basically, I agree with you. But I see the entry point more likely as the internet connection rather than an external outlet.
Why would a malicious hacker leave their dark basement—from where they can basically access all the "unsecured" houses—and roam the streets looking for an outlet to hack through, which would take a lot of time?
The average burglar has no IT knowledge and just takes whatever they can turn into money.
The malicious hacker knows so much that they don’t even need to be physically at the house to access the "unsecured" network. I have to agree with you on that as well. What you’re saying is true, but you never really know.
Most likely, I would estimate the risk is that someone who somehow knows you wants to harm you—whether only briefly, old enemies, or someone acting out of desperation. The actual risk is, of course, not very high.
For peace of mind, though, using RADIUS authentication is a good step. It doesn’t take more than 10 minutes of work if you know how.
We have sold the TP-LINK CPE210 several times in the past. It is a solid, very affordable device for 2.4GHz Wi-Fi. It will probably be sufficient. If you are not satisfied with it, you can later replace the injector (indoors) and the access point (outdoors).
For the older versions of the TP-LINK CPE210, there was "Freifunk firmware." We only sold or gave those away as part of a promotion with this firmware installed. Therefore, my experience is somewhat limited. The currently sold version unfortunately no longer supports this, or in other words, it is no longer supported by Freifunk with compatible firmware.
With Freifunk firmware, you wouldn’t have to worry about protecting the LAN port mechanically. Alternatively, you could install a FB 4040 with Freifunk firmware inside before the device. That way, you would have peace of mind but no direct access to components within your network.
For the older versions of the TP-LINK CPE210, there was "Freifunk firmware." We only sold or gave those away as part of a promotion with this firmware installed. Therefore, my experience is somewhat limited. The currently sold version unfortunately no longer supports this, or in other words, it is no longer supported by Freifunk with compatible firmware.
With Freifunk firmware, you wouldn’t have to worry about protecting the LAN port mechanically. Alternatively, you could install a FB 4040 with Freifunk firmware inside before the device. That way, you would have peace of mind but no direct access to components within your network.
I have already successfully used these for exactly this kind of application (accidentally drilling into cables): Metz Connect cable connectors Class FA CAT 7a 130863-02-E. They require little space, but are quite expensive. Note: They must be tightened well (up to just above the marking) to ensure proper contact.
i_b_n_a_n schrieb:
I have already successfully used these for exactly this kind of situation (cable accidentally drilled through): Metz Connect cable connectors Class FA CAT 7a 130863-02-E. Requires little space, but quite expensive. Note: Must be tightened well (up to just beyond the marking) or there will be no contact.Thanks a lot. Much better than completely reinstalling the cable, especially now that the plaster is already on.
Similar topics