On VLANs…I'm not sure I understand this.
woland's right: I was sloppy in my terminology and confused
bridge VLAN filtering with
inter-VLAN routing. Even the RB5009 doesn't do the latter. It's more a CRS3xx or CCR2xxx type of thing.
VLAN filtering has
many uses. For instance, VLAN tag ingress filtering says, "This traffic is mine, gimme…that traffic is not, toss it." Under RouterOS 7.1+ on an MT7621 based device like the hEX S, enabling that feature no longer disables bridge hardware offloading. However, the Atheros8327 based devices like the hAP ac³ do not yet enjoy that benefit: you can do VLAN ingress filtering on them, but it happens on the CPU.
VLAN filtering also lets you say things like "If input traffic on this port isn't VLAN-tagged, give it ID 42." Once again, the hEX S can now do that on the switch chip, whereas if you ask the hAP ac³ to do that, it'll have to do it in software, on the CPU chip.
And that's fine! Routers are CPU-centric devices. It's very nice that the hEX S can now do these things in hardware, but that doesn't mean the hAP ac³ is useless because it cannot.
MikroTik is a very tech-focused company. They don't put
switches and
routers on separate product pages simply for marketing reasons. Given two MT boxes with 5 Ethernet ports each where one's classed as a router and the other as a switch, even though both run RouterOS, it's inadvisable to treat them interchangeably, even though at some level they are.
A switch is focused on wire-speed shuttling of traffic among interested nodes based on relatively simple rules. Inter-VLAN routing is one expression of this because it means some other device (likely a proper router) has tagged the traffic, so now it's up to the switch to deliver it to the proper endpoints based on those VLAN tags. Switches without inter-VLAN routing still make wire-speed switching decisions, but at a lower level based on MAC addresses, IGMP snooping, and other things they learn about the network as they run.
In a pure router, all traffic crosses the CPU, because that's where the routing rules are, specifying where each packet goes.
Because of this distinction, it's often advantageous to get a router
and a switch. The router routes, and the switch switches. There are high-end devices in MT's lineup that do both well (e.g. the CCR line) but down at the hEX/hAP level, you're making tradeoffs.
I'm not trying to talk you into adding a switch to your hEX/hAP purchase decisions. I'm pointing out that while you've chosen a router for good and sufficient reasons, you should not expect it to be a top-end switch. These wondeful little guys do have a switch chip inside, and because of this they'll hold up well against a
CRS106, but they'll have their asses kicked at raw switching by a
CRS305. See the
bridge hardware offloading feature table: note the row of green boxes on the CRS3xx line.
a security camera system on its own VLAN
Real-time HD streaming video over WiFi is lunacy as far as I'm concerned, so I'll assume wired, leaving you only 3 ports with the hEX/hAP units you're looking at after sending one up to the Internet and one down to the existing WiFi system.
(The hEX units have a sixth port, giving them their name, but to make it even I'll say that if you choose the hEX S, you've used its SFP port as a link back to a separate switch for other wired clients in another room, taking some load off the WiFi.)
Are 3 ports enough for your cameras?
Would something like that take advantage of the updated support for HW offloading for VLAN filtering?
If you run the cameras to a hEX S wired, you can VLAN-tag the ingress frames without disabling hardware offloading. A potential benefit of doing so is that you could then use VLAN tag filtering to keep those packets from going to the IoT network out of concern that your Evil Brand smart TV might be exfiltrating your security cam streams to China. It'd all happen in hardware, keeping the CPU free to do everyday routing tasks.
You could do the same with the hAP units, but these packets would have to cross the CPU switch to achieve such an end.
I have the tp-link EAP245
I don't know that hardware, but a quick skim of
its specs page implies that the only way to use VLANs with it is to set up a separate SSID for each VLAN. Even if that truly is the limit of its VLAN capabilities, it's quite useful: it lets the router to make decisions based on which SSID the traffic came from.
One common way to use that is to set up a guest network that's only allowed to access the Internet. Another is to have an IoT network that can only access the cloud services your devices need, not the LAN services they do not.
power the hEX S on port 1…not add another wall wart if I can help it
It sounds backwards to me, but do as you like.
Making the router power the AP is "forwards," since the router is normally near a power point, while the AP is often not.
Another "forwards" example is a security camera, which may be mounted in a location that's hard to vandalize, but consequently far from an AC power point. PoE lets you pull just the one low-voltage data line.
it seems ok to miss out on ZeroTier. Especially if WireGuard is a decent alternative should the need arise.
ZeroTier and WireGuard are only alternatives in a limited sense.
WireGuard is a point-to-point encrypted tunnel, useful either for letting individual hosts VPN back into the LAN or for building site-to-site links between two routers.
ZeroTier is a virtual L2 switch in the cloud. While that does let you do VPN-like things, it's capable of much more. Read up on it before dismissing it. I'm not arm-twisting you into going with ZeroTier; I use WireGuard by preference myself, but it's out of a reasoned awareness that my needs don't yet require ZeroTier.
RB4011 or RB5009…much more powerful than I really need
Here's a reason you might not have thought of: 10G is dropping into the consumer range. High-end PCs are coming with 10G ports now, as are high-end NAS devices. A lot of stuff will remain 1G or slower, but even then, being able to aggregate multiple 1G links over a 10G uplink can make sense.
In my home network, I have a 4011 run over SFP+ back to a CRS328 per the router vs switch distinction I wrote of above. The 4011 is in the entertainment center with the Internet equipment, so each of the 1G links there effectively has a dedicated path back to the core. If I have a big Internet download running back to the office, it doesn't stall the over-the-top box running the flat screen, and neither of them bother the security cameras.
I'll admit to having weak justifications for the CRS328: it's the only switch in MT's lineup with multiple PoE out and 4x SFP+. What I really need is a 4x PoE + 4x SFP+ switch, but such does not exist yet. My alternative was to strap a hEX PoE to a CRS305, which did not appeal.
It sounds like my best alternative without overdoing it on price or hardware would be the hAP ac3.
I like the hEX S better:
- hardware VLAN filtering
- an SFP port for uplink to a proper core switch
- no unnecessary WiFi
- wee and cute
I'll trade ZeroTier away for all of that gladly.
It also seems like I would not need to replace it if I were to get much faster internet.
By clues from your posts, I'm going to guess that you're subject to cable data caps. In that world, a faster pipe just gets you into trouble faster. Unless you're willing to pay extra for "unlimited" Internet, 100 Mbit/sec is about as fast as makes sense. As long as that situation doesn't change, the only reason you'd outgrow a hEX/hAP is because of LAN-side things like the 10G core I brought up above.