I’m looking at getting a 10 gigabit network switch. I only have 3 devices that could use that speed right now but I do plan on upgrading things over time.

Any recommendations?

  • @hungover_pilot
    link
    English
    172 months ago

    I’m partial to mikrotik gear, the CRS305 has 4 sfp+ ports for around $150.

    • @just_another_person
      link
      English
      -12
      edit-2
      2 months ago

      Gonna disagree here. Microtik is a problematic company at best. They’re super lax on security, and they’ve had a lot of issues with their products in general. They also offer no real warranty, but I assume that’s because they aren’t a dedicated networking company (they make other things).

      Just last year the flags were raised on dated firmware that left something like a million devices vulnerable, and their response was lacking.

      On the plus side: they are part of the EU, so data protection laws apply, and they do seem to be in the forefront on uptake of modern equipment and standards.

      • Neshura
        link
        fedilink
        English
        112 months ago

        Can you elaborate on how their response was lacking? From what I found the stable branch had a patch for that vulnerability available for several months before the first report while the lts branch had one available a week before the first article (arguably a brief period to wait before releasing news about the vulnerability but not unheard of either).

        MikroTik also offers a 2 year warranty since they legally have to, no idea what you’re on about there. Also also not sure what you think they sell other than networking because for the life of me I can’t find anything other than networking related stuff on their website.

        • borari
          link
          fedilink
          English
          112 months ago

          Yeah I’ve worked at WISPs that were pushing TBs through their core routers every day. Those core routers? Mikrotiks. Every apartment buildings core routers and fiber aggregation switches? Mikrotiks. You had to get down to the access layer switches that fed the individual apartments to hit Cisco equipment.

          This person is just repeating some shit they read somewhere, hoping it makes them sound knowledgeable. In another post they’re recommending trendnet shit. Get back to me when you can set up BGP peering on your trendnet lol.

          • borari
            link
            fedilink
            English
            82 months ago

            Wow you found three different articles, all about the same CVE, that the manufacture published a firmware patch for before any public disclosure was made. That’s definitely just as bad as pretending you don’t know about CVEs in your products lol.

            • Neshura
              link
              fedilink
              English
              92 months ago

              Yeah they definitely could have been quicker with the patches but as long as the patches come out before the articles they are above average with how they handle CVE’s, way too many companies out there just not giving a shit whatsoever.

              • @[email protected]
                link
                fedilink
                English
                32 months ago

                the manufacture published a firmware patch for before any public disclosure was made

                They were pretty quick for the stable branch, so I guess the miss is prioritizing it for LTS. But if it’s just the one time, I’m completely fine with that.

          • Neshura
            link
            fedilink
            English
            42 months ago

            So first of all I see no point in sharing multiple articles that contain the same copy-pasted info, one of those would have been enough. That aside, again, patches were made available before the vulnerability was published and things like MikroTik not pushing Updates being arguably more of a feature since automatic updates cause network downtime via a reboot and that would be somewhat problematic for networking equipment. Could they have handled that better? Yes, you can almost always handle vulnerabilities better but their handling of it was not so eggregious as to warrant completely avoiding them in the future.

            • @just_another_person
              link
              English
              -92 months ago

              Well because one is WAY WORSE than the other, and the response of commitment is way different. You’re just plain wrong.

              • Neshura
                link
                fedilink
                English
                6
                edit-2
                2 months ago

                If I buy a switch and that thing decides to give me downtime in order to auto update I can tell you what lands on my blacklist. Auto-Updates absoultely increase security but there are certain use cases where they are more of a hindrance than a feature, want proof? Not even Cisco does Auto-Update by default (from what I’ve managed to find in this short time neither does TrendNet which you’ve been speaking well of). The device on its own deciding to just fuck off and pull down your network is not in any way a feature their customers would want. If you don’t want the (slight) maintenance load that comes with an active switch do not get one, get a passive one instead.

              • borari
                link
                fedilink
                English
                42 months ago

                My dude. You are not a serious person. I’m blocking you so I don’t waste my time with you in the future. Enjoy your life I guess.