Table of Contents

: Intro
: WRX560 - package & content
: WRX560 - specifications
: Setup and configuration

: Wi-Fi support and speed tests

: Conclusion

: Intro

This year has been very fruitful for Synology in terms of new devices coming to the market. On top of the new x23 models, back in May, we got a brand new RT6600ax router. Presented as a flagship model and with the introduction of wifi6 support, this was a clear indication that the age of AC standard has come to an end.

Synology RT6600ax - NEW router for the Wi-Fi 6 era
The NEW Synology RT6600ax WIFI 6 router with SRM 1.3 is here!

This does not mean that we will not be able to use the current RT2600ac or MR2200ac devices (individually or in mesh), it simply means that it is time for an upgrade. So far Synology has delivered four router models starting with the RT1900AC to the current RT6600ax.

Just as much as the MR2200ac was a complementary (but it can function on its own) device to the main RT2600ac, the same goes for the new WRX560 11ax and RT6600ax. These two models will present the new mesh setup option, while remaining compatible with the older ones as well, presuming that all devices inside the mesh are on SRM 1.3.1 or better.

Let's see what the fifth router in line can bring to the table both as a stand-alone router or as a part of a larger mesh setup.

WRX560 11ax key features

The current Synology network lineup

: WRX560 11ax - package & content

With an already familiar design, the WRX560 comes in a single slim package that already speaks about many features and options this device has to offer.

WTX560 11ax package with minimal yet very informative label on the front
Back of the box offers more detailed table of specifications

With less than 1.4 kg in weight, the inside of the box contains only three things. The router itself, power adapter, and a single LAN cable.

The adapter is modular, so you can exchange the connector type with a different standard one if you have it or plan on buying it.

The whole content of the package. Power adapter is modular!

: WRX560 11ax - specifications

Looking at the specifications of this router it is following in the footsteps of its big brother with some changes here and there. To start, it is using a quad-core 1.4Ghz CPU, but with half the RAM coming in at 512MB. This is the same capacity that RT2600AC has.

The WRX560 router

Just like the RT6600ax, it has also two antenna types. 2T2R + 4T4R omnidirectional high-gain dipole (2.4 GHz/5 GHz) with a max speed of up to 600 Mbps for the 2.4GHz, and 2400 Mbps for 5GHz. Just like the MR2200AC, this router has no visible antennas as expected.

Supported wireless standards are 802.11 b/g/n/ax (2.4Ghz), and 802.11 a/n/ac/ax (5 GHz) just like on the RT6600ax model.

On the side and the back, are all the ports and options that come with this router. A familiar 5-port RJ45 setup with one dedicated WAN port (1G), and 1+3 LAN ports. LAN1 port can also be configured as WAN2 and just like on the RT6600ax model it is 2.5G capable. The rest of the ports are 1G in terms of maximum speeds.

Ports and cable connectors are protected by being pushed inside the case.

The mentioned 2.5G LAN1/WAN2 port can be used with your ISP delivering multi-gig speed, or as a backhaul connection towards another RT6600ax/WRX560 device.

WPS, Wi-fi and USB 3.2 connectors are all along a single side of the router

WRX560 also has a single USB 3.2 Gen 1 port on the side that can be used for connecting mass storage devices. The main use will be installing apps from the Package Center as well as holding the Threat Prevention database on it. This port supports USB hubs as well, so if you have one, and want to use an SD card instead, you can.

WARNING: USB 3 port speed will be downgraded to USB 2.0 to not interfere with the 2.4 GHz signal in case you will be using it!

If we compare the WRX560 model to its previous generation, the MR2200ac (regardless of that WRX560 is advertised as RT2600ac successor) in terms of size and weight it is only about 80 mm taller than the MR2200ac model, weighing only 1 kg. 233 x 194 x 66 mm (H x W x D) still makes it a compact router or a WiFi access point inside a mesh setup.

WRX560 - due to its depth the router is very stable

Just like the previous generation, the WRX560 is a standalone device that can't be wall-mounted so keep that in mind in case that is a requirement.

Considering it is a faster device with better hardware components it is noticeably better ventilated. With no active cooling, the router has plenty of airflow gaps on every side apart from the side ones. The biggest ventilation is coming from the bottom and the top side, so consider not placing the router in a tight space to allow for better bottom-to-top air flow circulation.

The bottom side also has a total of four rubber feet that will hold the router in place and elevate it to allow air intake. With its 66 mm in depth, it is much thicker than the MR2200ac but that is the price for more air volume needed to cool the faster CPU and placement of wi-fi 6 capable hardware.

3 LEDs on the front for status, wi-fi, and WAN are the only lights on the whole router

The WRX560 has no visible lights on itself other than the three LEDs on the front of the unit. With its design, it will be possible to place it in some more visible areas of your household as it also has no visible antennas.

WRX560 in a living setup

If the design is something that is also a factor, with its rugged enclosure, and minimal lightning with no active cooling, there will be no need to hide it out of sight and potentially cause heating issues along with it.

WRX560 along RT2600ac

The size of the router as well as its default vertical orientation will make it stand out for sure, so if this is the device that anyone is considering, be sure to have a place for it, as well as maybe to see it in person before getting it, just to be sure it "works with the room".

: Setup and configuration

The WRX560 comes with an SRM 1.3 version just like the RT6600ax. The device will be preloaded so the only thing left to do after it's powered on, is to connect to the router's interface (via its IP address) and finish the configuration.

:: SRM install

The router is preconfigured to use the network range, specifically IP address. Logging onto it, the initial SRM page will load up and the configuration process starts.

Start of WRX560 configuration
Creating the initial administration account
Configure the wi-fi network (it will be a combined 2.4 & 5Ghz)
Connect to the wi-fi network, or via the ethernet cable
Time to configure the Internet connection

After the initial reboot and previous steps, SRM will allow you to configure your internet connection.

NOTE: Do note that the initial connection will be configured (and can only be configured) on the blue WAN port on the back of the router. If you want to configure your connection using the LAN1 (2.5G) port, you will have to try and do it later inside the web UI.

Once you have completed the above steps, log into the router using the account configured during the setup process.

:: SRM 1.3

With SRM now up and running it is time to tweak and configure it. I will not go into all the details, and elements of the OS, but rather mention parts that are both important and interesting for a wider audience.

Synology Router Manager 1.3. The new major version that came out in May of 2022
Network Center and Wi-Fi Connect modules will be the most used elements of SRM
Safe Access is a great all around feature for protecting your LAN, devices and users
With the new DS Router 2.0 we can administer almost all of the features on the go

The images reflect the main elements of the SRM that is the same across all routers that support it. In the following sections, there will be a focus on some of the major elements that SRM offers as well as how to configure them and what would be the benefit of running your own router instead of a generic ISP one.

SRM "desktop" let the fun begins!

:: Network Center

After the initial setup, we are now left with a choice to configure all the settings that this device offers. From Internet connection to local security, Safe Access, or some of the dedicated packages that offer specific functions, like a VPN server.

For the most part Internet connectivity is high on everyone's list so it would be logical to start there. The Network Center module of SRM is where most of the functions live, so it is normal to start there, and the fact that most users will spend a great deal of time there setting up and configuring.

The module is divided into much the same sections as in the previous 1.2 version with some exceptions and new features.

SRM 1.3 Network Center - the main module covering a lot of options

The Internet section will be the place to go and configure the needed settings in terms of Internet connectivity. This will also be a place where we can configure the LAN 1 port (WAN2), as a secondary WAN port in case we want to take advantage of the 2.5G port speed.

NOTE: Using the LAN1 (2.5G) port as your WAN port is still not supported if you need to apply a custom VLAN ID to it. This has been confirmed by Synology HQ as a pending SRM change in the near future.

In general, if the initial setup wizard was used when setting up SRM, the Internet connection should be all good to go. As I mentioned earlier, we will need to have the router connected to the WAN (blue) port in the back to get this going as well as any custom ISP configuration that needs to be done.

By custom, I am referring to the usual VLAN ID value(s), especially if there is an option to directly connect the router to the ISP infrastructure without the need to use their router beforehand.

At the moment of writing this article, setting custom VLAN IDs for WAN or LAN1 ports is not working as intended. Setting a custom ID will apply to the WAN port, but once you activate the LAN1 port as your secondary WAN port, the value is not applied. It means that the LAN1 port remains untagged with the default value of 0.

"The WRX560 was released with the same SRM version as other models. The development of custom VID for LAN1/WAN2 is still ongoing."

Mike JJ Chen
Director @ Synology

So why is this a problem? Well for my particular case, my ISP has a custom VLAN ID value that needs to be applied and it works as I said for the WAN port. But, in order to test the new 2.5G port as a WAN port, I am unable to do it as the VLAN ID is not applied and because of it, I do not have access to the Internet. Finally, I am unable to test this multi-gig port in a multi-gig ISP setup.

With SRM 1.3 version and VLAN support for all ports, as well as the option to make multiple networks, we now have a visual presentation of the status and VLAN ID values.

VLAN tag table

As the image presents, a custom VLAN ID has been applied to the WAN port/network and Internet access works just fine. However, activating the 2.5G port (LAN1) as the WAN port will make the following change.

LAN1/WAN2 port and its VLAN ID value

For those not familiar with how WAN tagging works in SRM the official KB explains it.

What we need to take out of it is the following:

  • If the secondary interface (LAN 1) is not enabled, the VLAN ID for outgoing interfaces will be applied to the primary one (WAN).
  • If the secondary interface (LAN 1) is enabled, the VLAN ID for outgoing interfaces will be applied to LAN 1.

So bullet No1 (VLAN image 1) works as intended, while bullet No2 (VLAN image 2) does not. Activating LAN1 as your WAN port should apply the same tag ID to it and not leave it untagged (value 0). This matter has been reported to Synology, and hopefully, it will be corrected in the future.

So at the moment, while you can without any problem utilize your WAN port with full 1/1G speeds (more on that later) from your ISP those looking to utilize the 2.5G port as their ISP incoming WAN access will not be able to do it in case there is a need to apply custom VLAN ID values to it.

As said before, this is a pending update to the SRM that will allow a custom VLAN ID to be applied to the LAN1 port then proclaimed as WAN.

Port forward

Depending on the services running inside your home or business, there might be a need to open some ports at some point in order to utilize those services across outside networks, like the Internet. For that to work, we need to be able to port forward specific ports and protocols.

With a general ISP router and the ISP choice, there are situations where some providers do not allow for such scenarios. In case that is not the case and we can indeed provide access to services from outside the local network, port forward is one thing that will need to be configured to make it happen.

Inside Network Center and under the port forward section there is a table of settings that will allow for the configuration of various rules covering specific ports or even a range of ports.

Port forward table
WARNING: Be sure to open only ports that are needed. If there is any way to not open traffic from the internal network to the Internet, be sure to implement it. VPN is a far safer way to get to internal services so consider using it as the only way. More details on it later in the article.


While controlling the network traffic, DHCP pools, and other elements is also possible using the Network Center, here is one more important element that could use some attention.

Closely integrated with port forward, the Security segment will offer some general security features like DoS protection and Auto-block, as well as firewall settings.

SRM 1.3 firewall table

Keep in mind that while we are able to configure various firewall rules, there might already be some in case there is port forwards configured. The reason behind this is that any port forward rule will also become a firewall rule that is not possible to change from the firewall section, so just keep that in mind.

The interesting counter inside the firewall element is also a number of hits. This will show if and how often some port (or range) is being hit. Important to remember as with all firewalls is that rules are applied from top to bottom. So if we want to block or allow certain traffic the list needs to be sorted to pass over "allowed" rules first, and then move into blocked ones.

Operation modes

Another set of options in the Network Center is listed under operation modes. All Synology routers can operate in two major modes. Wireless router, or wireless AP (access point). Depending on the need the device can be configured or reconfigured as needed. As seen in the initial images in the article, SRM setup will offer the option to choose how the device will be configured. If for whatever reason there is a need to change the way the router needs to function, these are the options that will make it happen.

Operation modes

WRX 560 or any other model, will default to the router mode. In this mode, SRM will offer full services that it has unlike when the device is in AP mode. AP will not offer port forwarding or traffic control of any kind, and all ports will be trunk ports as members of the primary network.

:: Mobile Internet connection

Going back to the main section of the Network Center and Internet connectivity, there is also one thing that some users might find interesting. Mobile Internet connection.

SRM on WRX560 offers the same feature as any other device in the lineup. In case there is a need to set up a failover or load-balance scenario when accessing the web, it is possible to configure such setup once the secondary Internet connectivity is detected.

In this case, a single USB port on the router can be used to connect a mobile 4 or 5G stick that will provide an alternate connection route in case the main link goes down. Also, it can be configured to balance certain traffic over the faster link, while pushing the rest over mobile.

As with previous models, WRX560 was tested with Huawei E3372H-153 USB stick. ISP speeds, disconnects, and everything else that comes along with using a mobile internet provider will depend on your specific situation, but in the end, there were no issues in using a 4G connection.

:: VLAN configuration

Considering that the main feature of SRM 1.3 is VLAN support it is worth mentioning it in a bit more detail. While setting up custom ID tags for a potential WAN2 configuration towards a supported ISP, we might get in contact with VLAN tagging, the case in which we will be configuring it is when there is a need for a proper network separation.

With up to 5 separate networks (4xLAN ports + guest network) there are options to divide the network any way that is needed, allow or deny access between them, as well as assign WI-FI networks and DHCP pools to them.

Support for VLANs offers a way to make only wi-fi networks with no LAN ports attached to it, or the option to add one or more ports depending on the need.

Main overview of all configured networks in SRM 1.3

In order to further configure ports and tags for a specific network, there is a VLAN Tag button that will open and present the current state of VLAN tagging as well as offer configuration of trunk ports.

VLAN ID presentation

Each network by default has Internet access using the default NAT settings but all configurations can be changed at any point.

Configuration is straightforward, and in case there is any help needed on the matter Synology's knowledge base will offer all the needed help in configuring the exact setup.

:: Security and protection

In the previous sections there were some mentions of security elements that are a part of SRM by default, but here let's focus on those in a bit more detail, as well as see what else WRX560 and the OS can offer in terms of protection.

Basic elements that SRM offers in terms of security would be a firewall and auto-block options as main features of the Security section inside the Network Center.

On top of those, by default SRM also comes with Safe Access (installed by default), as well as an optional Threat Prevention*.

A firewall offers the main line of defense in terms of allowing or denying traffic to and from the internal network so be sure not to poke too many holes in it (zero if possible) to make communication with the outside world as secure as possible.

Safe Access main overview

Auto-block option will be there to prevent brute-force attacks and black-list the remote IP addresses that the attacks are originating. A blocklist can be exported and cleared and individual IPs removed as well in case there is a false positive case.

On top of those common tools, SRM offers a few proprietary tools such as Safe Access and Threat Prevention to further protect devices and LAN users from malicious websites and content, as well as to make sure that LAN users will not visit unwanted material or have Internet access outside curfew hours.

Website categories and blocked or allowed domains for custom profiles

With Safe Access, there will be options for web filtering using 18 categories of websites that can be active per profile (LAN or user), as well as safe search filtering with YouTube, Google, and Bing platforms. The platform also offers parents to keep tabs on their children's Internet use by monitoring their browsing in terms of what devices are used and what content the child is consuming.

Threat Prevention tool has been around since the first router model (the RT1900ac in 2016) and has evolved a bit along the way. The principle remains the same as the main task of this solution is IPS/IDS (Intrusion prevention/detection). While using a bit more resources than when the platform is not running, TP will increase the security of the networks while invoking a certain degree of speed penalty. This is to be expected as each network package is being inspected for both incoming and outgoing traffic.

Threat Prevention preparing to run for the first time

However, saying this, running this package had zero impact on the browsing speed, and the CPU/RAM of the router was also not affected.

TP settings options

In some cases, TP can behave "aggressively" but it can be configured to prevent such behavior in case access to certain resources starts to become problematic. With automatic updates of its database, it will be a valuable asset in the protection of internal resources.

Per device package filtering

One thing to note here is that while it is an optional package it will require an SD card (via USB hub) or a USB storage device attached to the router. The reason behind it is that its database and configuration parameters will need a place to be installed, and external devices will be it. It is worth noting that faster devices will be beneficial in this case as the inspection on its own has a speed penalty already. So make sure to use the fastest possible (and compatible) device to ensure adequate speeds.

NOTE: activating TP will take some time so be patient. Keep an eye out for any rules that will be blocked, in case some traffic starts to become inaccessible!

Along those apps, there is also an option to use the VPN Plus package for secure and fast access to local networks over a secure Internet tunnel.

With the rise of hybrid and remote work, usage of VPN as a method of connecting back to LAN and its resources from a remote location has been in high demand. While being nothing revolutionary, there are some benefits of using the VPN Plus solution as an optional part of the SRM OS.

VPN Overview

VPN Plus offers configuration of some industry standards as well as some proprietary solutions by Synology to offer and cover all the possible scenarios when one might want or need to use a VPN connection.

With support for SSTP, OpenVPN, IPSec, and their own Synology SSL VPN, users will have the option to use any supported device in order to install a compatible VPN client and connect to their internal services. If that is not the option, a clientless version of a VPN connection is possible where users will land on a publicly accessible portal, authenticate and get access to internal resources via a secure connection. This is possible with the use of Synology WebVPN solution.

VPN connections over VPN Plus will also offer web-based remote desktop and platform-agnostic solutions using their web browser.

Site-to-site VPN (over IPSec)

Finally, VPN Plus also offers site-to-site VPN solutions in case there is a need to stretch LAN over the Internet and offer a protected secure tunnel with access to all local resources without any additional VPN configurations for the user. For more details on the actual implementation of this scenario be sure to check the following article.

:: Packages

SRM Package Center - all apps and solutions that can be installed in order to enhance your setup

SRM offers the same principle when it comes to the installation of new apps and that would be to install them using the Package Center. There are a total of 8 apps and none are mandatory.

Safe Access as mentioned before is installed by default while others need to be manually initiated if needed.

Detection of a USB mass storage device

Most apps will work directly on the router itself, but again, as said before, some will require external storage. Threat Prevention is one, while Download station is another.

Installed apps as visible via the SRM Package Center

From the listed apps it is clear that the router can be more than a simple web edge device. If needed it can be a simple NAS device with a large enough storage, a VPN server, and even a simple media streaming solution.

How the router will be configured is up to the user, but personally, I would advise using a specified device for any non-router/Internet-related tasks, so as to not burden the router itself and allow it to maximize its resources for its primary operations.

This way it will offer the best possible speed in terms of upload and download transfers as well as perform well when it comes to security layers as well.

: Wi-Fi support and speed test

With my personal limitation and access to Wi-Fi 6 capable devices, this time around I had iPhone 11 and iPhone 13 as test units.

As noted before, this is a Wi-Fi 6 router and as such (identical setup of antennas as RT6600ax) will have similar speeds in terms of usage.

Setting and administrating Wi-Fi networks on your Synology router is done using the Wi-Fi Connect module.

The Wi-Fi Connect module is a single place to administer all your SRM wifi needs

Inside it, you can create, configure and edit your wifi networks in terms of names, radios, passwords, channels, and "smart" controls.

On top of that, each wifi network can now have options for Wi-Fi scheduling, MAC filtering, and a number of other advanced features.

:: Mesh configurations

RT2600ac and MR2200ac routers introduced wifi mesh features in SRM back in the day. The same options are present now with WRX560 and RT6600ax routers, but be mindful of the combination of mesh configurations (table below).

In case you are not familiar, Synology mesh requires all devices in the mesh to be up-to-date and on the same SRM version. In fact, once you deploy a mesh, you can update it from a central (main) device that will push updates to any other wifi point in your network.

The most powerful unit must be used as the primary router in the mesh configuration
NOTE - In case you are combining any older model or WRX with the RT6600ax model, keep in mind that the primary router in the mesh will have to be the most "powerful unit".

From the table, it is clear that there is a possibility to combine all four current routers but in a certain way. In short, the most powerful device should be the main device in the mesh, meaning that if anyone is running an older model, and also got either the RT6600ax or this WRX560, they will have to reconfigure the network in order to proclaim this device as the "main" one in the mesh.

Not really a move that makes sense to me, especially with the same SRM version prerequisite, but it is what it is. The upside is that older models (non-AX) are able to work with the new devices, so I guess a reconfiguration is the only thing that leaves a bit of that bitter taste.

:: Speed tests

Because the 2.5G WAN speed was still not an option for me to test out (reasons noted at the beginning) all Internet speeds maxed out at 1G without any problem, but of course, it will depend on the actual device and the type of connection (wi-fi vs ethernet).

As pointed out at the start of the section, the test devices will be wi-fi 6 capable (a pair of iPhones) in terms of Internet and wi-fi (LAN) speeds.

On top of those tests, I have done a quick 4G test using a Huawei 4G stick. As expected the Internet speed was not that great but that will heavily depend on a number of factors. The 4G signal was not that great and reflected the speed results.

4G speed test using Huawei 4G USB as a mobile gateway device over WRX560

On the other hand, the wi-fi 6 connectivity using a fiber connection via WRX560, gave a different result that also varied depending on the test server in the background as well as the rest of the wi-fi traffic on the device at that time.

In an isolated scenario, with a single device on wi-fi (iPhone 11), the speed tests were consistent and in most cases were north of 700Mbits.

iPhone 11 speed test using WRX560 over a 1/500 Gbit fiber connection

Regarding local wi-fi transfers (via the iPerf3 tool), the speeds were various as well depending on the distance and the generation of the device.

iMac (2017) Wi-Fi AC <> iPhone 11 Wi-Fi 6

In this case, the transfers were in most cases similar and averaged about 290Mbits/s.

Accepted connection from, port 57872
[  5] local port 5201 connected to port 57873
[ ID] Interval           Transfer     Bandwidth
[  5]   0.00-1.00   sec  30.4 MBytes   254 Mbits/sec                  
[  5]   1.00-2.00   sec  34.8 MBytes   292 Mbits/sec                  
[  5]   2.00-3.00   sec  36.7 MBytes   307 Mbits/sec                  
[  5]   3.00-4.00   sec  34.2 MBytes   286 Mbits/sec                  
[  5]   4.00-5.00   sec  33.0 MBytes   277 Mbits/sec                  
[  5]   5.00-6.00   sec  40.2 MBytes   337 Mbits/sec                  
[  5]   6.00-7.00   sec  35.3 MBytes   296 Mbits/sec                  
[  5]   7.00-8.00   sec  36.3 MBytes   304 Mbits/sec                  
[  5]   8.00-9.00   sec  36.2 MBytes   303 Mbits/sec                  
[  5]   9.00-10.00  sec  34.8 MBytes   293 Mbits/sec                  
[  5]  10.00-10.24  sec  1.82 MBytes  64.8 Mbits/sec                  
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bandwidth
[  5]   0.00-10.24  sec  0.00 Bytes  0.00 bits/sec                  sender
[  5]   0.00-10.24  sec   354 MBytes   290 Mbits/sec                  receiver

iPhone 13 Wi-Fi 6 <> iPhone 11 Wi-Fi 6

When using two wi-fi 6 capable devices, the speeds are better but nothing groundbreaking. Around 30% better speeds than when using AC Wi-Fi devices with an average of about 420Mbits/s.

Accepted connection from, port 49664
[  7] local port 5201 connected to port 49665
[ ID] Interval           Transfer     Bitrate
[  7]   0.00-1.00   sec  42.9 MBytes   360 Mbits/sec                  
[  7]   1.00-2.00   sec  49.1 MBytes   412 Mbits/sec                  
[  7]   2.00-3.00   sec  50.5 MBytes   423 Mbits/sec                  
[  7]   3.00-4.00   sec  51.2 MBytes   429 Mbits/sec                  
[  7]   4.00-5.00   sec  51.0 MBytes   428 Mbits/sec                  
[  7]   5.00-6.00   sec  49.9 MBytes   418 Mbits/sec                  
[  7]   6.00-7.00   sec  52.8 MBytes   443 Mbits/sec                  
[  7]   7.00-8.00   sec  49.3 MBytes   414 Mbits/sec                  
[  7]   8.00-9.00   sec  51.0 MBytes   427 Mbits/sec                  
[  7]   9.00-10.00  sec  51.2 MBytes   430 Mbits/sec                  
[  7]  10.00-10.04  sec  1.89 MBytes   402 Mbits/sec                  
- - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bitrate
[  7]   0.00-10.04  sec   501 MBytes   418 Mbits/sec                  receiver

With the growing number of wi-fi 6 capable hardware, both WRX560 and RT6600ax will definitely be an excellent future-proof purchase. Backward compatibility with AC and even older wi-fi devices will ensure that even if this model will become part of any environment not populated with wi-fi 6 devices, it will make good use of them.

: Conclusion

So is WRX560 worth getting? With a price of about €209 +tax, if this would be anyone's main device it would still be worth looking at, even with some small SRM hiccups. On the other hand as an extended device in a compatible mesh setup, it would make sense to get the feel of a big and stable network for all wi-fi needs.

Anyone that hasn't used a mesh system before has no idea what they are missing, so if the target environment is big enough it will be more than easy to mesh multiple devices in one large network for that feel of maximum speed and accessibility.

Again, keep in mind that this unit will have to be the main unit in a mesh setup if combined with older models, but on the other hand, it will be a slave unit if meshed with the new RT6600ax.

SRM will continue to evolve for sure and make the network more stable, secure, and future-rich. Investing in a good and quality router will for sure pay off in the end, and WRX560 alone brings a lot to the table for any type of SOHO usage.