This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Separate VLAN for infrastructure ( or is it wise? )

Hello there,

   I consider a network consisted of two VLANs ( one is solely wireless and other is mixed ) . I also want to prevent these VLANs from accessing network infrastructure ( switch, AP, NAS etc ) but not sure how to handle it. Should I treat them as untagged or is it wise or possible to assign separate VLAN to infrastructure ones ( and how to do in case )

 



This thread was automatically locked due to age.
  • Hello SophosNoobian,

    Thank you for contacting the Sophos Community.

    You can use a Firewall rule with the subnets of the Networks to block access from the Wireless network and the other VLAN to the Infrastructure network.

    Regards,


     
    Emmanuel (EmmoSophos)
    Technical Team Lead, Global Community Support
    Sophos Support VideosProduct Documentation  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.
  •  i would use VLAN with tagging to split Network-Segments.

    VLAN without tagging means you connect one cable for every VLAN to the firewall.

    Every segment has its own IP-Subnet, is routed over firewall and controlled by firewall.

    If you use VLAN Tagging, you have to configure this at the Switches too.


    Dirk

    Systema Gesellschaft für angewandte Datentechnik mbH  // Sophos Platinum Partner
    Sophos Solution Partner since 2003
    If a post solves your question, click the 'Verify Answer' link at this post.