vlan

i have 5 different network

Servers
Admin
Wifi
POS
Guest

currently all networks can talk to each other
support i dont want guest network to see servers network, whats the best way to do this.
ammadeyyAsked:
Who is Participating?
 
DaMaestroConnect With a Mentor Commented:
Due to the chatty nature of MS Windows, the presence of any computer would broadcast the computer's workgroup or domain regardless to what the official network/workgroup is. You could turn off broadcasting on all the machines on the network by running net config server /hidden:yes on machines in the servers network or you could put the guest connections on a seperate subnet and broadcast range.
0
 
ammadeyyAuthor Commented:

Servers  192.168.1.1/255
Admin    192.168.2.1/255
Wifi       192.168.3.1/255
POS       192.168.4.1/255
Guest    192.168.5.1/255

thats how my ip ranges are
0
 
ammadeyyAuthor Commented:
email server ip is 192.168.1.3

guest ip 192.168.5.2

email server i add net config server /hidden:yes


still guest can ping to email server
0
Turn Raw Data into a Real Career

There’s a growing demand for qualified analysts who can make sense of Big Data. With an MS in Data Analytics, you can become the data mining, management, mapping, and munging expert that today’s leading corporations desperately need.

 
ammadeyyAuthor Commented:

i have a HP 2626 switch, from that switch its connected to many unmanaged switches

if i create logical vlans from 2626, and have a router to do ACL will it work?
0
 
Danny_LaroucheCommented:
On server...  route add 192.168.5.0 MASK 255.255.255.0 192.168.1.222  (222=bogus address)

0
 
ammadeyyAuthor Commented:
suppose there is one client in guest network needs to access 192.168.1.3, how can i do that?
0
 
Danny_LaroucheConnect With a Mentor Commented:
You may add a second route for this specific client with mask 255.255.255.255.  But in your original post you told us that "servers network" have to be isolated from "guest network".

Take into consideration that such security measure is a basic one. Anybody with a good networking knowledge will be able to gain access to servers.  He just have to use this client`s IP or IP on other subnets.  

A per port VLAN architecture would be much more secure and flexible if combined with inter-vlan routing.
0
 
Danny_LaroucheCommented:
> if i create logical vlans from 2626, and have a router to do ACL will it work?
>

Yes, if your switch doesn't handle layer3, you may use a router and its ACL to set inter-vlan rules.

0
 
DJSaraConnect With a Mentor Commented:


As far as I could see from the spec of HP 2626 switch, it supports ACL.

What you could do is to have 5 vlan plus a IP address configured for each of the vlan. Once this is over you have cut down the collision domain and allowed intercommunication of vlans.

Now to prevent the entire vlan-vlan communication and to allow exception like communication between guest vlan and email server, you can have ACL configured in the order
<Allow communication from say Guest vlan to email server ip>
<block communiction between vlans>
<block all>

For more sercurity, you can use extended ACL, so that instead of allowing communication based on IP address, you could use port based decisions.

If the switch doesnot have ACL supported, you can go for 'filtering' capability of the switch.
0
 
djohnson104Connect With a Mentor Commented:
I have the same setup with 6 vlans. On my layer 3 device i apply a ACL to the vlan interfaces that blocks netbios ports.
0
 
Danny_LaroucheCommented:
He will also need to set ACL to deny other protocols such as RDC, telnet, http/https(destinated to network devices), syslog, smnp,...
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.