ScottInOtt
New Around Here
I work in a library. We have two, physically-separate networks: one for public use and a staff network that is used for the operation of the library. Each network has its own Internet connection. Wi-Fi connections are isolated from all other devices on the network; wired public computers only need Internet access and access to two ports on a reservation system. Network devices, such as APs and switches are on a separate management VLAN.
I want to merge the infrastructure for the two networks into a single network for unified management and sharing of specific resources, such as printers. I have a network design that partitions the network using VLANs with shared resources on a separate VLAN with very restricted routing to/from the shared resource VLAN.
My question is: if I define the VLAN at the switch port and AP, are VLANs sufficiently secure to partition my two networks? I know that "sufficiently secure" is pretty subjective, but if you have experience in this area, would you be comfortable using VLANs?
Thanks!
I want to merge the infrastructure for the two networks into a single network for unified management and sharing of specific resources, such as printers. I have a network design that partitions the network using VLANs with shared resources on a separate VLAN with very restricted routing to/from the shared resource VLAN.
My question is: if I define the VLAN at the switch port and AP, are VLANs sufficiently secure to partition my two networks? I know that "sufficiently secure" is pretty subjective, but if you have experience in this area, would you be comfortable using VLANs?
Thanks!