11-26-2023 07:54 PM
It's been proposed that every server be segregated to its own VLAN for security purposes. We have 10+ servers and we're already working on egress and ingress firewalling each server, and I figured that was pretty good. I'm not sure what to think about that. What are your thoughts?
11-26-2023 11:58 PM
- Checkout https://learningnetwork.cisco.com/s/article/a-quick-summarized-view-to-private-vlan-pvlan-x
M.
11-27-2023 12:06 AM
Since I don't have much information, it's difficult to give more advice. But have you configured 10 VLANs on a switch or firewall? Are there also any restrictions between those VLANs?
give us more details.
11-27-2023 12:58 AM
Vlan configured in Firewall
11-27-2023 01:52 AM
Good to know. It is ok and in trinational networking, this is a way to protect services like this too. But good to have a different firewall for Server security, it should not shared with Edge firewall.
11-27-2023 12:49 AM
Right it more secure to put each server in different vlan but some feature like Vmotion need l2 and than need to put more than server to same vlan.
You can for this case use fw transparent which can make traffic secure between server in same vlan.
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide