Hello,
I need some help to properly set up, segregate and secure a network.
The networking equipment consists of a Cisco ASA 5505 as the main firewall/DHCP server, a few Layer 2 switches and 2 Cisco WAP-371-A-K9 operating in a cluster.
Here is what we have:
Windows Server 2012 R2 and about 10 joined PCs on the server's domain. These PCs need to be redirected to the Windows server as their DNS server in order to function properly. We also have wireless PCs/Tablets/Phones that need to access the server.
10 IP cameras with a NVR.
A Networked Printer/Scanner/Fax machine.
Guest PCs, Guest tablets, Guest smartphones.
Smart TVs, Home automation devices, etc...
I do not believe that it is a good idea to throw all the devices on one single VLAN. Now from thereon, I get confused as to how to properly set up the network.
I originally thought that I should have 4 VLANs:
VLAN1(most trusted): Windows server and all PCs/tablets/phones/devices that need to access the server. Ports 443 and 4125 will need to be opened for remote access.
VLAN2: IP Cameras and NVR with a port opened for the NVR to be remotely accessible.
VLAN3: Home Automation, WiFi Garage door Opener, Magic Jack Devices, etc...
VLAN4(least trusted): Smart TVs, Network Printer, Guest PCs, Guest Tablets Guest Phones, etc...
Now this being said, devices in more secure VLANs should be able to access devices in less secure VLANs, but not vice versa.
Your thoughts and recommendations are highly appreciated.
Many thanks!
I need some help to properly set up, segregate and secure a network.
The networking equipment consists of a Cisco ASA 5505 as the main firewall/DHCP server, a few Layer 2 switches and 2 Cisco WAP-371-A-K9 operating in a cluster.
Here is what we have:
Windows Server 2012 R2 and about 10 joined PCs on the server's domain. These PCs need to be redirected to the Windows server as their DNS server in order to function properly. We also have wireless PCs/Tablets/Phones that need to access the server.
10 IP cameras with a NVR.
A Networked Printer/Scanner/Fax machine.
Guest PCs, Guest tablets, Guest smartphones.
Smart TVs, Home automation devices, etc...
I do not believe that it is a good idea to throw all the devices on one single VLAN. Now from thereon, I get confused as to how to properly set up the network.
I originally thought that I should have 4 VLANs:
VLAN1(most trusted): Windows server and all PCs/tablets/phones/devices that need to access the server. Ports 443 and 4125 will need to be opened for remote access.
VLAN2: IP Cameras and NVR with a port opened for the NVR to be remotely accessible.
VLAN3: Home Automation, WiFi Garage door Opener, Magic Jack Devices, etc...
VLAN4(least trusted): Smart TVs, Network Printer, Guest PCs, Guest Tablets Guest Phones, etc...
Now this being said, devices in more secure VLANs should be able to access devices in less secure VLANs, but not vice versa.
Your thoughts and recommendations are highly appreciated.
Many thanks!