How to prohibit mutual access between intranet VLANs? How to divide VLAN in LAN

An enterprise intranet generally divides multiple VLANs. Dividing VLANs can improve intranet security and make it easier to manage. For example: wired and wireless are in different network segments, and wireless devices are not allowed to access the corporate intranet, which can protect internal information security; and different network strategies and flow control policies can be configured for different network segments. And dividing the VLAN can divide the broadcast domain and avoid broadcast storm. The division of VLAN generally has the following three methods:

1. Divide VLANs through Layer 3 switches

201703311490939690256329.png

As shown above. Layer 3 switches can support VLAN division and corresponding VLAN permission settings.

2. Assign VLAN directly on the gateway

Port-based VLAN is the simplest way to divide VLAN. As shown in the figure below, multiple VLANs are divided directly on the WSG gateway, and then connected to the Layer 2 switch to achieve the effect of dividing VLANs.

201703311490939698116316.png

201805021525268855616472.png

3. 802.1Q VLAN division scheme

201703311490939698271410.png

The WSG gateway is connected to the trunk port of the Layer 2 switch to form an 802.1Q VLAN. This is also an important way of VLAN formation.

4. Configure policies to prohibit mutual access between VLANs

Through WSG's "firewall policy", you can control the mutual access between VLANs. As shown in the figure below, to prohibit communication between the wireless network segment 192.168.2.x and the wired network segment 192.168.1.x, set the blocking rule in the "Forward" direction of the "Intranet".

202004071586226994514648.jpg

After the local area network is divided into VLANs, it is necessary to set VLAN mutual access rules reasonably, in order to more effectively improve the intranet security factor. In general, you can refer to the following rules:

  1. Mutual access is prohibited between non-server network segments.

  2. The server network segment allows access from other VLANs.

  3. The server network segment also needs security protection means such as *** detection.

  4. The number of terminals in each network segment is preferably controlled within 200.


Guess you like

Origin blog.51cto.com/12800391/2489274