Nebula security policy - Best practices to separate vlans
Hi all,
i've several vlans in my network:
i've several vlans in my network:
- Server
- Home
- SmartHome
- Outdoor
- Kids
- Voice
- Admin
- Management
- Guest
- LANParty
- Server has access to all vlans except for Management
- Home has access to Kids, Server-XY in Server, SmartHome
- SmartHome has access to Server-SmartHome in Server, Home
- Outdoor has access to to Server-SmartHome in Server
- Kids has access to Home, Server-XY in Server between 6am to 8pm
- Voice has access to Server-VoIP in Server
- Admin has access to all vlans
- Management has no access to another vlan
- Guest has no access to another vlan
- LANParty has no access to another vlan
What is the easiest way to handle the above scenario with security policy in Nebula?
There is a guest switch under Firewall -> Interfaces. Should I activate the guest switch for all vlans except Server and Admin and then add allow-rules?
Any other ideas? Thank you!
Any other ideas? Thank you!
0
All Replies
-
Hi
Can you share the network topology diagram with all equipments(firewall, AP, switch, VoIP, Server, other hosts, etc.) and their vlan ID?What is the purpose for the guest switch? What role does it play?If you can describe it more in detail and can help us to realize your environment more clearly.
Thanks.See how you've made an impact in Zyxel Community this year!
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 151 Nebula Ideas
- 98 Nebula Status and Incidents
- 5.7K Security
- 277 USG FLEX H Series
- 277 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.4K Consumer Product
- 250 Service & License
- 395 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 75 Security Highlight