Nebula security policy - Best practices to separate vlans
Hi all,
i've several vlans in my network:
i've several vlans in my network:
- Server
- Home
- SmartHome
- Outdoor
- Kids
- Voice
- Admin
- Management
- Guest
- LANParty
- Server has access to all vlans except for Management
- Home has access to Kids, Server-XY in Server, SmartHome
- SmartHome has access to Server-SmartHome in Server, Home
- Outdoor has access to to Server-SmartHome in Server
- Kids has access to Home, Server-XY in Server between 6am to 8pm
- Voice has access to Server-VoIP in Server
- Admin has access to all vlans
- Management has no access to another vlan
- Guest has no access to another vlan
- LANParty has no access to another vlan
What is the easiest way to handle the above scenario with security policy in Nebula?
There is a guest switch under Firewall -> Interfaces. Should I activate the guest switch for all vlans except Server and Admin and then add allow-rules?
Any other ideas? Thank you!
Any other ideas? Thank you!
0
All Replies
-
Hi
Can you share the network topology diagram with all equipments(firewall, AP, switch, VoIP, Server, other hosts, etc.) and their vlan ID?What is the purpose for the guest switch? What role does it play?If you can describe it more in detail and can help us to realize your environment more clearly.
Thanks.0
Categories
- All Categories
- 417 Beta Program
- 2.5K Nebula
- 160 Nebula Ideas
- 108 Nebula Status and Incidents
- 5.9K Security
- 331 USG FLEX H Series
- 286 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.2K Wireless
- 42 Wireless Ideas
- 6.6K Consumer Product
- 259 Service & License
- 402 News and Release
- 86 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.8K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 80 Security Highlight