Isolate LAN segment from the rest of the network












0















enter image description here



Let's say I have 3 switches as seen in the image attached and each one is a different department such as sales, human resources and IT department with a different network segment such as 192.168.1.0 ; 192.168.2.0 and 192.168.3.0. How can I avoid the other two departments of accessing sales segment if they have to pass through the same router to go online? What about if they are connected with routers using dynamic routing?










share|improve this question

























  • See if your router supports VLANs

    – DavidPostill
    Jan 4 at 19:50






  • 1





    Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

    – Akina
    Jan 4 at 19:54













  • If both switches and router support VLANs, physical changes are not required.

    – Daniel B
    Jan 4 at 19:55
















0















enter image description here



Let's say I have 3 switches as seen in the image attached and each one is a different department such as sales, human resources and IT department with a different network segment such as 192.168.1.0 ; 192.168.2.0 and 192.168.3.0. How can I avoid the other two departments of accessing sales segment if they have to pass through the same router to go online? What about if they are connected with routers using dynamic routing?










share|improve this question

























  • See if your router supports VLANs

    – DavidPostill
    Jan 4 at 19:50






  • 1





    Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

    – Akina
    Jan 4 at 19:54













  • If both switches and router support VLANs, physical changes are not required.

    – Daniel B
    Jan 4 at 19:55














0












0








0








enter image description here



Let's say I have 3 switches as seen in the image attached and each one is a different department such as sales, human resources and IT department with a different network segment such as 192.168.1.0 ; 192.168.2.0 and 192.168.3.0. How can I avoid the other two departments of accessing sales segment if they have to pass through the same router to go online? What about if they are connected with routers using dynamic routing?










share|improve this question
















enter image description here



Let's say I have 3 switches as seen in the image attached and each one is a different department such as sales, human resources and IT department with a different network segment such as 192.168.1.0 ; 192.168.2.0 and 192.168.3.0. How can I avoid the other two departments of accessing sales segment if they have to pass through the same router to go online? What about if they are connected with routers using dynamic routing?







networking router lan






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Jan 4 at 19:49









DavidPostill

105k25227262




105k25227262










asked Jan 4 at 19:44









Alekz GS4Alekz GS4

12




12













  • See if your router supports VLANs

    – DavidPostill
    Jan 4 at 19:50






  • 1





    Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

    – Akina
    Jan 4 at 19:54













  • If both switches and router support VLANs, physical changes are not required.

    – Daniel B
    Jan 4 at 19:55



















  • See if your router supports VLANs

    – DavidPostill
    Jan 4 at 19:50






  • 1





    Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

    – Akina
    Jan 4 at 19:54













  • If both switches and router support VLANs, physical changes are not required.

    – Daniel B
    Jan 4 at 19:55

















See if your router supports VLANs

– DavidPostill
Jan 4 at 19:50





See if your router supports VLANs

– DavidPostill
Jan 4 at 19:50




1




1





Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

– Akina
Jan 4 at 19:54







Isolate 'sales' LAN interface on the router (allow traffic from it to WAN and back, and forbid routing to another LAN ports). PS. VLANs can help, but cannot solve. Its use is possible, but is not compulsory.

– Akina
Jan 4 at 19:54















If both switches and router support VLANs, physical changes are not required.

– Daniel B
Jan 4 at 19:55





If both switches and router support VLANs, physical changes are not required.

– Daniel B
Jan 4 at 19:55










1 Answer
1






active

oldest

votes


















1














Routers will by default forward traffic across all connected subnets. You should add a mechanism such as IP source/destination firewall rules to prevent each of your internal networks from talking to each other. The specific method of doing this would depend on your router.






share|improve this answer























    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "3"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1390666%2fisolate-lan-segment-from-the-rest-of-the-network%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    1














    Routers will by default forward traffic across all connected subnets. You should add a mechanism such as IP source/destination firewall rules to prevent each of your internal networks from talking to each other. The specific method of doing this would depend on your router.






    share|improve this answer




























      1














      Routers will by default forward traffic across all connected subnets. You should add a mechanism such as IP source/destination firewall rules to prevent each of your internal networks from talking to each other. The specific method of doing this would depend on your router.






      share|improve this answer


























        1












        1








        1







        Routers will by default forward traffic across all connected subnets. You should add a mechanism such as IP source/destination firewall rules to prevent each of your internal networks from talking to each other. The specific method of doing this would depend on your router.






        share|improve this answer













        Routers will by default forward traffic across all connected subnets. You should add a mechanism such as IP source/destination firewall rules to prevent each of your internal networks from talking to each other. The specific method of doing this would depend on your router.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Jan 4 at 23:43









        AndyAndy

        44915




        44915






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Super User!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1390666%2fisolate-lan-segment-from-the-rest-of-the-network%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Сан-Квентин

            8-я гвардейская общевойсковая армия

            Алькесар