I believe what this SAFE article is speaking of is that to be truely secure between two subnetworks physical separation is the only way. VLANs do offer a very high level of security but some feel that since they can occupy the same device that there is always a possibility of compromise that might lead to one vlans traffic getting to another vlan, either by means of adminstrative take over of the device or other.
This would mean, according to your SAFE notes, that using separate, non inter-connected, layer 2 devices would ensure that VLAN traffic stay where it should and require Layer 3 device (router) transit for communications to occur.
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...