Hello, I am an engineer... but not a network engineer. In my laboratory, I have a number of devices, mostly running various versions of embedded windows. These are not computers per se, but they do communicate with a computer via ethernet using TCP/IP protocol. This works all well and good as this computer along with the variety of devices connected to it are on their own isolated network. However, I now have a need to also connect this computer to a corporate network. I am concerned about the possibility of access to my "non computer" devices from outside of my lab , and also concerned that my "non-computer" devices may adversely affect the enterprise network. Is there a way to allow this single computer to access both my lab network and the enterprise network simultaneously and yet to maintain isolation between the two nets? Is it sufficient to simply use two NICS? Do I need hardware firewalls? If so, what kind, how many? where would they reside in the two networks? Any and all help will be appreciated.
Thank you for taking an interest. Basically, the "devices" are instruments that make measurements and then communicate those measurements to the computer. The computer will be used to do some analysis of the measurements and then the results are shared throughout the enterprise. So, the computer in question serves two purposes. First to command the actions of the instruments, collect and analyze their data (using the instrment network) and secondly to share the results of these measurements to interested parties throughout the enterprise. Likewise, the security concern is twofold. First, It would be unnaacceptable for someone to remotely take control of an experiment and secondly, the IT guys in my facility (who haven't been very helpful btw) are concerned that these devices, which are unfamiliar to them, might somehow negatively impact their enterprise network.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :