Using Port Based VLANs to isolate security zones

Hello All,

Here's the situation: I want to use an HP 4208vl

formatting link
fully loaded with GigE ports as the "core" switch in my network. I want to define multiple port based VLANs on this switch. One VLAN would be LAN (workstations), another would be Perimeter Network (web server/ftp server), another would be Core infrastructure (Domain Controllers, etc...), another VLAN for an iSCSI subnet, and a final VLAN for other building services (Building Management, etc...). I would not allow routing between any of the VLANs. I would have a SonicWall PRO 3060 or something similar to handle traffic filtering between VLANs.

I just want to know if this is a good idea or not and if it is common practice. If it is not a good idea, please suggest an alternative.

Thanks, Paul.

Reply to
pgmanno
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.