• 0 Votes
    1 Posts
    26 Views
    No one has replied
  • vLANs random question.

    IT Discussion
    19
    0 Votes
    19 Posts
    2k Views
    scottalanmillerS

    @WrCombs said in vLANs random question.:

    @dashrender said in vLANs random question.:

    @scottalanmiller said in vLANs random question.:

    @WrCombs said in vLANs random question.:

    @scottalanmiller said in vLANs random question.:

    @WrCombs said in vLANs random question.:

    @scottalanmiller said in vLANs random question.:

    @WrCombs said in vLANs random question.:

    @dafyre said in vLANs random question.:

    The short answer is you would get the Router to route between the two VLANS, and fix it so that only the Payment devices have access to the internet.

    if this was an on prem system, that would world. but this is a cloud system so both need access to the internet..

    Actually that makes it make more sense. It's minimal value, but that doesn't mean zero. It will improve security and simplify audits if they are both SaaS connected devices like that. Not a big deal, but not bad, either.

    So how would you make that work? just using firewall rules, to let the 2 talk to pull transaction information?

    If they talk only to the hosted apps, the intercommunications should be on the server, not the client. Is that not correct?

    If you need devices on two different LANs (vLANs are just LANs without physical separation) then communications between them is always through a router, and routers are firewalls. So first you have to build a route, then block traffic, then allow the traffic that you want.

    in a "normal" IT system, that would be the case, as I'm sure you know.
    POS however, the Pin pads talk directly to the Register to pull that transaction data to the Pin Pad - otherwise the pin pad wont know how much to charge the credit card -

    Then you need to connect the two VLANs, effectively defeating the purpose. It's not entirely defeated, it is still a secondary firewall but only replicating the vastly more important local firewall.

    ROFMAO - like the terminals have firewalls - HAHAHAHAHAHA

    on this particular system (which I am the Admin for) Windows firewalls are required to stay on - for all 3 options no matter what.

    See!! Firewalls!

  • 2 Votes
    1 Posts
    1k Views
    No one has replied
  • VOIP and VLANs

    IT Discussion
    6
    2 Votes
    6 Posts
    1k Views
    scottalanmillerS

    Same thing on the switches, prioritize that tag end to end.

  • New to Vlans.

    IT Discussion
    8
    1 Votes
    8 Posts
    2k Views
    ?

    If you are using multiple SSIDs from the same APs and using vlans they need to be tagged in those ports. Depending on the ap it may not have a managment VLAN setting so you either need to make it untagged on your staff network or mamagment vlan depending on how your network is setup.

  • 0 Votes
    20 Posts
    4k Views
    scottalanmillerS

    @dengelhardt that's a good point that people often miss - there are cases where using VLANs unnecessarily can cause traffic to have to "loop" through a router to return to the same device. In the case of VoIP phones acting as small switches at the desk it's the switch inside the phone doing it.

    I had to deal with a network just a few weeks ago that had five routers and three switches, one of which was still on FastEthernet (10/100.)
    They managed to make nearly all traffic have to pass through the slow switch for nearly everything. And some things looped through routers that were attached on both ends to the same VLAN!! It was insane.