What Are You Doing Right Now
-
-
Back to "normal" work today after a week of travel and the retreat.
-
@scottalanmiller ...and then Spiceworld next week?
-
-
This morning at 9:30am I said
"Well, I think that's got all the fires put out, I'm going to sit down and enjoy a cup of coffee"
I'm now back at my desk 2h later, out of breath, and I think it's... looks around ... now safe to sit and enjoy that coffee...
-
@MattSpeller Better pour it out and make you a fresh, hot cup, lol.
-
@dafyre said:
@MattSpeller Better pour it out and make you a fresh, hot cup, lol.
Finished eating my Lunch/Breakfast
-
That reminds me, I really need to get some food. Have had nothing all day.
-
@scottalanmiller Eating is kinda important... It ranks up there somewhere near Oxygen...
-
-
Beating my head against the VLAN is magic wall..
-
@JaredBusch said:
Beating my head against the VLAN is magic wall..
What is the business benefit to complicating your network?
haha no i want 3 Vlans -
@Joy said:
@RojoLoco said:
@Joy said:
@RojoLoco said:
Anxiously awaiting 6pm so I can go meet up with a lovely lady for dinner ...
Wow! are you excited?
Absolutely.... you have no idea. So in love with this one...
How's the Dinner? haha
It was wonderful And tonight we will be dining at the legendary Trader Vic's, where they invented the Mai Tai. Polynesian cuisine, rum drinks, and a hotel room
-
@Joy said:
@JaredBusch said:
Beating my head against the VLAN is magic wall..
What is the business benefit to complicating your network?
haha no i want 3 VlansAs mentioned, one reason to create a VLAN for the sandbox he mentioned would be to ensure someone else on the LAN couldn't just change IPs and start jacking with it. Granted most normal users on your network won't have a clue about this.
-
Wondering why @Dashrender wants a server for pot....
http://mangolassi.it/topic/5974/handup-gift-cards-for-the-homeless/7
-
@DustinB3403 said:
Wondering why @Dashrender wants a server for pot....
http://mangolassi.it/topic/5974/handup-gift-cards-for-the-homeless/7
LOL nice!
-
@Dashrender said:
As mentioned, one reason to create a VLAN for the sandbox he mentioned would be to ensure someone else on the LAN couldn't just change IPs and start jacking with it. Granted most normal users on your network won't have a clue about this.
He wants a sandbox for development servers. not random users connecting to the network.
That or i read the entire thing wrong.
-
I'm trying to think of this from a security perspective.
If he wants to ensure no one is messing around with is Sandbox, he can't use one big network, he needs to separate it either physically or with VLANs. If security is of little concern, then your idea is the way to go. Though I could argue that if security is of so little concern, why is he breaking the sandbox onto it's own subnet anyway?
As for the actual setup, assuming you need to provide internet access to this situation (let's simplify and assume he only has one switch) how would you suggest doing that?
Two interfaces from the router/firewall - one for each subnet, or setup a single connection between the switch and router/firewall that has two sub interfaces one for each network? -
@JaredBusch said:
@Dashrender said:
As mentioned, one reason to create a VLAN for the sandbox he mentioned would be to ensure someone else on the LAN couldn't just change IPs and start jacking with it. Granted most normal users on your network won't have a clue about this.
He wants a sandbox for development servers. not random users connecting to the network.
That or i read the entire thing wrong.
Nothing like re-reading something that you have already read twice.
-
@Dashrender said:
I'm trying to think of this from a security perspective.
If he wants to ensure no one is messing around with is Sandbox, he can't use one big network, he needs to separate it either physically or with VLANs. If security is of little concern, then your idea is the way to go. Though I could argue that if security is of so little concern, why is he breaking the sandbox onto it's own subnet anyway?
As for the actual setup, assuming you need to provide internet access to this situation (let's simplify and assume he only has one switch) how would you suggest doing that?
Two interfaces from the router/firewall - one for each subnet, or setup a single connection between the switch and router/firewall that has two sub interfaces one for each network?Security for the applications to not cross talk on production networks is simple and only needs subnetting. he is talking about cloud connected services, so to me that does not imply any chance of malicious users actually logging into these servers.