We use VLANs to separate network roles - We have a different VLAN for: CCTV / security, IP Phones, Network infrastructure (switches), wifi, guest wifi, admin domain, student domain, cashless catering system, SAN.
Looking next year at doing what was suggested above - putting printers on a different VLAN to stop users accessing them directly.
Currently have a firewall between us and the LA, so like someone else mentioned, only using 2 IPs from there range and internally using a completely different range altogether
Think we've got about 14 or 15 vlans in total, each building is segragated off to each have it's own (or multiple depending on size) vlan, infrastructure has it's own, wireless, printers, IPTV traffic etc
Printers Vlan and IPTV don't do DHCP to avoid people connecting anything random to them, definately recommend segmenting your network
There are currently 1 users browsing this thread. (0 members and 1 guests)