intlhouseofdan
n00b
- Joined
- Aug 16, 2011
- Messages
- 19
Hello fellow geeks,
I currently have a pfSense firewall serving dhcp to an HP ProCurve 1800-24g gigabit switch. I would like to segregate my network for trusted and untrusted clients. For example separate my internet-facing servers from my internally networked devices like a NAS. All of which are running on ESXi. My ESXi box has a second gigabit port that is unused at the moment.
I am looking for easiest way of doing that, and I have come to the conclusion that a VLAN is probably best. I was wondering if the HP 3COM 4500G would be up to the task and if not, what gigabit switch around $150 would be?
Just to make sure I have everything understood, if I was to take a 24-port switch, make the top 12 ports part of vlan group 1, and the bottom 12 ports part of vlan group 2, I would need two interfaces on my pfSense box to server dhcp to them correct? Interconnecting the two with a cable would basically defeat the purpose of trying to separate them I assume.
_intlhouseofdan
I currently have a pfSense firewall serving dhcp to an HP ProCurve 1800-24g gigabit switch. I would like to segregate my network for trusted and untrusted clients. For example separate my internet-facing servers from my internally networked devices like a NAS. All of which are running on ESXi. My ESXi box has a second gigabit port that is unused at the moment.
I am looking for easiest way of doing that, and I have come to the conclusion that a VLAN is probably best. I was wondering if the HP 3COM 4500G would be up to the task and if not, what gigabit switch around $150 would be?
Just to make sure I have everything understood, if I was to take a 24-port switch, make the top 12 ports part of vlan group 1, and the bottom 12 ports part of vlan group 2, I would need two interfaces on my pfSense box to server dhcp to them correct? Interconnecting the two with a cable would basically defeat the purpose of trying to separate them I assume.
_intlhouseofdan