Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
My thoughts are to have her laptop VPN from its own VLAN bowl, and the rest of my network operating in it's own vlan bowl, thus reducing or eliminating any attacks she/her job may have accross the VPN(probably very remote) but just looking to prevent attacks? Or am I going way overboard
I'm definitely not H/C taking MAX CLEARED DATA DOWN TO MY HOME FRIGGING NETWORK!
TBone,
My thoughts are to have her laptop VPN from its own VLAN bowl, and the rest of my network operating in it's own vlan bowl, thus reducing or eliminating any attacks she/her job may have accross the VPN(probably very remote) but just looking to prevent attacks? Or am I going way overboard I'm definitely not H/C taking MAX CLEARED DATA DOWN TO MY HOME FRIGGING NETWORK!
No idea what you mean by "not H/C taking max cleared data down to my home frigging network", sorry.
AGAIN: a VPN is POINT TO POINT. The ONLY system the remote network knows about is the one connected to it, period. Want a VLAN, then go right ahead, enjoy. Again, there is no point, you won't gain anything (security, speed, etc.), but if you want one, go have one. Up to you...nothing else anyone can really tell you.
My thoughts are to have her laptop VPN from its own VLAN bowl, and the rest of my network operating in it's own vlan bowl, thus reducing or eliminating any attacks she/her job may have accross the VPN(probably very remote) but just looking to prevent attacks? Or am I going way overboard
I'm definitely not H/C taking MAX CLEARED DATA DOWN TO MY HOME FRIGGING NETWORK!
cajunchief
That still is not going to protect you. VLANs stop at the router and the router routes the traffic between VLANs. To get what you want you are going to have to totally isolate the networks from one another not allowing one to talk to the other. As TBone stated a lot of work for little to no payoff.
Thanks for saying what you said! I hadn't thought too much about it, having lots going on. But when I did, your statments made sense,
I don't need to worry about her traffic on the VPN! My question now is, on my side(linux) would a vpn benefit me? I want a work area and sysadmin area, printing area...?
LazyDog,
Thanks for saying what you said! I hadn't thought too much about it, having lots going on. But when I did, your statments made sense,
..which is what I also told you several times, thanks.
Quote:
I don't need to worry about her traffic on the VPN! My question now is, on my side(linux) would a vpn benefit me? I want a work area and sysadmin area, printing area...?
Again; yes, you can but why?? If this is all on ONE NETWORK, there is absolutely no point. Even having separate VLAN's on a home network is pointless for the small number of devices. No idea what you mean by a 'sysadmin' area, or a 'printing' area, but a VPN is made to connect computers to each other. If you want a printer on a VPN, you need to have it connected to a computer, since (to my knowledge), there are no printers that are VPN enabled.
You are not going to gain any speed, bandwidth, security, or privacy. The VPN traffic is already segmented off your home LAN, and nothing on your home LAN is going to traverse the tunnel.
..which is what I also told you several times, thanks.
Again; yes, you can but why?? If this is all on ONE NETWORK, there is absolutely no point. Even having separate VLAN's on a home network is pointless for the small number of devices. No idea what you mean by a 'sysadmin' area, or a 'printing' area, but a VPN is made to connect computers to each other. If you want a printer on a VPN, you need to have it connected to a computer, since (to my knowledge), there are no printers that are VPN enabled.
You are not going to gain any speed, bandwidth, security, or privacy. The VPN traffic is already segmented off your home LAN, and nothing on your home LAN is going to traverse the tunnel.
TBONE,
No one ever said a cajun was or wasn't a dumbass, except other cajuns. I thought about what y'all said and I FINALLY FIGURED IT OUT! Thanks mon ami's!
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.