10-07-2024 03:15 AM
Hello Community,
My name is Emmanuel Katto. I am currently managing a Ruckus SmartZone deployment and am looking for guidance on configuring network segmentation and security policies effectively. Our environment consists of multiple user groups, including staff, guests, and IoT devices, and I want to ensure that each segment is isolated while still allowing necessary connectivity for operations.
Here are the specifics of my setup:
I want to ensure that staff, guest, and IoT devices are isolated from each other to minimize security risks. I’m considering using VLANs for this but would like advice on the best practices for implementation. I also want to Implement firewall rules or access control lists (ACLs) within SmartZone to regulate the traffic between these VLANs while allowing necessary services (like guest internet access and staff email).
Questions:
Any guidance, documentation, or shared experiences would be greatly appreciated.
Thank you!
Emmanuel Katto
11-02-2024 01:02 PM
Hi Emmanuel,
My name is Yogesh and I am from Ruckus TAC.
Please find the answers inline below.
We do not have an recommendations for VLAN configuration, however, it is a best practice to have WLAN configured with different VLANs.
You can enable Wireless Client Isolation on the SSID to restrict the access for user traffic.
We do not have an tool on the Smartzone itself, however, you can use our Ruckus AI (Analytics) for monitoring traffic and other details.
Regards,
Yogesh G