I currently have several VLANS (management for network devices, iot for smart devices, infra for security cameras and NAS, one for personal devices, anothe for guests, etc.

Currently I’m hosting a game server which is exposed to the outside world and am thinking of adding a couple more similar services.

Is it best practice to put such machines on their own isolated VLAN to minimize their attack surface?

  • koper@feddit.nl
    link
    fedilink
    arrow-up
    6
    ·
    9 months ago

    Yes, it is generally a good idea to put internet-facing servers on a network that is separated from the local network. The point of this is not to minimize their attack surface (since they are already connected to the internet after all) but to prevent them from being used as a stepping stone for attacks on your internal network. To make this effective, you should block traffic from the internet-facing network to the rest of your network and treat it as potentially untrusted.

    • poVoq@slrpnk.net
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      The reverse is also true. The typical Windows PC is much more prone to being breached than a reasonably well managed Linux server.