I currently manage an environment with IP addressing of 10.10.10.x/23. We have 3 VLANS set up, and I use that term very loosely. The reason I say I use the term loosely is, the 3 VLANS have full access to each other. VLAN10 is our internal network, VLAN20 is are guest Wifi and VLAN30 is our DMZ. The environment has your typical server, workstations, printers plus we have security cameras but no VOIP. We have close to 200 workstations, 29 printers, 20 servers, 40 security cameras.
The guest wifi should just have access to the internet and that's it, not my internal network. Some of the questions I have with planning our VLAN setup is, currently our ASA5505 is "routing" the traffic and has the ACLs for the VLANS, should i keep it this way or should the ACLs be moved to my cisco 3750X switches? Right now my paln was to setup the VLANS as follows:
VLAN
10 Servers 10.10.10.x/24
20 Workstations 10.10.20.x/24
30 Internal Wifi 10.10.30.x/24
40 Cameras and Server 10.10.40.x/24
100 DMZ 192.168.100.x/24
110 Guest WiFi 192.168.110.x/24
i'm also not sure if should keep the printers on the same VLAN as the workstations, servers or separate them to their own VLAN? if they are in their own VLAN should the printer server be on that VLAN also?