I've browsed this site for a while but never had a need to ask a question until now, so here goes. I have a network setup question that I'm hoping the community can shed some light on. There is an effort in our office space to overhaul the network setup. We are an independent company in a shared office space with a few other independent companies. The office space provider has a redundant, fat internet pipe that will be shared with the groups in the space. They are setting this up by giving each group it's own VLAN which they will administer for each of us. We want to ensure our data and resources are protected, but that we can still access our network remotely so the VLAN as security doesn't work for us. What are the best options for this type of setup and maintaining our security? We hoping they'd split out the traffic in a DMZ for each company to a private network, but this doesn't seem to be an option. I read this post: How do VLANs work? on VLANs as it seemed to be a similar setup in a hypothetical problem, and followed up reading this: How many VLANs are too few and too many? which were helpful and confirmed our concerns with VLANs. What we're still looking for is if there is a good setup for this shared pipe which allows us to control our own company security.
Thanks in advance.