This sounds like a highly secure (military grade) level network. Is that the case?
Physically separate may not necessarily be the right answer as a network can be logically separated using techniques like:
encryption
separate subnet
different protocol
Are you being challenged to provide this separation or are you doing the auditing?
In the IT trenches? So am I – read my IT-Trenches blog.
Discuss This Question: 4  Replies