How to isolate devices on network from each other ?

ColoradoDude

Honorable
Dec 13, 2013
1
0
10,510
I need some help with a networking problem. We have a variety of TCP devices that we control from a single PC. These are industrial/embedded devices and have varying levels of TCP reliability. All of them work reliably when tested with their own kind, but when placed in the field with a variety of different manufacturers/devices we start to see problems. I think this is because some devices are broadcasting to everything in the local network (ARP requests are an example) and some of the more primitive devices have issues when this happens. (In the embedded world TCP implementation is almost always a subset of what is on a PC).

All use Class A addresses (10.x.x.x) that I can configure and in most cases I can configure the subnet mask as well. My goal is to set their addresses and subnet masks such that the different groups of devices (motor controllers, temperature sensors, pumps,..) can only see or broadcast to each other, and not different types of devices.
So here is my plan: Give the PC a dedicated NIC with addresses 10.0.0.160, 10.0.1.160, and 10.0.2.160 (subnet mask 255.255.255.0) which connects to all devices via a switch. Then give each group of like devices the addresses 10.0.0.xx, 10.0.1.xx and 10.0.2.xx (all with subnet masks 255.255.255.0).

Question is would this prevent one group of devices from getting traffic broadcast by another device, other than the PC?
If this does not achieve the network isolation I seek, then would a router with appropriate firewall settings do the job?
 
Solution
No, that is not sufficient to prevent the devices from hearing each others broadcasts.

Conceptually, you need to put each group of devices on their own LANs: each group of devices would be cabled to a switch dedicated to that group, and each of those switches would have a link to independent NICs in the controlling PC. In real life, you would probably use a switch that supports VLANs, putting each group in it's own VLAN, and running a single connection to the controlling PC with VLAN trunking (requires the Ethernet NIC in the controlling PC to support trunking) enabled.

Make sense?
No, that is not sufficient to prevent the devices from hearing each others broadcasts.

Conceptually, you need to put each group of devices on their own LANs: each group of devices would be cabled to a switch dedicated to that group, and each of those switches would have a link to independent NICs in the controlling PC. In real life, you would probably use a switch that supports VLANs, putting each group in it's own VLAN, and running a single connection to the controlling PC with VLAN trunking (requires the Ethernet NIC in the controlling PC to support trunking) enabled.

Make sense?
 
Solution