- Feb 16, 2010
- 39
- 0
- 0
Long story short, they want to be able to prove that we seperate data specific from them from everyone else. From the networking side that's fine with tagging Vlans, ACL's etc. But if their data all comes to the same host (a file server) as others, how can we mitigate that out without creating another host specifically for them? Is this feasible?