Methods used to isolate networks between desktop service domains

Each desktop service domain can be physically isolated by cluster or logically isolated by using VLANs within the cluster. In addition, you can use an ACL policy to control user access to the core switches.

Scroll to top