The ideal way to do this is to put the two of them on differently numbered subnets -- 192.168.1.x vs. 192.168.0.x, for instance, each with their own subnet mask. Also, unless the machine is actually serving as a router between the two subnets, it's not that easy for it to be a security hazard unless there is active file sharing or something of the like taking place.
Dig Deeper on Enterprise infrastructure management
Related Q&A from Serdar Yegulalp
This week, our expert answers the question of how to get DVD data off a disc, even if the user's PC doesn't have an optical drive.continue reading
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector.continue reading
Open source and free suites such as LibreOffice and OpenOffice could save organizations money, but not effort in comparison with Microsoft Office.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.