By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The ideal way to do this is to put the two of them on differently numbered subnets -- 192.168.1.x vs. 192.168.0.x, for instance, each with their own subnet mask. Also, unless the machine is actually serving as a router between the two subnets, it's not that easy for it to be a security hazard unless there is active file sharing or something of the like taking place.
Dig Deeper on Enterprise Infrastructure Management
Related Q&A from Serdar Yegulalp
This week, our expert answers the question of how to get DVD data off a disc, even if the user's PC doesn't have an optical drive.continue reading
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector.continue reading
Open source and free suites such as LibreOffice and OpenOffice could save organizations money, but not effort in comparison with Microsoft Office.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.