

To add to Onomatopoeia’s excellent post, separate devices also limit the blast radius of any compromise. Attackers pivot when they compromise a system. They use one system to talk to others and attack them from inside your network. So you don’t want everything on the same OS kernel.
Unfortunately I don’t feel like I’m qualified to say what works well yet, not until I have the pieces of my site put together and working, and vetted by whatever security professionals I can get to look at it and tell me what I did wrong.
But right now I think that looks like every service VM on its own VLAN on a /30 net, and ideally the service VM and firewall/router VM serving it on different physical hardware joined by a managed switch. That managed switch shouldn’t let either VM host touch its management VLAN, and (I think, I don’t do this yet) should send monitor traffic to yet another physical host for analysis.
(“I can see why you’re not done yet” - yeah I know.)


Agreed, I have one of the last “good” HP Color LaserJets from a tech recycler and last time I checked it was two model revisions old. This one still has a config option to allow unofficial toner, so I pay like $120 for a set of all four high capacity cartridges now, I think 5k pages black and 3k pages C Y and M. (It’s a MFP m477fdw I think) I think the next model was the first one that took the option away.
You can still use third party toner with some of the later models, but those are more expensive and come with some kind of jig for transplanting an HP chip into their cartridge.
I will never buy another HP product again (apart from replacement parts for my current printer), and will jealously guard this one and nurse this one along until it dies.
But in a general sense, being able to completely ignore the printer for literally months, and then turn it on and get a perfect print, and then ignore it again… really nice. That’s all laser printers. Never buy HP.