"To do this I have a internal VLAN (100), a Employee VLAN (200) and a Guest VLAN (300)."
You mention some switches so these switches will either have VLAN features or must only be used in the LAN segment you want.
I am going to upset you here. This is slightly advanced networking that I don't get into here. I send our network engineers out or have the client deal with the maker technical support.
-> In short, I think you need to sort out your wiring if you happen to use dumb switches.
I was wondering if anyone could help me. I have 3 networks, Internal, Employee and Guest.
Internal = 192.168.1.x Employee = 192.168.2.x Guest = 192.168.3.x You can access 192.168.1.x devices from 192.168.2.x and 192.168.3.x devices, I do not want that.
To do this I have a internal VLAN (100), a Employee VLAN (200) and a Guest VLAN (300). There are two switches. The first one is a Netgear ProSafe switch. This switch has the uplink from the BT Hub (VLAN 100) and the port going to the other switch (Extreme Networks), with port 8 on the ProSafe switch and port 1 on the Extreme Switch being a trunk (tagged 100,200,300).
The internal DCHP and routing is done by the BT Hub, Port 1 on netgear. The Employee DCHP and routing is done by a Cisco router (uplink on the internal(100) and then goes into the Family(200). The Guest DCHP and routing is done by a Untangle router (uplink on the internal(100) and then goes into the Guest(300).
I can access devices on 192.168.1.x network from the Employee and Guest VLANs, but cannot access 192.168.2.x and 192.168.3.x devices on the internal network. I would like all 3 networks separated.
Thanks.

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic