2nd DMZ???

Unanswered Question
May 1st, 2008
User Badges:

Hello all. Pretty newbie question here, I know I still have lots of research to do, but I'm fairly new to the security side of things, so looking to get pointed in some direction...

We are running 2 PIX 515's, one as a failover. All the ports are being used, we have one DMZ setup where our websvr and another host sit. We need to setup another host to run various things with Google (ads i believe?), that need to open an in/out tunnel to the internet, so we want to put this on a separate DMZ from the websvr.

Question, what is the best way to go about this? Just upgrade the PIX to add another port and put the 2nd DMZ on that? Are there better...more efficient...less costly ways to do this?

Eventually we are upgrading the PIX to ASA'. If upgrading the PIX is the only solution, is the cost great enough that we should try to wait and upgrade to the ASA's first? Is there a temporary workaround to get by until we upgrade?

Thanks in advance!

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (2 ratings)
Jon Marshall Thu, 05/01/2008 - 04:30
User Badges:
  • Super Blue, 32500 points or more
  • Hall of Fame,

    Founding Member

  • Cisco Designated VIP,

    2017 LAN, WAN


If you are using a switch that supports 802.1q trunking then you can use one of the physical interfaces on the pix and split it logically into 2 different interfaces. Each logical interface is seen as a separate interface that you can apply access-lists to etc.

See attached link for details.


Obviously you now have 2 separate dmz's on the same physical interfaces so each dmz will not get a full 100Mb throughput but it should be fine.



shane.wesley Thu, 05/01/2008 - 05:17
User Badges:


Thank you for the reply. I had thought about just putting them on VLANs, but I guess my concern was this wouldn't be as secure as putting them on a totally separate PHYSICAL interface.

Or am I misguided in thinking this? Would 2 VLANs suffice...?

whiteford Thu, 05/01/2008 - 06:50
User Badges:


Separate VLANS on a switch I believe is the best way to go. I have 2 3750's trunked off my ASA (1gb ports) with multiple VLAN's. It's great as you can use one port and create sub interfaces off that single port to create multiple VLANS/DMZ's. They are very secure and as the VLAN's/DMZ's are seen as interfaces you can give them different security levels, access rules etc.

Let me know if you need any other help.

Please rate if helpful.


This Discussion