Question about setting up DMZ interface with Sub-interfaces for ASA

Unanswered Question
Jun 6th, 2008
User Badges:

We currently have PIX 525 firewalls with one DMZ 4-port card installed. There are 4 different public web servers connected to the ports. We are in the process of upgrading to the ASA models and had some questions about design layout. The number of public web servers will grow from 4 to 10 or 15. What is the best way to keep these servers isolated from each other using the ASA appliance? I was thinking using one of the physical ports and create sub-interfaces off of it. Then attached a Cisco 3750 series switch to that port and create private vlans. Is this layout a recommended approach or is there a better way of laying this out? Just wanted to know if my thinking was on track.


Thanks in advance for any information given.

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
husycisco Fri, 06/06/2008 - 09:01
User Badges:
  • Gold, 750 points or more

Hi Mark,

Using subinterfaces and trunking interface with 3750 is a good approach, but you have to keep in mind the following

1) If I recall correct, max 20 VLANs supported with sub-interfaces

2) If you are not using NAT and you directly assign public IPs, you need different global IP subnets for each subinterface. If you have for example 66.69.74.248/29 and 8 available hosts in that subnet, you cant assign 66.69.74.249 to one subinterface and 66.69.74.250 to another one. It should be like 66.69.74.248/29 to subint1 66.69.74.240/29 to subint2 66.69.74.232/29 subint3 and so on. But as long as you use private IPs in webservers and use NAT in firewall, there is no problem.


Regards

osmhquser Fri, 06/06/2008 - 09:05
User Badges:

Thanks for the info and will keep that in mind.

Actions

This Discussion