06-06-2008 08:46 AM - edited 03-11-2019 05:56 AM
We currently have PIX 525 firewalls with one DMZ 4-port card installed. There are 4 different public web servers connected to the ports. We are in the process of upgrading to the ASA models and had some questions about design layout. The number of public web servers will grow from 4 to 10 or 15. What is the best way to keep these servers isolated from each other using the ASA appliance? I was thinking using one of the physical ports and create sub-interfaces off of it. Then attached a Cisco 3750 series switch to that port and create private vlans. Is this layout a recommended approach or is there a better way of laying this out? Just wanted to know if my thinking was on track.
Thanks in advance for any information given.
06-06-2008 09:01 AM
Hi Mark,
Using subinterfaces and trunking interface with 3750 is a good approach, but you have to keep in mind the following
1) If I recall correct, max 20 VLANs supported with sub-interfaces
2) If you are not using NAT and you directly assign public IPs, you need different global IP subnets for each subinterface. If you have for example 66.69.74.248/29 and 8 available hosts in that subnet, you cant assign 66.69.74.249 to one subinterface and 66.69.74.250 to another one. It should be like 66.69.74.248/29 to subint1 66.69.74.240/29 to subint2 66.69.74.232/29 subint3 and so on. But as long as you use private IPs in webservers and use NAT in firewall, there is no problem.
Regards
06-06-2008 09:05 AM
Thanks for the info and will keep that in mind.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide