The ASA5510 doesn't have switchports like the 5505 so unfortunately, you won't be able to set it up in the same way as the 5505. The main difference is you cannot have the same subnet exist off more than one interface on the ASA5510 and later models.
Depending on your requirement, though, there are some options.
If you give me some more detail on your requirement (why you need two interfaces in the same VLAN), I may be able to provide more tailored advice.
Use a switch:
The easiest thing may be to get a switch to connect to the 5510 DMZ interface with a default gateway of the 5510. The switch will essentially take the place of the 5505's switchports.
Separate DMZ subnets:
If you are willing to separate the DMZ into two separate subnets, you can configure rules on the ASA to allow for these subnets to talk to each other. We can configure access-lists and translations to make the communication take place through the ASA's interface.
If you're running IOS 8.4 or later you can create an etherchannel using two or more physical interfaces working as one logical interface in a single VLAN. This isn't the same as what you had setup on the 5505 as this will logically be one link. Therefore, you will likely be connecting both physical connections to one DMZ device.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...