Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 
Step-by-Step Configuration and Troubleshooting Best Practices for the NGFW, NGIPS and AMP Technologies A Visual Guide to the Cisco Firepower Threat Defense (FTD)
Community Member

Question about setting up DMZ interface with Sub-interfaces for ASA

We currently have PIX 525 firewalls with one DMZ 4-port card installed. There are 4 different public web servers connected to the ports. We are in the process of upgrading to the ASA models and had some questions about design layout. The number of public web servers will grow from 4 to 10 or 15. What is the best way to keep these servers isolated from each other using the ASA appliance? I was thinking using one of the physical ports and create sub-interfaces off of it. Then attached a Cisco 3750 series switch to that port and create private vlans. Is this layout a recommended approach or is there a better way of laying this out? Just wanted to know if my thinking was on track.

Thanks in advance for any information given.


Re: Question about setting up DMZ interface with Sub-interfaces

Hi Mark,

Using subinterfaces and trunking interface with 3750 is a good approach, but you have to keep in mind the following

1) If I recall correct, max 20 VLANs supported with sub-interfaces

2) If you are not using NAT and you directly assign public IPs, you need different global IP subnets for each subinterface. If you have for example and 8 available hosts in that subnet, you cant assign to one subinterface and to another one. It should be like to subint1 to subint2 subint3 and so on. But as long as you use private IPs in webservers and use NAT in firewall, there is no problem.


Community Member

Re: Question about setting up DMZ interface with Sub-interfaces

Thanks for the info and will keep that in mind.

CreatePlease to create content