In addition to what Marvin said: Remember that you can extend the number of firewall-interfaces with the use of VLans and an attached L2-Switch. Correctly configured, this scenario is not much less secure then a firewall with more physical interfaces. I often use the following port-layout:
0 outside-Switch with VLANs 1 public-DMZ-Switch with VLANs 2 internal-DMZ-Switch with VLANs 3 inside 4 FO 5 FO
-- Don't stop after you've improved your network! Improve the world by lending money to the working poor: http://www.kiva.org/invitedby/karsteni
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...