I have 4 remote fiber links terminated on the main floor. Is is possbile to terminate this links directly on the firewall?
Exampls, 4 floors, each with a L2 switch, single vlan. From each floor, a fibre link is connected to the main floor. On the main floor I would like to terminate these links on a firewall. Is there such a firewall model to implement this setup?
Any of the Midrange ASA firewalls 5512-55 have an expansion module that will accept up to 6 SFP ports to terminate fiber.
From the sounds of it you may be better satisfied by a stack of say (2) 3650's where you can run a multichassis Etherchannel to each floor limiting your fault domain to individual device and fiber interconnect and the port channel the stack to a FW instead. In a 2960 or 3650 aggregation design, you can terminate up to 8 SFP connections in a two switch stack.
This would give you better capacity and resilience than going for the IO expansion route in the ASA itself.
To add to Robert's good suggestion I would add that your question seems to imply that each floor VLAN default 3 gateway would be on the firewall. This would not be a best practice.
You would typically have a lot of traffic local to the campus that has no need to go via the firewall for any security policy enforcement. Using firewall insterfaces and bandwidth for that sort of thing is usually not a wise investment of recourses.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...