There isn't a simple answer to this question. In general, it's a bad idea to rely on VLANs in of themselves for security. There have been so-called "VLAN hopping" attacks in the past, particularly on older switches, in which it was possible to send specially-crafted packets between VLANs on layer-2 switches.
I haven't heard of any vulnerabilities like this lately, but I think the above points out the importance of keeping in mind that VLANs weren't designed to provide security. If the security requirements between your two DMZs are high, then I think you absolutely want firewalling capability in between them (i.e., 1 switch per firewall in your case). If on the other hand inter-DMZ traffic isn't a big concern, then 2 VLANs on 1 switch may be a good way to save some money.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.