<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall Design Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095072#M393060</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we have 35 vlans but this may increase and keeping future expansion in consideration, we want to move the default gateways to the Core Switches. This is the current design we are planning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet------&amp;gt;EdgeRouters-------&amp;gt;ExtFirewall(NAT,VPN)-------&amp;gt;DMZ-Switches(Two stacked switches for redundancy, DMZ servers connect here)--------&amp;gt;InternalFirewall( Intervlan Restriction)--------&amp;gt;CoreSwitch--------&amp;gt;Aggregators--------&amp;gt;Topof the rack switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on the above design or best practice considerations will be helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jan 2013 22:19:18 GMT</pubDate>
    <dc:creator>Nick wfd</dc:creator>
    <dc:date>2013-01-11T22:19:18Z</dc:date>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095068#M393056</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently i am in the process of designing a data center, in our current setup we have the default gateways of all vlans configured on a ASA 5520.&lt;/P&gt;&lt;P&gt;In the new design we are planning to bring down the default gateways from the ASA to the core switches (4500x). But there is a requirement of firewalling intervlan traffic. we also have two firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can we design to use one firewall to restrict traffic between vlans and also configure the dmz on it, and another external firewall to handle NAT, site to site and remote access VPN. Is connecting two firewalls back to back&amp;nbsp; a good design, Please suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095068#M393056</guid>
      <dc:creator>Nick wfd</dc:creator>
      <dc:date>2019-03-12T00:45:43Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095069#M393057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whats behind the decision to move the GWs from the ASAs to the Core switches?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 17:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095069#M393057</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-11T17:46:21Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095070#M393058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The number of vlans have increased and also considering performance, we are planning to move the GWs from the ASAs to the core switches.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 18:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095070#M393058</guid>
      <dc:creator>Nick wfd</dc:creator>
      <dc:date>2013-01-11T18:23:52Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095071#M393059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any specific numbers related to the numbers of current/future Vlan IDs and the performance/throughput required by the setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you been expiriencing problems already with the current setup which lead to this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know you are planning on using the current firewalls but I just want to get some idea of your current setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 19:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095071#M393059</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-11T19:32:54Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095072#M393060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we have 35 vlans but this may increase and keeping future expansion in consideration, we want to move the default gateways to the Core Switches. This is the current design we are planning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet------&amp;gt;EdgeRouters-------&amp;gt;ExtFirewall(NAT,VPN)-------&amp;gt;DMZ-Switches(Two stacked switches for redundancy, DMZ servers connect here)--------&amp;gt;InternalFirewall( Intervlan Restriction)--------&amp;gt;CoreSwitch--------&amp;gt;Aggregators--------&amp;gt;Topof the rack switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on the above design or best practice considerations will be helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 22:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095072#M393060</guid>
      <dc:creator>Nick wfd</dc:creator>
      <dc:date>2013-01-11T22:19:18Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095073#M393061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you looking for another vendor for this solution? I have seen Juniper firewall (SRX5800) have good limit to configure vlans on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since this is Cisco forum, lets stick to some basic rules &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 06:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095073#M393061</guid>
      <dc:creator>Jigar Dave</dc:creator>
      <dc:date>2013-01-13T06:45:52Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095074#M393062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I can understand I dont think there are many options to go for if you want to keep a firewall controlling the traffic through all of the Vlans. Naturally having the gateways being at the firewall would be the ideal situation when it comes to controlling the traffic. Only using the firewall to route traffic out from those Vlans would naturally mean you couldnt control any traffic between them unless you start configuring extended ACLs on the core device itself. But this would naturally become troublesome to configure, troubleshoot and manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would probably look into the possibility of getting a brand new firewall that can handle being the gateway for Vlans and if you currently have 2x ASA5520 you could maybe look into (as you have) using them for both ACL/NAT and VPN purposes. Each firewall would then have a pretty simple role in the network and therefore they would be easier to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres some good brief documents on the Cisco firewall models&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They provide information on the throughput performance, Vlan support, etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5500 Series&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80285492.pdf"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80285492.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5500-X Series&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/at_a_glance_c45-701635.pdf"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/at_a_glance_c45-701635.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 12:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095074#M393062</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-13T12:51:19Z</dc:date>
    </item>
    <item>
      <title>Firewall Design Question</title>
      <link>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095075#M393063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agree with Jouni. There is no need to move the GWs from the ASAs to the Swtich.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this datasheet link: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. look for "Virtual Interfaces (VLANs)" for each of the models. Our ASA5510 alone can support can support 100 vlans with security plus license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. join me on my upcoming webcast on Tue Jan 15th and ask away your questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/community/netpro/expert-corner"&gt;https://supportforums.cisco.com/community/netpro/expert-corner#view=webcasts&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; margin: 10px 0px; font-family: Arial, Helvetica, sans-serif; line-height: 16px;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-size: 14pt;"&gt;Upcoming Live Webcast in&lt;/SPAN&gt; English&lt;SPAN style="font-size: 14pt;"&gt;:&lt;/SPAN&gt; January 15, 2013&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG style="border-collapse: collapse; font-size: 14pt; list-style: none; "&gt;Troubleshooting ASA and Firewall Service Modules&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; margin: 10px 0px; font-family: Arial, Helvetica, sans-serif; line-height: 16px;"&gt;&lt;A href="http://tools.cisco.com/gems/cust/customerQA.do?METHOD=E&amp;amp;LANGUAGE_ID=E&amp;amp;SEMINAR_CODE=S17664&amp;amp;PRIORITY_CODE=cisco%20" style="border-collapse: collapse; list-style: none; outline: none; color: #2f6681;"&gt;Register today for this Cisco Support Community live webcast.&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 14:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-design-question/m-p/2095075#M393063</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-13T14:11:44Z</dc:date>
    </item>
  </channel>
</rss>

