<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: multiple vlans on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466635#M746759</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA can do vlanning. You can create vlan logical subinterfaces and they can act as regular interfaces and pass traffic between them and everything.&lt;/P&gt;&lt;P&gt;So using a switch to put hosts, servers etc in vlans and have the ASA "firewall" traffic between them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on your traffic requirements you should chose your ASA model 5510-20 are the low-end models, 5540 is mid-size and 5550s and 5580s are powerful boxes.&lt;/P&gt;&lt;P&gt;As for the switches, there is a great variety of switches you can chose from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps you to get started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 May 2010 16:10:44 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-05-13T16:10:44Z</dc:date>
    <item>
      <title>multiple vlans on firewall</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466633#M746757</link>
      <description>&lt;P&gt;There needs to be a base design to come up with for a data center where multiple server groups or units will be in place.&lt;/P&gt;&lt;P&gt;Wanted to know if there is any way to use ASA in such a scenario using vlan segmentatation or whatever means.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Objective is to achieve resiliency and security within these multiple groups. If there is any inter-group communication required, it is desired to be done in a very limited manner.&lt;/P&gt;&lt;P&gt;Please give valuable inputs. Achieving optimum device/design is also a thrust here, like what platform would be used as core switching/routing and how to judge that.Links to any such design or scenario will be of great help also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance as usual for all fellow members!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466633#M746757</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T17:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: multiple vlans on firewall</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466634#M746758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use trunking on the ASA and the ASA will be the default gateway for each subnet. Any inter-vlan communication will have to flow through the ASA and you can restrict/allow as you see fit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 16:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466634#M746758</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-05-13T16:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: multiple vlans on firewall</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466635#M746759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA can do vlanning. You can create vlan logical subinterfaces and they can act as regular interfaces and pass traffic between them and everything.&lt;/P&gt;&lt;P&gt;So using a switch to put hosts, servers etc in vlans and have the ASA "firewall" traffic between them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on your traffic requirements you should chose your ASA model 5510-20 are the low-end models, 5540 is mid-size and 5550s and 5580s are powerful boxes.&lt;/P&gt;&lt;P&gt;As for the switches, there is a great variety of switches you can chose from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps you to get started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 16:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-on-firewall/m-p/1466635#M746759</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-13T16:10:44Z</dc:date>
    </item>
  </channel>
</rss>

