<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Solution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976053#M938305</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct that in terms of physical interfaces the ASA5540 has only 4 interfaces. But the ASA5540 supports VLANs so if one (or more) of the interfaces are connected to a switch then the number of logical interfaces supported is much higher. According to this data sheet the ASA5540 supports 200 VLANs, which should allow you to segment your network as you want.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 May 2008 00:38:26 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2008-05-05T00:38:26Z</dc:date>
    <item>
      <title>Security Solution</title>
      <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976051#M938303</link>
      <description>&lt;P&gt;Dear All&lt;/P&gt;&lt;P&gt;I have a network which segmented to 5 segments (Servers, Staff, Studnets, Guests, DMZ) + two fiber lines for internet connectivity from my ISP.&lt;/P&gt;&lt;P&gt;I would like to find a solution which allow me to terminate all segments and internet lines to it then apply a protection rules ( virus scanning, web filtering etc)&lt;/P&gt;&lt;P&gt;this device should cover the following functions.&lt;/P&gt;&lt;P&gt;Firewall, antivirus, anti spam, web filtering, VPN...&lt;/P&gt;&lt;P&gt;I checked ASA 5500 series but it has a problem in No. of ports available. (5540 has 4 ports only)&lt;/P&gt;&lt;P&gt;any advices ??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-solution/m-p/976051#M938303</guid>
      <dc:creator>reagentom</dc:creator>
      <dc:date>2019-03-11T12:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Solution</title>
      <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976052#M938304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can create a subinterface on say DMZ interface and put it in a different VLAN to separate from the DMZ network. You need to enable trunking on the switch port which connects to the DMZ physical port on ASA 5500.&lt;/P&gt;&lt;P&gt;Suppose you use gig0/2 on the ASA as DMZ. Then you can do the following to create segment STUDENTS on this interface :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#interface GigabitEthernet0/2.300&lt;/P&gt;&lt;P&gt;ASA(config-if)#nameif DMZ &lt;/P&gt;&lt;P&gt;ASA(config-if)#vlan 300&lt;/P&gt;&lt;P&gt;ASA(config-if)#security-level 50&lt;/P&gt;&lt;P&gt;ASA(config-if)#ip address x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;ASA(config-if)#exit&lt;/P&gt;&lt;P&gt;ASA(config)#interface GigabitEthernet0/2.301&lt;/P&gt;&lt;P&gt;ASA(config-if)#nameif STUDENTS&lt;/P&gt;&lt;P&gt;ASA(config-if)#vlan 301&lt;/P&gt;&lt;P&gt;ASA(config-if)#security-level 60&lt;/P&gt;&lt;P&gt;ASA(config-if)#ip address y.y.y.y 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls rate if this solves your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 May 2008 20:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-solution/m-p/976052#M938304</guid>
      <dc:creator>rkalia1</dc:creator>
      <dc:date>2008-05-04T20:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Solution</title>
      <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976053#M938305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct that in terms of physical interfaces the ASA5540 has only 4 interfaces. But the ASA5540 supports VLANs so if one (or more) of the interfaces are connected to a switch then the number of logical interfaces supported is much higher. According to this data sheet the ASA5540 supports 200 VLANs, which should allow you to segment your network as you want.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2008 00:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-solution/m-p/976053#M938305</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2008-05-05T00:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security Solution</title>
      <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976054#M938306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all,&lt;/P&gt;&lt;P&gt;do you mean it is possible to create content filter/ firewalling rules per vlan not per interface .. rt ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2008 02:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-solution/m-p/976054#M938306</guid>
      <dc:creator>reagentom</dc:creator>
      <dc:date>2008-05-05T02:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Solution</title>
      <link>https://community.cisco.com/t5/network-security/security-solution/m-p/976055#M938307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahmed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it should be possible to create content filter/ firewalling rules per vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2008 11:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-solution/m-p/976055#M938307</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2008-05-05T11:35:46Z</dc:date>
    </item>
  </channel>
</rss>

