12-06-2010 08:37 AM - edited 03-11-2019 12:18 PM
We are about to deploy a Microsoft Hyper-V High Availability cluster and I want to understand how my thinking on segregating the servers in the DMZ aligns with best practice.
Each server in the Hyper-V cluster follows best practice and has a dedicated NIC for DMZ traffic.
The DMZ contains servers for clients that we provide hosting for and we wish to achieve a scenario where each server in the DMZ:
In order to achieve this in our environment, I am proposing the following:
Any comments on the above, or suggestions for alternative methods would be greatly appreciated.
Kind regards,
Roland
12-06-2010 10:51 AM
Roland,
So you are proposing putting the machines on different vlans, trunking them to the ASA and having the ASA do the access control between the vlan interfaces. It looks good.
Another option would be private vlans, but that is not as flexible as a firewall that could do more checks and policy enforcement.
I hope it helps.
PK
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide