cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
15315
Views
0
Helpful
2
Replies

Best Practice Two Tier Firewall Architecture

k.clifford
Level 1
Level 1

First time posting so bear with me.

I am looking for a best practice design reference for a customer that wants a two tier firewall structure. 

--Does anyone have a reference link/document/book? 

--Should the customer use different vendors at each tier, I know that is blasphemy but I'm asking anyway since they wanted to Palo Alto on the 1st tier and ASA's on 2nd tier.  Current design in front of the client has the ASA in Transparent mode to conserve IP space is what I am being told.

--Is double-natting a best practice? Assuming we recommend ASA in routed mode over transparent mode.

I will be asking these same questions at Cisco Live in a few weeks but would like to get back to my customer sooner that that.

Any help is certainly appreciated.

Thanks in advance.

-Ken

2 Replies 2

rajevemu
Cisco Employee
Cisco Employee

Hi Ken,

I am also posting first time.

Architecture will be vary depends upon client requirement.

  1. If customer have internal servers and internal team wants to use, those servers will be in behind lan firewall. Create NAT to hide the real server ip from internal user communication.
  2. All DMZ servers will be on Internet firewall.
  3. Use P2P IPSEC/GRE tunnels between Client to customers/vendor communication on Internet firewall for more secure.
  4. Create contexts for multiple clients.
  5. Place the proxy server between lan and internet firewall for internet access.

Always routed mode firewall is good for troubleshooting point of view. I hope this may be useful.


Thanks,

Rajesh Vemuri.

Review Cisco Networking for a $25 gift card