02-26-2015 08:44 AM - edited 03-11-2019 10:33 PM
Current network infrastructure has the core switch as 4510 where all the campus is connected Internal routing protocol is EIGRP and peering with ISP is through BGP. As of now there is no security internally as all vlans can get to each other without any access-list or firewall inspection.
Based on the existing setup how could I follow the HIPPA regulations for the new app that is going to deployed into the existing network. Assuming that the new app will have web, database and application layer which will have its own vlans A, B and C respectively. Traffic from the each tier has to pass through ASA as well as to and from the internet has to go through the ASA for accessing this application from the internet.
I have some idea about how to approach this setup. Create 3 vlans on the core switch for web, app and database. create SVIs for these 3 vlans. Once the application is deployed with these vlans using access-list on the ASA for web-app-database communication and providing the default gateway of the firewall for each hosts associated with new application. so this will make sure that the traffic is traversed using the ASA and access-list applied.
As I am new to network design, any ideas would be welcomed. I have attached the diagram below.
Please suggest if you guys have some approaches or any other way to approach this senario.
Help would be greatly appreciated. Thanks in advance.
02-26-2015 11:34 AM
Hello Mukesh Thajur.
Cisco ASA is a great idea! This is for how many users will be affected by the way? For further assistance, please email me directly at (bsiapco@cisco.com).
Happy To Serve
Barry
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide