cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
475
Views
0
Helpful
5
Replies

what product of firewall can support 8 back up isp

M0711141984
Level 1
Level 1

Hi Sir/ Madam

Good Day!

i would like to ask about cisco firewall that can support 8 isp and what model of firewall would you recommend 

thanks

1 Accepted Solution

Accepted Solutions

You don't need physical interfaces in that case. I would build it the following way:

  • Use two external switches, each switch connects four ISPs in different VLANs. Both switches are connected to each other.
  • Your redundant firewalls connect with redundant interfaces to both switches.
  • You use subinterfaces on the redundant interfaces for each ISP

Now only throughput and other features like contexts and amout of VPN-peers drive your decision. And that could range from an ASA 5508-X up t the high-end devices.

View solution in original post

5 Replies 5

Hi,

5525-X, 5545-X, 5555-X support 8 I/O integrated ports which is the maximum built-in. Now I am assuming you need more than 8-ports to accommodate other zones as well such as your LAN. For this you can get expansion card installed which can provide 6 additional ports.

For sizing and hardware specs it all depends on what features you want to run. Check the product sheet below for better understanding.

http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-x-series-next-generation-firewalls/data-sheet-c78-729807.html

thanks Mohammed al Baqari for your suggestion, i keep that in mind.

can i ask you regarding network topology. I have two routers which is connected to separate isp. however we don't have firewall. can you give me an idea the best way and secure network topology about firewall implementation.

thanks regards

Carlo

Assuming you are referring to enterprise design, the best design I see is to have two routers connected to ISPs followed by two L2 switches followed by firewall pair for redundancy.

From there you can create your zones for corporate users, dmz, serverfarm, connect to distribution, etc.

Look for the CVD below.

http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/IE_DG.html

You don't need physical interfaces in that case. I would build it the following way:

  • Use two external switches, each switch connects four ISPs in different VLANs. Both switches are connected to each other.
  • Your redundant firewalls connect with redundant interfaces to both switches.
  • You use subinterfaces on the redundant interfaces for each ISP

Now only throughput and other features like contexts and amout of VPN-peers drive your decision. And that could range from an ASA 5508-X up t the high-end devices.

thanks Karsten Iwen for your suggestion

i'll try that 

Review Cisco Networking for a $25 gift card