cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1728
Views
0
Helpful
2
Replies

Server room network setup

alvinreddy
Level 1
Level 1

Please confirm which design is accurate?

 

1. Setting up the server room with multiple stackable switches with different subnets and having the gateway to be a Cisco firewall ?

OR

2. Setting up the server room with multiple stackable switches with different subnets and having the gateway to be a Cisco Router?

 

Objective;

 - Looking for secure connections for the servers connecting to the switches

 - Trying to determine fast connectivity for servers when trying to connect to internet or intranet

 

Any specific cisco materials I could look into to get an insight of what I am trying to achieve?

1 Accepted Solution

Accepted Solutions

Martin Hruby
Level 1
Level 1

Hello

Depending on the scope of your project and your budget there are multiple options to go for.

For smaller branch networks I would recommend implementing a zone-based firewall (ZBFW) feature on the router. Break down your network into zones and then apply security policies for traffic exchanged between zones. For traffic going between VLANs in the same zone, perform Inter-VLAN routing on the switches SVI interfaces. For traffic going between VLANs in different zones, perform Inter-VLAN routing on the router with sub-interfaces assigned to correct zones and correct security policies applied.

For example you can place your servers into a DMZ zone, the uplink to the Internet into an ISP zone and other internal sub-interfaces attached to user VLANs into an internal zone. Then specify what is allowed to be exchanged between zones thereby abstracting the interfaces.

For more information see: http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html

Best regards,
Martin

View solution in original post

2 Replies 2

Martin Hruby
Level 1
Level 1

Hello

Depending on the scope of your project and your budget there are multiple options to go for.

For smaller branch networks I would recommend implementing a zone-based firewall (ZBFW) feature on the router. Break down your network into zones and then apply security policies for traffic exchanged between zones. For traffic going between VLANs in the same zone, perform Inter-VLAN routing on the switches SVI interfaces. For traffic going between VLANs in different zones, perform Inter-VLAN routing on the router with sub-interfaces assigned to correct zones and correct security policies applied.

For example you can place your servers into a DMZ zone, the uplink to the Internet into an ISP zone and other internal sub-interfaces attached to user VLANs into an internal zone. Then specify what is allowed to be exchanged between zones thereby abstracting the interfaces.

For more information see: http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html

Best regards,
Martin

Thanks Martin appreciate your response.

Regards.