[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1174
  • Last Modified:

Secure DMZ design - back to core switch??

This DMZ was created before I started here...it goes back into the core switch...Any idea why they would do that, is it secure?
I want to create another DMZ, I have purchased two layer 2 switches (going to team the NICs, one NIC on each DMZ switch), what is the best way to interface the new DMZ switches to the ASA DMZ...I would need to use two interfaces on ASA, then what gateway would I use?? Or should I send it back into core switch like the other DMZ?? in order to use only one asa interface...

Network-DMZ.pdf
0
Atripp
Asked:
Atripp
1 Solution
 
raptorjb007Commented:
Having the DMZ interface on the ASA is fine as long as it is configured on a separate VLAN on the switch. This keeps the traffic seperated from the the normal LAN traffic. You would need to configure trunking between the switches to allow VLAN traffic to travel between switches.

It is probably best to use the ASA as the sole connection between the VLANS (LAN and DMZ) as it is would handle the security between them. Otherwise you need a router or layer-3 switch to pass the traffic between them.
0

Featured Post

[Webinar] Kill tickets & tabs using PowerShell

Are you tired of cycling through the same browser tabs everyday to close the same repetitive tickets? In this webinar JumpCloud will show how you can leverage RESTful APIs to build your own PowerShell modules to kill tickets & tabs using the PowerShell command Invoke-RestMethod.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now