Cisco PIX Firewall and VLANS
In my current configuration I have a router connected to the INTERNET on the WAN interface and switch 1 connected on the Ethernet interface. Switch 1 is being used for connecting the router, IDS, and firewall together. It also provides outside firewall testing.
The PIX firewall outside interface is connected to switch 1. There is another switch connected to the inside interface of the PIX Firewall.
I would like to make better use of switch 1 by creating two VLANS. VLAN 2 would be for all the devices that are currently connected on switch 1 (Router, IDS, FW, and free ports for testing) and VLAN 4 would be for the inside firewall connection and internal devices. Basically I would like to have the firewall route between the VLANS and continue to provide NAT and other security functions.
I don't know if I would just connect the firewall interfaces into the VLAN ports and it would automatically perform the routing and security processes or would I have to create sub-interfaces and trunks?