• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 464
  • Last Modified:

ASA5510 and VLAN interface

Hi,

I have a ASA5510 that have all the interfaces occupied but i need to add some more DMZ

If i dedicate an interface to the Ouside for Internet, can i have my LAN and one or two DMZ in the same interface and have access-list applied to it just like it would have been with physical interfacce ??

Thanks



0
fox54
Asked:
fox54
  • 2
3 Solutions
 
craigothyCommented:
Yes, as long as you have a vlan capable switch (802.1q)
example:
http://ciscoconfigs.net/index.php?option=com_content&task=view&id=18&Itemid=26
0
 
zwart072Commented:
You have to create on one physical 2 or 3 subinterface. Then you configure those subinterfaces just as you used to do with the physical interace! connect the physical interface to a trunk port on you switch and you have created one or two DMZ
0
 
fox54Author Commented:
For security reason. is it best to have a physical interface for outside, a physical interface to inside (the LAN and also native VLAN1) and have trunking on the other ports to allow multiple DMZ ?

Like
interface Ethernet0/0: Internet (security 0)
interface Ethernet0/1: LAN native VLAN1 security 100
interface Ethernet0/2.10 DMZ1 security 5
interface Ethernet0/2.20 DMZ2 security 10
interface Ethernet0/2.30 DMZ3 security 15

Also is there any security risk associated with this kind of setup ??





0
 
craigothyCommented:
no real security issue. just remember you are sharing the bandwidth of the physical interface across three dmzs.
0

Featured Post

[Webinar] Kill tickets & tabs using PowerShell

Are you tired of cycling through the same browser tabs everyday to close the same repetitive tickets? In this webinar JumpCloud will show how you can leverage RESTful APIs to build your own PowerShell modules to kill tickets & tabs using the PowerShell command Invoke-RestMethod.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now