2-tier Firewall network diagram

Posted on 2012-08-27
Last Modified: 2012-08-30
Hi expert,

I have a nework with 2 tier firewall that consist two different types.  I am trying to understand how the data traffice flow for first and second tier firewall.  How the internal user data flow and how out side traffic flow into the DMZ and internal side.  

Based on the attached network diagram i have both WLAN and DMZ data flow at the DMZ zone .  And I have user VLAN and App & DB VLAN both at Corporate Core and DC Core.      

I have limited knowledge as how to translate the network diagram and figure out the data traffc flow from  outisde to inside , vice versa.  I am specially confuse how the 2-tier firewall function within data being transverse.  

Besides, can assume the inter vlan routing will be transverse through the 2-tier Firewall ???

Appreciate your expert advise .  Thanks
Question by:maxim168
    LVL 21

    Expert Comment

    The diagram does not show which devices are performing intra-vlan routing or serving as the VLAN root of your network.  You'd have to check the configuration of the different firewalls.
    LVL 51

    Expert Comment

    by:Keith Alabaster
    Please ask a question - as i don't see one so far - and we will try and answer it.
    LVL 60

    Accepted Solution

    the person who created the diagram would have supplied the different IP address as itself can have a lot of interpretation. Two tier demarcate the DMZ and it seems that WLAN also is within the same zone. DMZ switch (trunked) allow MAC traffic if I am  not wrong (may even be Cisco OTV, extending MAC addressing across the two route). For the user VLAN, I was expecting another switch below the core switch, likewise for the appl/db VLAN. It may appear that these VLAN are sited in different sites but the ASA will check before granting flow between these VLAN. The question is also where is the admin mgmt VLAN .... there need to be more info

    Author Closing Comment

    Thanks ,  I am just wating for some feedback for the network diagram attached.  
    I just need to know how the  2nd tier firewall which is ASA 5500 do the routing as compare to 1st tier firewall non-cisco device.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Join & Write a Comment

    This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now