I am trying to design a small collapsed network. Here are the parameters:
1)There is no existing equipment.
2)Everything must be Cisco.
3)IBM Blade Chassis will be made up of VMware ESX hosts
4)ESX hosts will contain virtual machines with External DMZ servers AND Internal servers.
5)Should use as little equipment as possible.
6)Must be secure
7)Support 20 internal users and 5 VPN users.
8)External DMZ must support hosting for email proxy server and website(small number of connections)
As you may have noticed the DMZ is not separated at the firewall. I personally believe that at this point in time current technology makes this feasible as long as the proper security controls are implemented between the External DMZ VLAN and the rest of the network(IPS,ACL,vlan-hopping mitigation, etc).
Is there a more efficient way then shown in the following diagram?
Thanks
1)There is no existing equipment.
2)Everything must be Cisco.
3)IBM Blade Chassis will be made up of VMware ESX hosts
4)ESX hosts will contain virtual machines with External DMZ servers AND Internal servers.
5)Should use as little equipment as possible.
6)Must be secure
7)Support 20 internal users and 5 VPN users.
8)External DMZ must support hosting for email proxy server and website(small number of connections)
As you may have noticed the DMZ is not separated at the firewall. I personally believe that at this point in time current technology makes this feasible as long as the proper security controls are implemented between the External DMZ VLAN and the rest of the network(IPS,ACL,vlan-hopping mitigation, etc).
Is there a more efficient way then shown in the following diagram?
Code:
Internet
|
Firewall/Router (ASA)
|
Internal Router(VLAN Routing) (
|
48 Port Switch----------------|
| |
PCs/IP Phones IBM Blade Chassis
Thanks