cisco perimeter security design:(( need advise

From: Stefan Grey (examplebrain@hotmail.com)
Date: Thu Mar 30 2006 - 03:44:35 GMT-3


Thank you very much who participated in the previous discussion. Be very
thankfull if you'll advise me in the following task:

Modified task: From SP we get 3 connections:
1. internet 2 Mb (through ASSL modem)
2. IPSEC VPN 1 Mb for 3 nodes (through ADSL modem). GRE is not needed.
3. Frame-relay now 128k. Connected in small router. Is used to connect to
the remote site. Local network.

So there are 3 ethernet links available tothe client. It seems that in the
central office the DMZ is planned for their Servers. Office is above 500
people.

It is needed to propose 2 variants to receive traffic and provide perimeter
security. (FW and IPS are needed).

1. minimal
2. Redundancy+failover. Because the CO is large they think about failover as
well and will look at both variants.

What would you advise

From my point of view:
1st put every thing in 1 ASA. 3 eth to receive all stuff, 1 eth for local
network, 1 for DMZ.

2i variant, I try to draw the scheme with 2 ASAs and active/standby
failover, but I  o{r`~q| m`phqnb`r| wrn-rn q dbsl ASA q active/standby but
I need the 6th interface and I am absolutely not sure in my design.
Any thoughts?? Maybe ther is some reason to use ISR?

Any help highly appreciated.



This archive was generated by hypermail 2.1.4 : Sat Apr 01 2006 - 10:07:40 GMT-3