ASA 5510 - Need more Ethernet Interfaces, any modules?

Hi all,
So I've recently got a new ASA 5510 in the office (new firewall!!) I'm currently hardening it and configuring it. THe previous SA (before he left for training) purchased this but I realized that it only has 4 Ethernet interfaces when our PIX firewall uses 6! Does Cisco provide a module to increase the amount of interfaces or am I screwed?
So I've recently got a new ASA 5510 in the office (new firewall!!) I'm currently hardening it and configuring it. THe previous SA (before he left for training) purchased this but I realized that it only has 4 Ethernet interfaces when our PIX firewall uses 6! Does Cisco provide a module to increase the amount of interfaces or am I screwed?
Comments
There is SSM-4GE module, which will give you +4 GE interfaces, but maybe you won't need it if you can go with the sub-interfaces.
Ethernet 0/0 - outside interface
Ethernet 0/1 - inside interface (laptop domain / main domain)
Ethernet 0/2 - test domain
Ethernet 0/3 - another development domain
Ethernet 0/4 - Loadbalncer within the one test domain to provide web traffic / to go to the internet
Ethernet 0/5 - VPN
I understand I can change the the management interface to support another one of these. How would sub interfaces work with this current setup? MAnagement is willing to purchase more stuff! so I'm curious if I should get it just for future upgrades because they are talking about creating another domain here.
Ah! I am ! I will try this option then (forgot you could do that, very helpful).
I love tech refresh times! Submit as much as you can because you wont be able to get it later!
We probably use it too much like a router but then after all, we do have to segregate the individual client traffic.
For traffic that's similar in nature, you may want to share an interface and sub-interface. Or, share an interface for lower volume traffic.
ASAs are almost all we use for clients, at least when it is mainline Cisco.
Very cool! I did like this little project, made me redesign the little backend network we have for the development area. Simple two 48 port 3560G switches and two ASA 5510's (one acting as the VPN appliance). However, I still could not get down time =/ we've been doing both the development migration and production at the same time and they wont let me take down the current firewall because they work on weekends.... I sent in a request a month in advance this time so I'm hopeful to get it in. Even though it should not take long (and working properly) should take only 10 minutes.
I will say that configuring the NAT rules looks much different on the ASA than the pix (in terms of the how it looks through ASDM). I've tested it in the lab and I'm using OSPF as my routing protocol because I have 5 segregated domains.