unclerico wrote: » Either one will work. If you do #2 go for a routed interface as opposed to using another SVI reason being you don't need another spanning-tree instance created (assuming Cisco). If you do design #2 you also won't need to rely on icmp redirects to get your traffic to the proper/shortest path to the next hop. In your diagram you show your servers on the same VLAN/broadcast domain as the firewall. When a server wants to get to the Internet it will send its traffic to the core switch. The core switch will send icmp redirects to your servers telling them to use the firewall as the next hop instead assuming you have icmp redirects enabled. If you don't (which most dont) your traffic will still take an extra hop to get to the Internet anyways as it needs to go to the switch and then to the firewall. In the grand scheme of things the extra hop will introduce very little delay in the end to end traffic flow. I manage many thousands of devices with Internet points of presense in all regions of the world and the designs we use are more along design #2. If you have a DMZ you should be following best practice and physically segregating it from the rest of the network. Design #1 is extremely common and will do the job as well.
unclerico wrote: » If you do design #2 you also won't need to rely on icmp redirects to get your traffic to the proper/shortest path to the next hop. In your diagram you show your servers on the same VLAN/broadcast domain as the firewall. When a server wants to get to the Internet it will send its traffic to the core switch. The core switch will send icmp redirects to your servers telling them to use the firewall as the next hop instead assuming you have icmp redirects enabled. If you don't (which most dont) your traffic will still take an extra hop to get to the Internet anyways as it needs to go to the switch and then to the firewall.
kalebksp wrote: » This really depends on on the full network layout. In design #1, if you have multiple VLANs each with it's gateway on the firewall (802.1q trunk or multple physical interfaces), inter-VLAN routing occurs on the firewall. In design #2 inter-VLAN routing would be on a switch. In most cases a decent switch is going to have better routing performance, but of course if you need to firewall traffic between VLANs you'd want the routing performed there. You're not limited to using only one of the designs. As an example, let's say you have separate workstation, printer, and server VLANs, and you want the workstations to be able to send larger print jobs to the printer VLAN directly but be able to apply more granular policies to traffic head to and from servers. The workstation and printer VLANs could be setup as in #2 but the servers like #1. Why would the default gateway be set to the switch? You could easily avoid ICMP redirects (and they should be avoided) by setting the gateway to be the firewall.
kalebksp wrote: » it_consultant, you maybe right if it's a small network with limited security needs, but once you get to any level of scale it matters very much. Very few firewalls can route gigabit traffic at line rate, whereas plenty of switches can. I have been in many environments where the IT staff didn't understand their traffic flows and it caused a lot of problems.
NightShade1 wrote: » Okay lets correct something in design 1 the core is routing the firewall is not... all the interface vlans are created on the switch core, not on the firewall.... (all the computers, servers are pointing to swtich core) the firwall just belongs to the vlan in which all the swithces of the network belongs... and in some cases the servers. In design 2 there is a point to point vlan between firewall and switch core the difference is that the switch core and the firewall can see each other but firewall NEEDs the routes to get to the internal networks... i need to point to the CORe swithc... i mean all my internal network i need to point them to the core switch from the firewall
it_consultant wrote: » My own network is set up this way - we have a HP 5412zl handling the internal routing. A lot of single mode fiber from remote sites is terminated into the switch, something the firewall is not capable of doing unless we put a media converter in front of it. The question of which design is "better" is, in whole, determined by the needs and budget of the network. I am not a fan of adding more complexity when it isn't needed.