Implementing security in layers is the recommended network security design for protecting information assets. This approach is achieved by segmenting your network into various security zones with an ASA Firewall and applying access policies between them according to their security levels. By default Cisco ASA firewalls come with at least four 10/100/1000 network interfaces which are sometimes not enough. Considering that we need one physical interface dedicated for failover configuration (if used) and that usually one dedicated interface is used for Internet connectivity, then we are left with only two physical interfaces for further network segmentation.
By using the Cisco ASA 4-Port Gigabit Ethernet Security Services Module (4GE SSM) (shown above) you instantly expand your firewall interfaces to a total of three Fast Ethernet and six Gigabit Ethernet ports on the Cisco ASA 5510 Security Plus, and eight Gigabit Ethernet ports and one Fast Ethernet port on Cisco ASA 5520 and 5540 appliances. This gives you plenty of physical interfaces to work with and apply your security design without hardware limitations.
Related Posts
- What is Cisco ASA Firewall – All you need to Know
- Traffic Rate and Bandwidth Limiting on Cisco ASA Firewall
- Cisco ASA Firewall (5500 and 5500-X) Security Levels Explained
- Cisco ASA 5505-5510-5520-5540-5550-5580 Performance Throughput and Specs
- Password Recovery for the Cisco ASA 5500 Firewall (5505,5510,5520 etc)