Yep, our switch is 802.1Q (Netgear GS724TP).
Real server - Dell PE R710.
That was my original idea - X0 LAN & X2 DMZ. It just wasn't sure if the 2 cables coming from X0 & X2 could plug into the same switch and work?
Basically we want to have a web server (viewable to the public) and a SQL server on the LAN which holds the data.
Our end goal is to limit access to the rest of our network in the event the web server was comprimised.
Ideally you would have both networks connected to different switches, so they are physically separated.
What I would do if I was you. I would use a different subnet for the public facing services that you want in the DMZ. So you separate the networks logically, forcing packets through the SonicWall router. That in turn allows Sonicwall to filter the packets however you set it up.
For example:
172.16.0.0 = LAN
10.0.0.0 = DMZ
Define both of those networks in Sonicwall (Again, i havn't used SonicWall). Setup firewall profiles that only allow each subnet to access the WAN.
Once that is done and setup perfectly. I.e you cannot access the DMZ from the LAN nor the LAN from the DMZ. Then you can work from there if you need LAN to DMZ connectivity, say, from a maintenance machine.
You could define a specific LAN machine, for example, 172.16.0.99 and only allow that machine to access the DMZ zone using specific services. You have to keep in mind that that machine would then become the weakest link and could act as a router between the two networks.
That way should solve your problem without the need for any complex networking or extra hardware.
That would also give you lots of log data and IDS data from the SonicWall as everything will be passing through it. If an attacker gets into the webserver and launches a portscan or some sort of worm, then *hopefully* the IDS in Sonicwall will identify it and the IPS will stop it

. At least that's the plan.