MysticLlama
Golden Member
I'm not up to date with the latest specs, so I'm trying to figure out the most cost-effective way to do this that will still work well.
General layout:
I'm going to have the following servers
2 Webservers
1 Database Server
1 Integration Server
1 Domain Controller
These will be hosted offsite at a host facility.
In my current system I use a PIX 501 on one set of adapters and 3DES VPN to the main office for connectivity, and an F5 Big-IP load balancer on the front end to serve clients.
The Big-IP will not be used in the new system, it will just use Windows NLB instead.
I'd like to use a single firewall to both protect the systems as well as build the tunnel to the main office for file deployment/replication/administration. I'm not sure how feasible this is.
The 501s that I've had for some time will do 6mb of 3DES traffic. The office is going to have 4 T1 lines, so this 6mb could be saturated at night during a content load, which seems like it would choke the firewall from servicing web clients.
Current web traffic across all systems is about 5-6mb max right now, and we'll be eliminating all of the current stuff and consolidating to this system. I'd anticipate that with performance, design, and marketing improvements planned that we'd be up to the 10-12mb range within 18 months.
A PIX 501 could do the web traffic side fine without encryption, and a second one would be able to handle the tunnel to the office, but it might be nice to use a single more powerful piece of equipment if possible.
I guess the better solution would be a 515 with the 2 webservers in the DMZ, the other three on the inside port, and the VPN available to all of them for a little more protection?
Thoughts, opinions, better ideas completely?
General layout:
I'm going to have the following servers
2 Webservers
1 Database Server
1 Integration Server
1 Domain Controller
These will be hosted offsite at a host facility.
In my current system I use a PIX 501 on one set of adapters and 3DES VPN to the main office for connectivity, and an F5 Big-IP load balancer on the front end to serve clients.
The Big-IP will not be used in the new system, it will just use Windows NLB instead.
I'd like to use a single firewall to both protect the systems as well as build the tunnel to the main office for file deployment/replication/administration. I'm not sure how feasible this is.
The 501s that I've had for some time will do 6mb of 3DES traffic. The office is going to have 4 T1 lines, so this 6mb could be saturated at night during a content load, which seems like it would choke the firewall from servicing web clients.
Current web traffic across all systems is about 5-6mb max right now, and we'll be eliminating all of the current stuff and consolidating to this system. I'd anticipate that with performance, design, and marketing improvements planned that we'd be up to the 10-12mb range within 18 months.
A PIX 501 could do the web traffic side fine without encryption, and a second one would be able to handle the tunnel to the office, but it might be nice to use a single more powerful piece of equipment if possible.
I guess the better solution would be a 515 with the 2 webservers in the DMZ, the other three on the inside port, and the VPN available to all of them for a little more protection?
Thoughts, opinions, better ideas completely?