I'm currently migrating from a pair of Cisco ASAs and the zones have me a little confused. Right now I have interfaces on the ASAs of inside, wireless, outside, dmz-private-web, dmz-private-db, dmz-public-web, dmz-public-db, dmz-dev-web, dmz-dev-db. My plan was to group the inside and wireless together as "trusted", outside as "outside, and then all of the DMZ zones as "DMZ". When the interfaces are placed into a single zone like that, hopefully rules are still required between them?
... View more