After doing some research last night, I think I have the answers to the questions I posted yesterday.1. Do I really need a separate Juniper EX3300-24T switch for the DMZ zone? Can I just use the DMZ vlan on the core switch? The goal is to have virtual servers running in the DMZ and maybe up to 4 physical servers.
2. How will the LAN network talk to vlan 10, 20. and 30 on the core switch? I understand how the LAN network with talk to vlan 1 on the core switch because of the direct 10G connection to the vlan 1 port.
3. How will vlan 1, 10, 20, and 30 talk to each other on the core switch (Quanta LB6M)?
Also I am still fuzzy on how pfsense will do the DMZ traffic routing and filtering.
Thanks for all the comments so far...
1. If I use a Layer 3 switch for the DMZ zone, I can now do all my inter-Vlan routing using the Layer 3 switch. The pfsense router will be used to filter traffic (firewall rules) between the DMZ and the internal network zone and to route traffic to the internet.
2. Because the core switch is a Layer 2 switch, inter-vlan communication must be done by a Layer 3 switch or a router.
3. The Layer 2 switch (switch) and Layer 3 switch (edge/access) will communicate to each other over a trunk port. I need to create the same Vlans that is created on the Layer 2 core switch on the Layer 3 switch as well.
Here is an updated layout. Please provide feedback and comments on how to improve or simplify the design.
Last edited: