Proposed Network Design for DMZ with Server Virtualization

dmznetworkingvirtualizationxen

I have the following proposed network design that I will be implementing.

  1. All connection for server and PCs are connected through an All in One cisco firewall
  2. Only one high end server will be used. The server has two NICs.
    Virtualization will be used
  3. DMZ0 network port connected to the server from the firewall.
    (The virtualized http server will use this port)
  4. The PCs are connected to a switch that is from the firewall, this network is private
  5. The server will have another NIC port connected to the switch, the server that is not exposed to the DMZ network, will use this.

Questions:

  1. I've been playing which virtualised software for this setup, will Xen Cloud platform work for this diagram?
  2. Will this physical separation of network using two NICs work for the server?
    Will it work with the Xen Cloud platform?
  3. Are there other problems that I may face from this setup?

Network Diagram

Best Answer

Thoughts:

  1. You should be using the two NIC ports for link aggregation (aka Teaming).
  2. Use vLANs if you think you need traffic segregation, I don't think you do at this size/complexity.
  3. Xen is great and all, but half of installations are VMware's ESXi, and most of the rest are Hyper-V. Linux's KVM is a red-headed step child, and Xen is lucky to be mentioned on most industry reports.
  4. I'm not sure what the limitations of that router are, but it's meant for SOHO. Commection limits are the first problems people run into (that and not working the way it's supposed to, but that model isn't infamous or anything to my knowledge).