We are planning to put hosts on three separate inside networks (10.0.1.0/24, 10.0.2.0/24 and 10.0.3.0/24), and connect them all to Internet through one firewall. All hosts need access to Internet, but none of the three separate LANs should be able to exchange traffic between each other.
We've got ASA 5505 with Sec Plus license, which we though could handle this. The ASA model comparison on Cisco's web site says the Base license gives you 3 VLANs (not enough for us) but Sec Plus license gives 20 VLANs:
Okay, we can get around that by setting a backup interface, but if we try to strecth this further and add one more interface, ASA says: "With current license maximum number of named interfaces allowed is 4. Name cannot be set for this interface."
And if you don't set a name for the interface, you don't get to set access rules from the ASDM Security Policy configuration.
When looking at the ASA with ASDM, it says: "VLANs: 3, DMZ Unrestricted"
What happened to the support for 20 VLANs?
-- Pawn