Thoughts & opinions if I may.
I ' m not a big fan of transparent firewall operation, but if the " green lan" is already in place, you could do transparent mode here, and
not change one aspect of the lan. The same holds true, with regards to the DMZ
On the DMZ and trunking, there' s no problems with doing tagging in transparent mode.
On the earlier comment by another & with regards to AS and Fortimail, the Fortigate does provide AS function and you don' t need a separate ESA just for AS.
On the ASA & FGT, do you have any concerns with sessions limits? thru-put ?
The reason I say this (above bold ), I did something like the above design that your proposing, but with an older ASA 5510 and FGT200B and the choke point was the 5510 in regards to thru-put. (
fwiw you will not get more than 350mbps out of a ASA5510 no matter whatever you do or with gige ports and security+ )
This is why I question the ASA, & it' s role and if it' s a business requirement. You probably would want to look at that, and make sure you don' t have ay portion of the stacked/tiered firewalls being a bottleneck/chokepoint regardless if it encrypted or non-encrypted traffic. So i would pull the numbers for both models and do comparisons.
The cool thing with vdoms on the fortigate, you could set sessions limits and resources limits. (
see attach drawing )
In the end of the day, you have about 6 or more options. Just vet each one and do your research. Did you engage your fortinet partnet or sales team for there opinions?