You can use one, two, or three network interfaces. Each should have a separate IP address. Many secure DMZ implementations use separated networks to isolate the different traffic types.
Configure the virtual appliance according to the network design of the DMZ in which it is deployed. Consult your network admin for information regarding your network DMZ.
- With one network interface, external, internal, and management traffic is all on the same subnet.
- With two network interfaces, external traffic is on one subnet, and internal and management traffic are on another subnet.
- With a three network interface, external, internal, and management traffic each have their own subnet.