We have 2 different environment setup with different firewall and isp. It did not connected to each other. We engage our vendor to setup load balancer switch to manage the outgoing and incoming traffic. The load balancer switch only have 3 network port, 1 connected to isp 1, 1 connected to isp 2 and only left 1 port for our firewall to be connected. So the ideal is to setup cisco 3560g in between the firewall and connect them together. I have attached the diagram to make it clear.
In this case, if I assign different vlan for firewall 1, firewall 2 and load balancer. And do all (0.0.0.0) routing to load balancer. Will it work? Anyone can please enlighten me?
Are ISP1 and ISP2 different ISPs? Also, do you have public Provider Independent address space or Provider Assigned address space?
What is the default route on each Firewall? I'm assuming it is probably the Load Balancer. I'm not sure how your Load Balancer works, many copies make devices like that. Do you have a brand by any chance and or model number?
Sorry I didn't reply earlier, I've been pretty busy at work. The loadbalancer2.png looks good as far as getting traffic to the load balancer. Now obviosuly I don't know how this loadbalancer is suppose to receive LAN traffic, but as far as getting traffic to the load balancer it looks good in your specific situation of the load balancer only having three ports.
All outgoing traffic through ISP2 should not be a problem, but you have all incoming traffic coming to ISP1. How are you doing this part? Are all your "services" on ISP1 IPs? If so then that should work perfectly fine, as long as your not statically NATng these to ISP2 this should be fine as well.
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...