Strictly speaking, FIrewalls are not designed to do load balancing... they are not supposed to. Firewall's are pretty good at forwarding traffic they receive but load balancing is another ball game. What you could do is to have a design where both the firewalls are connected to a router on the inside and it is this router that does the load balancing, handing over the traffic to one of the two PIXs as required.
Firewalls load balance just fine as long as active sessions are always sent back to the same firewall, much like when dealing with SSL sessions in web farms.
First ask yourself why are you doing the load balancing. If it's for redundancy, the you don't really need load balancing and the Pixs stateful failover works great already on its own.
If you would like to move more traffic than either firewall in the pair could handle on its own, then you don't have redundancy anymore because if one fails the single firewall cannot handle the full load.
Having said that, you can do firewall load balancing with some versions of the IOS. The feature is called SLB and can handle firewall clusters in the Cat6ks and some of the 7000 series routers. Or you can use a dedicated load balancer like a Cisco CSS.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...