|
You
shouldn't need any additional hardware. As long as you have enough free
addresses on your server (DMZ) network to assign an additional address to each
firewall for each server on that network, you'll be fine (i.e. you'll need three
DMZ addresses per server).
For
example, say your server is 10.10.10.2. You could proxy ARP
10.10.10.102 to FWA and 10.10.10.202 to FWB. Then, just make the NAT rule
on each firewall NAT both the source and destination of inbound requests
accordingly. In this example, the NAT rule on FWA would be as
follows:
Original:
-Source: Any
-Destination: 143.x.x. 20
-Service: Any
Translated packet:
-Source: 10.10.10.102 (hide)
-Destination: 10.10.10.2
-Service: Original
See
also http://www.phoneboy.com/faq/0322.html for
his description of this resolution.
Also
bear in mind that you'll need some sort of round-robin DNS (A or NS records) to
utilize both of these. Radware's Linkproof is ideal for this, but this
will work okay if budget doesn't allow for a device like
Linkproof.
HTH
Dan Hitchcock
|
- [FW1] Packet lost somewhere , Pls help. Daniel Hitchcock
