Specifications

8 Barracuda Link Balancer Administrator’s Guide
In Front of Firewall
Figure 2.1 gives an example of a customer network that has both client and server traffic.
Figure 2.1: Deployment Example - before Barracuda Link Balancer
Figure 2.2 shows the same network with a Barracuda Link Balancer that was installed with no
changes to the configuration of the existing firewall. A new WAN link has been added.
In this network:
The Barracuda Link Balancer has a static IP address on WAN1 that is on the same network as
the firewall and the externally visible servers.
The clients are on a different subnet than all WAN links.
The external IP address and gateway of the firewall remain the same.
The gateway IP addresses of the Barracuda Link Balancer and the firewall are provided by the
ISPs. The gateway of the LAN devices is provided by the firewall.
WAN Link If you are enabling inbound access to resources
behind the Barracuda Link Balancer, such as a
Web server, at least one WAN link must have a
static IP address.
The Barracuda Link Balancer may use the same
IP address that had been used by your firewall.
Site to Site VPN If you already have a site to site VPN it should be
terminated on your existing firewall. VPN traffic
has one source IP address so it goes out on only
one WAN link. It is recognized as VPN traffic so it
will not be NAT’d by the Barracuda Link Balancer.
No failover or failback is available.
Alternatively, make the Barracuda Link Balancer
a VPN endpoint to achieve failover and failback
to and from a secondary link.
Failover and failback to and from a secondary
link.
Table 2.1: Deployment Modes
In Front of Firewall Replacing Your Firewall