Datacenter - Dual ISP VMware Multi-VLAN
About This Architecture
Dual-ISP datacenter architecture with active-active Sophos firewall failover, VMware ESXi virtualization, and multi-VLAN segmentation across VLAN 10 (servers) and VLAN 20 (services). Traffic from Wateen and Orignet ISPs terminates at the Sophos Firewall VM, which distributes to a core switch trunk connecting access switches, domain controllers, and specialized workloads including IPBX, Koha Library, and ManageEngine ServiceDesk. This design eliminates single points of failure at the WAN edge while maintaining network segmentation for security and performance isolation. Fork and customize this diagram to model your own multi-ISP failover topology, adjust VLAN ranges, or add additional service tiers. The architecture demonstrates enterprise-grade redundancy suitable for mission-critical on-premises deployments requiring high availability and granular traffic control.
People also ask
How do I design a datacenter with dual ISP failover and active-active firewall redundancy using VMware and VLAN segmentation?
This diagram shows a resilient datacenter where Wateen and Orignet ISPs connect to an active-active Sophos Firewall VM, eliminating WAN single points of failure. Traffic flows through a core switch trunk to access switches serving VLAN 10 (servers: DC3, IPBX, Attendance, Koha, AI VM) and VLAN 20 (services: ManageEngine ServiceDesk), with redundant domain controllers and centralized monitoring ensu
- Domain:
- Networking
- Audience:
- Network architects and datacenter administrators designing resilient on-premises infrastructure
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.