A little more background here. I have two sites, one is remote from me (Site A) and the other site is local to me (Site B). Both sites are connected via a private link. Both sites are also currently connected to the internet through the same service provider (ISP-1). Through that service provider, we have 2 connections at each site that are terminated at different POPs within that service provider. Right now, we are only using one of those links at each site Link-1 at Site A and Link-3 at Site B. Our service provider has given us a /26 for use at Site-A and a /27 for use at Site-B. Both ranges are currently routed via static routes. My plan is to configure BGP at both sites with ISP-1 so that our /26 and /27 is usable over both links in each site, and across sites for site resiliency.
For ISP resiliency at Site B, we are getting a new internet connection installed from another ISP (Link-5). Because we don't own our NAT ranges and none of them are /24's, we won't be able to advertise any of the ranges we currently have across ISP's and so we will be getting a new /27 from ISP-2. In the event of an outage at ISP-1, we would switch to ISP-2 and update DNS to use the /27 from ISP-2. I was looking at using ISP Redundancy to manage the NAT changes, but ISP Redundancy can't be used with Advanced Routing/Networking which I will likely be using to enable BGP with ISP-1. My thought was to install a second firewall at Site B to support Link-5 and just update internal routing to point to that firewall in the event of ISP-1 failing.
As I had asked in the OP, what is wrong with taking that approach? Is there a problem with duplicating the configuration, NAT rules, subnets, etc. to support another firewall and service provider to protect the same resources? Maybe there is a better way to go about this that I might be missing?