?
Solved

Floating IP addresses on two network cards in Digitsl UNIX

Posted on 1998-10-12
3
Medium Priority
?
339 Views
Last Modified: 2013-12-23
Is there a software which can provide me the redundancy of maintaining two n/w cards with different ip addresses and in case one goes down second is automatically taken up.
0
Comment
Question by:Akanwar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Expert Comment

by:vulkanr
ID: 1582424
which UNIX ?
i know AIX has IBM's HACMP which among other things handle IP takeover.
0
 

Expert Comment

by:ydsh
ID: 1582425
I know that a kind of Solaris firewall software provides
such a capability as you have described.
In Solaris command prompt, type "ifconfig le0", then you
can got two IP address if you have installed that software
into your SUN workstation.

0
 
LVL 5

Accepted Solution

by:
tfabian earned 100 total points
ID: 1582426
any unix system, for that matter, any operating system, can support two network cards with different addresses.. you simply need to install them, and configure them..

if you put them both on the same network, depending on how you setup your routing tables, they'll use the cards the order specified by the routing commands..   with appropriate routing software, you can probably define least cost pathes, redundant pathes, and all sorts of other things...

I would check out software from vendors like CISCO.. they specilize in routers and routing software...


good luck

0

Featured Post

Are You Using the Best Web Development Editor?

The worlds of web hosting and web development are constantly evolving. Every year we see design trends change, coding standards adapt and new frameworks/CMS created. With such a quick pace of change it’s easy to get lost trying to keep up.

See if your editor made the list.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question