Solved

Floating IP addresses on two network cards in Digitsl UNIX

Posted on 1998-10-12
3
328 Views
Last Modified: 2013-12-23
Is there a software which can provide me the redundancy of maintaining two n/w cards with different ip addresses and in case one goes down second is automatically taken up.
0
Comment
Question by:Akanwar
3 Comments
 
LVL 1

Expert Comment

by:vulkanr
ID: 1582424
which UNIX ?
i know AIX has IBM's HACMP which among other things handle IP takeover.
0
 

Expert Comment

by:ydsh
ID: 1582425
I know that a kind of Solaris firewall software provides
such a capability as you have described.
In Solaris command prompt, type "ifconfig le0", then you
can got two IP address if you have installed that software
into your SUN workstation.

0
 
LVL 5

Accepted Solution

by:
tfabian earned 50 total points
ID: 1582426
any unix system, for that matter, any operating system, can support two network cards with different addresses.. you simply need to install them, and configure them..

if you put them both on the same network, depending on how you setup your routing tables, they'll use the cards the order specified by the routing commands..   with appropriate routing software, you can probably define least cost pathes, redundant pathes, and all sorts of other things...

I would check out software from vendors like CISCO.. they specilize in routers and routing software...


good luck

0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
svg file 10 82
Identify bottom to remote server 2 30
Tools to detect weak WiFi routers prior connecting to it 14 101
access vs trunk with voice vlan 2 15
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now