Virtual IP address on Win2003 Network Load Balancing (NLB) not available across VLANs/switch

Posted on 2006-06-05
Last Modified: 2013-11-15
Dear Experts,

We have just installed 2 new servers -serverA and serverB.  They are both running Win2003 Server standard with all latest patches etc.  We have installed the NLB component and configured as per MS's online documentation.  The aim is that they will recieve http requests from internal and external clients.  The servers are located on a subnet defined as a separate VLAN on our stacked Cisco 3750s.  All servers are located on the same VLAN.  All workstations are located on a separate VLAN/subnet on the same stacked 4 x 3750s.

The problem is that the virtual IP address of the NLB "cluster" is not contactable from any other VLANs.  Within the server VLAN, it is possible to connect to the virtual IP and access the web page hosted on the boxes.  No clients on the workstation VLAN (or any other location) can access the NLB cluster address and it is not pingable either.  It is as if the switch is not aware of the virtual address.

We have a little networking knowledge but not enough it seems.  We logged onto the switches and did "show arp" command and saw the address was not listed.  Do we need to add a static ARP address perhaps?  I should add that we already have a separate "true" MS Cluster running on the server VLAN, with which we had no problem with.

Any ideas would be great - thanks!
Question by:britishstoat
    LVL 82

    Accepted Solution

    You're running the NLB cluster in multicast mode; in this case, you'll indeed have to create static ARP entries to access the clustered IP address from another subnet.
    Other than that, if you have two NICs in each machine, you can run the cluster in unicast mode without losing inter-cluster communication.

    Network Load Balancing Frequently Asked Questions

    Network Load Balancing: Configuration Best Practices for Windows 2000 and Windows Server 2003

    Author Comment

    Perfect!  thanks a lot!

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
    Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
    This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
    This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now