Solved

IP confict between to machines in the same cluster

Posted on 2006-07-14
3
283 Views
Last Modified: 2013-11-15
I have two machines in a cluster.  There is a unique IP set for each machine for the front end and backend networks.  There is a frount end IP set for the cluster itself.  It is this cluster IP that the primary machine has been reporting that there is an IP confilct with a machine with the mac address of the secondary machine in the cluster.  This cluster ip should only be used by the primary machine in the cluster.  Why do we continually get these IP confilct messages?  There have been a couple of instances where both machines have gone down at the same time.

Thanks so much for you assistance.
0
Comment
Question by:susanrae
  • 2
3 Comments
 
LVL 87

Accepted Solution

by:
rindi earned 500 total points
Comment Utility
Check that the switches the NIX are connected to are set to the same values as the NIC's themselves. If the NIC is set to the speed "Auto" and Duplex "Auto", so should the switch be set to auto. If The NIC is set to 100/Full Duplex, so should the values in the switch be set. If they don't correspond you often get IP conflicts.
0
 

Author Comment

by:susanrae
Comment Utility
Rindi,

Thanks, that did the trick.

Susan
0
 
LVL 87

Expert Comment

by:rindi
Comment Utility
your welcome
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now