Solved

Add routes  in AIX

Posted on 2012-03-16
3
370 Views
Last Modified: 2012-03-16
My netstat -rn command is missing the following routes

10.10.208/20       10.20.212.5       UG        0       108 en5      -      -
10.20.5/24         10.20.212.5       UG        0         0 en5      -      -
10.20.208/20       10.20.212.5       UG       19  80062293 en5      -      -
10.20.212.0        10.20.213.99      UHSb      0         0 en5      -      -   =>
10.20.212/23       10.20.213.99      U       185 116521684 en5      -      -


How do I add the routes ...????
0
Comment
Question by:mnis2008
  • 2
3 Comments
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 37731525
I think  you mean adding a route which will last across reboots?

The easiest way is certainly

"smitty mkroute"

Fill in the required values for

Destination TYPE  (net in your case)
DESTINATION Address (10.10.208 in your first example)
Default GATEWAY Address (10.20.212.5)
Network MASK (255.255.240.0)

Or use the

chdev -l inet0 -a route=...

command.

wmp
0
 

Author Comment

by:mnis2008
ID: 37731546
how did we know that the network mask is 255.255.240.0 , I am more interested in knowing where did 240 came from..Can you please explain
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 37731579
Your mask  in CIDR notation is /20.

This is the replacement notation for the traditional decimal notation and simply means the number of significant bits (i.e. bits from the left to the right).

So in order to transform "20" to the 4-byte decimal notation we have

20 bits = 8 bits + 8 bits + 4 bits + 0 bits, which is binary
11111111 11111111 11110000 00000000

or hex
FF FF F0 00

or decimal, written in 4 blocks
255 (128+64+32+16+8+4+2+1)
255 (128+64+32+16+8+4+2+1)
240 (128+64+32+16+0+0+0+0)
    0 (0+0+0+0+0+0+0)

This is RFC 1878, a "memo" RFC issued for clarification purposes:

http://www.ietf.org/rfc/rfc1878.txt

wmp
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ftpcommand 2 56
What are recommended OS for exim mail server? 10 101
What is the meaning of mount pont? with respect to windows file server. 7 57
UNIX SCP 5 67
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now