[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

how can I identify a multicast mac address associated with the vip of Windows network load balancer cluster?

Posted on 2015-02-03
2
Medium Priority
?
205 Views
Last Modified: 2015-02-03
Is there a powershell cmdlet of from GUI to identify multicast mac address associated with the VIP of Windows network load balancer?

I have a windows network load balancer 2008 both nodes are 2008 R2, and multicast.

Each VM has one ip and the VIP associated is the one where I need to get the multicast mac address
0
Comment
Question by:Jerry Seinfield
  • 2
2 Comments
 
LVL 13

Assisted Solution

by:Bryant Schaper
Bryant Schaper earned 2000 total points
ID: 40587444
I don't have any load balancing up at the moment, but can you ping it and see the arp entry? arp -a
0
 
LVL 13

Accepted Solution

by:
Bryant Schaper earned 2000 total points
ID: 40587451
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question