Sponsored Content
Special Forums IP Networking bonding without switch link aggregation Post 302324381 by stdout on Wednesday 10th of June 2009 02:54:50 PM
Old 06-10-2009
hey, thanks for the link Smilie

btw,
i'm not too sure about your setup, but i'm thinking like this - so please do CMIIW :
Code:
machine1 ====== sw0 ------- machine2
                   ------- machine3

or, perhaps like this?
Code:
machine1 ===== sw0 ===== machine2

 

10 More Discussions You Might Find Interesting

1. Solaris

Link Aggregation

Hi there I have a requirement to provide failover to our customer boxes in case of interface / switch failure, I have been looking at Solaris Link Aggregation with LACP and I wanted to ask a question Ive seen multiple websites that say the following Does this also mean that if the... (2 Replies)
Discussion started by: hcclnoodles
2 Replies

2. UNIX for Advanced & Expert Users

Link Aggregation and LACP

Hi there I have a requirement to provide failover to our customer boxes in case of interface / switch failure, I have been looking at Solaris Link Aggregation with LACP and I wanted to ask a question Ive seen multiple websites that say the following Does this also mean that if the... (1 Reply)
Discussion started by: hcclnoodles
1 Replies

3. IP Networking

bonding lacp and link aggregation

Hello, I am trying to get clarity on a few things and am looking for some info. In every article I have read about link aggregation and lacp, it can be used combine physical links to create 1 logical link for increased bandwidth. But what it doesn't say is if this is limited by source/dst. ... (1 Reply)
Discussion started by: jaredo
1 Replies

4. HP-UX

Link Aggregation HPUX

Hi, Hoping someone can offer some advice on something i have not dealt with before. We have a server that seems to have some very strange configuration done on it. It has 2 physical NIC's and rather than both be aggregated into LAN900 we have 1 in LAN900 and 1 in LAN901? (See Below)... (2 Replies)
Discussion started by: Andyp2704
2 Replies

5. Solaris

Link aggregation

Me again :) I'm trying to find a page describing the L2, L3 und L4 modes of dladm. It's nice to read "hashed by ip header", but how should I use that? On the file-server it's ok to have the six interfaces serving six clients each on it's own. But an rsync connection via switch between two... (8 Replies)
Discussion started by: PatrickBaer
8 Replies

6. IP Networking

Interface bonding / Link aggregation (Multiple)

Hello, I've been using mode 4 with four slaves, however looking at ifconfig showed that the traffic was not balanced correctly between the interfaces, the outgoing traffic has been alot higher on the last slave. Example: eth0 RX 123.2 GiB TX 22.5 GiB eth1 RX 84.8 GiB TX 8.3 GiB eth2... (3 Replies)
Discussion started by: TehOne
3 Replies

7. HP-UX

Break Link Aggregation in HP UX.

Hi, I want to Break the Link Aggregation. My aggregation are lan0+lan1 = lan900. Now I want to break this and put the IP in lan0. But i have cluster environment and this is the main database server. So It need to change in cluster script. But I dont know where I have to change it. Please... (1 Reply)
Discussion started by: mkiron
1 Replies

8. Solaris

Link Aggregation without LACP

Hi, I'm not from the Solaris world and some of these things are new to me. Can someone tell me if it is possible to configure link aggregation without using LACP? I am told etherchannel was setup without LACP. (3 Replies)
Discussion started by: techy1
3 Replies

9. IP Networking

Link Aggregation

Hi ihave three link of internet and iwant to put one linux front of a firewall that this three linux speard firewall such az load balance and fialover but dont close any port and protocol and only firewall have been internet what way can i use for it ? are there any script and services do that... (0 Replies)
Discussion started by: mnnn
0 Replies

10. UNIX for Advanced & Expert Users

Bonding IEEE 802.3ad Dynamic link aggregation : Bond showing less than desired throughput

Hi All, I have done IEEE 802.3ad Dynamic link aggregation bond configuration with name bond0 which has 4 slaves (each 25GB/s) in it on cent os 6.8. Issue i am facing is bonding throughput is only 50GB/s not 100GB/s. below are the configuration files : DEVICE=bond0 IPADDR=xx.xx.xx.xx... (1 Reply)
Discussion started by: omkar.jadhav
1 Replies
rhosts(5)							File Formats Manual							 rhosts(5)

Name
       rhosts - list of hosts that are logically equivalent to the local host

Syntax
       /$HOME/.rhosts

Description
       The  file  allows  a  user  who has an account on the local host to log in from a remote host without supplying a password.  It also allows
       remote copies to the local host.

       If the file exists, it is located in a user's home directory.  It is not a mandatory file, however.

       The format of a file entry is:
       hostname [username]
       The hostname is the name of the remote host from which the user wants to log into the local host.  The username is the user's login name on
       the remote host.  If you do not specify a user name, the user must have the same login name on both the remote and local hosts.

       The  host  names  listed in the file may optionally contain the local BIND domain name.	For more information on BIND, see the Guide to the
       BIND/Hesiod Service.

       If a user is logged in to and wants to log in to a host called without supplying a password, she must:

       o    Have an account on

       o    Create a file in her home directory on

       o    Specify host1 ginger as an entry in the file.
	    If has the same login on both and she can simply specify host1 in her entry.  You can allow the superuser of a remote system to log in
	    to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
	    mended.
	    In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system.   The
	    secure entry looks similar to the following:
	    ttyp3      none    network	       secure
	    See the reference page for more information.

Examples
       The  following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
       name on and is the same as on but her login on is

       To enable to log in to from and without supplying a password, her on should contain the following entries:
       machine1
       system1	gordon
       host3

See Also
       hosts.equiv(5), ttys(5)
       Introduction to Networking and Distributed System Services

																	 rhosts(5)
All times are GMT -4. The time now is 09:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy