Hello Jean Paul,
As you've already received a lot of replies I suggest you stick to the
truth and accept that obviously it doesn't work with two NIC and kernel
2.2.x. Although one method to be able to use two NIC's it to blackhole the
[root@guinness root]# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:04:76:cd:36:70 brd ff:ff:ff:ff:ff:ff
inet 192.168.17.10/27 brd 192.168.17.31 scope global eth0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:a0:24:4e:df:19 brd ff:ff:ff:ff:ff:ff
inet 192.168.17.30/27 brd 192.168.17.31 scope global eth1
Well the VIP should be /32. And you can blackhole the VIP with:
ip rule add pref 100 from VIP/32 table 100
ip route add table 100 blackhole VIP/32
This stops the arp probes. But I suggest you patch your kernel like
every other "normal" person on this list does too. Sorry for the
confusion I made. It's the easiest way, especially if you're not
familiar with the iproute2 concept.
E la prima volta, non ti affochiamo! Salve,
;) Do you mean E' la prima volta.... ?
Definitivamente, ma gli italiani non si preoccupano di queste cose.
Grazie per l'aiuto...
Prego,
Roberto Nibali, ratz
|