IP别名的IPAT的接管测试

10.10.1.61      P61A_boot
10.10.1.62      P61B_boot      
12.0.0.61       P61A_priv      
12.0.0.62       P61B_priv      
10.10.3.101     svc_1           P61A   
10.10.3.102     svc_2           P61B
10.10.3.201     P61A_p
10.10.3.202     P61B_p 

测试前:
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.61 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.101 netmask 0xffffff00 broadcast 10.10.3.255    -- 持续IP
en1: flags=4e080863,80
        inet 10.10.1.61 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.201 netmask 0xffffff00 broadcast 10.10.3.255    --服务IP
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1
-bash-3.00# rsh P61B ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.62 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.202 netmask 0xffffff00 broadcast 10.10.3.255   --持续IP
en1: flags=4e080863,80
        inet 10.10.1.62 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255   --服务IP
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

测试1:宕掉P61B的en1
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.62 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.202 netmask 0xffffff00 broadcast 10.10.3.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255
en1: flags=4e080862,80
        inet 10.10.1.62 netmask 0xffffff00 broadcast 10.10.1.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

测试2:启动P61B的en1
-bash-3.00# ifconfig en1 up

服务IP依然驻留在en0上

测试3:宕掉P61B的en0,en1
-bash-3.00# ifconfig en1 down
-bash-3.00# ifconfig en0 down
P61A的IP
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.61 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.101 netmask 0xffffff00 broadcast 10.10.3.255
en1: flags=4e080863,80
        inet 10.10.1.61 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.201 netmask 0xffffff00 broadcast 10.10.3.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

服务IP102挂到了P61A的en1上面

测试4:我在把P61A的en1也宕掉
-bash-3.00# ifconfig en1 down
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.61 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.101 netmask 0xffffff00 broadcast 10.10.3.255
        inet 10.10.3.201 netmask 0xffffff00 broadcast 10.10.3.255
en1: flags=4e080862,80
        inet 10.10.1.61 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

持续IP可以跳到en0上,而服务IP102是无法跳过去的,102不可用

测试5:启动P61A的en1
-bash-3.00# ifconfig en1 up
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.61 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255
en1: flags=4e080863,80
        inet 10.10.1.61 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.201 netmask 0xffffff00 broadcast 10.10.3.255
        inet 10.10.3.101 netmask 0xffffff00 broadcast 10.10.3.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

en0和en1的IP对调了(出去本来的IP地址)

测试6:重启P61B,重启HACMP
-bash-3.00# ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.61 netmask 0xffffff00 broadcast 12.0.0.255
en1: flags=4e080863,80
        inet 10.10.1.61 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.201 netmask 0xffffff00 broadcast 10.10.3.255
        inet 10.10.3.101 netmask 0xffffff00 broadcast 10.10.3.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1
-bash-3.00# rsh P61B ifconfig -a
en0: flags=4e080863,80
        inet 12.0.0.62 netmask 0xffffff00 broadcast 12.0.0.255
        inet 10.10.3.202 netmask 0xffffff00 broadcast 10.10.3.255
en1: flags=4e080863,80
        inet 10.10.1.62 netmask 0xffffff00 broadcast 10.10.1.255
        inet 10.10.3.102 netmask 0xffffff00 broadcast 10.10.3.255
lo0: flags=e08084b
        inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255
        inet6 ::1/0
         tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1

IP已经切换回来了

 

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/8242091/viewspace-594577/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/8242091/viewspace-594577/

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值