kernel netfilterinput hooks, and its cluster function relies on the cluster server rules defined by IPVSADM;Support a number of services based on TCP, UDP, SCTP, AH, EST, Ah_est and other protocols;4. Design-time essentials in a load-balanced cluster:(1) Session holdSession sticky (Iphash): IP address binding, source IP record in IP hash table for unified schedulingSession cluster (MULTICAST/BROADCAST/UNICAST): Broadcast cluster synchronization (replication) session, only for small-scale scenar
This article describes the basic working principles of routers in TCP/IP networks, introduces several functions of IP routers, and provides Static Routing and dynamic routing protocols, as well as the concept of the internal gateway protocol and the external gateway protocol, and briefly introduces the most common RIP, OSPF, BGP and BGP-4 routing protocols, then, it describes the design objectives and types of routing algorithms, and focuses on the li
between the named ACL and the numbered ACL: The named ACL has a logical name, which can delete a single row in the named ACL.
Ip access-list extended Example-Named-ACL
Deny tcp any eq echo
Deny tcp any eq 37
Permit udp host 172.16.10.2 any eq snmp
Permit tcp any
Chapter 4 troubleshooting of TCP/IP Routing Protocol
1. Default Gateway
If the destination address of the package is not in the router routing table, if the router is configured with the default gateway, it will be forwarded to the defa
Tags: store form home dba no col cpp func RIP 0X7FFFFFFFDB58:0X004005BA 0x000000000x00000000 0x00000000 0x7fffffffdb68:0x00000000 0x0000001a 0x00000000 0x00000000 0x4005d8, is the return address of the function Funca, and then upward is gradually a variety of local variables /c1> 0x7fffffffdb78: 0x004005d8 0x00000000 0x00400470 0x000000000x7fffffffdb88:0xffffdd90 0x00000019 0x00000000 0x00000000 0x7fffffffdb98: 0x0040060d 0x00000000 0x00000000 0x0
serverCIP: Client IP, request sender IP AddressVIP: Virtual server IP, Client access addressDIP: Scheduler IPRIP: IP for real servers1. LVS FoundationLVS is based on sockets (Ip:port) for data distribution. LVS, according to the target socket, dispatches the data message to the back-end Real Server (RS), when dispatched, through different algorithms to dispatch the response of the server.Schedule rule chain used by LVS: INPUTThe rules of iptables and LVS cannot be used at the same time, at leas
Let's see where we're going to use the bidirectional redistribution of routes.
Scene One: The company has 2 technical directors, respectively, management Headquarters and division, the level is similar, director a thinks my side of the router performance is poor, with RIP protocol is enough to use. The head of headquarters thinks that OSPF is better than OSPF. Because of disagreements that led to the division using
. The following describes the RIP and OSPF protocols.
Routing Information Protocol (RIP) is an Internal Gateway Protocol (IGP). It is mainly used in medium-scale networks. The RIP protocol uses the Distance Vector Algorithm and includes the route information to reach the destination IP vector) ), the path with the minimum number of hops is the optimal path.
The m
layer does not perform any correction and restoration work.
Common network-layer protocols include IP, IPX, and APPLETALK. IP is the cornerstone of Internet. In the TCP/IP protocol system, other third-level auxiliary protocols include ARP Address Resolution, RARP Reverse Address Resolution, ICMP internet packet control, and IGMP group management protocols. Because all network interconnection devices have the path selection function, we often discuss the RIP
This article describes the basic working principles of routers in TCP/IP networks and introduces several functions of IP routers, the static and dynamic routing protocols, as well as the concepts of the internal gateway protocol and the external gateway protocol are given, at the same time, the most common RIP, OSPF, BGP and BGP-4 routing protocols are briefly introduced, and then the design objectives and types of routing algorithms are described, th
include IP, IPX, and appletalk. IP is the cornerstone of Internet. In the TCP/IP protocol system, other third-level auxiliary protocols include ARP (Address Resolution), RARP (Reverse Address Resolution), and ICMP (internet packet control) and IGMP (Group Management Protocol. Because all network interconnection devices have the path selection function, we often discuss the rip, OSPF, and other routing protocols at this layer.
Exchange
When talking a
LVS Nat Model Creation
I. Nat model topology of LVS
When a client requests a message, director is used to change the target IP address for forwarding. (When directed ctor, the target IP address is changed from VIP to rip, but when the request message is sent from Director, it is still sent from the interface of the NIC where the dip is located .)
Packet Flow Direction: 1-> 2-> 3
The source address of 1 is CIP, and the target address is ctor's VIP.
The
routing Protocol used within an autonomous system. (RIP, OSPF)• External Gateway Protocol EGP (External Gateway Protocol ). The routing protocol used between autonomous systems. BGP-4)• Working Principle• RIP is a distributed routing selection protocol based on distance vectors.• The RIP Protocol requires that every vro in the network maintain a distance record
MLD Status and configuration informationMSDP MSDP Status and configuration informationMulticast multicast configurationNAT address Translation status and configuration informationNQA Display NQA InformationNtp-service NTP Network Time serviceOAP operation of Open application platformOSPF OSPF routing protocolPim PIM status and configuration informationPKI PKI InformationPolicy-based-route Status and configuration information for Policy RoutingPort Display Ports InformationPort-isolate Isolation
inaccessible. Every 30 seconds, the distance vector routing protocol sends the entire route selection table to the adjacent site to update the route selection table of the adjacent site. In this way, it can collect a list of networks from other sites (directly connected or connected in other ways) for route selection. Distance Vector Routing uses the number of hops as the metric value to calculate the number of routers that need to pass to the destination.
For example, r I p uses the B e l m a
/30 networks is set to 192.1.0.65. Because the Serial 0 address on Router1 is 192.200.10.5 and 192.200.10.4/30 belong to a directly connected network, there is a path to access 192.200.10.4/30, so you do not need to add a static route on router1.
Router1: ip route 192.1.0.64 255.255.255.192 192.200.10.6 Router3: ip route 192.1.0.128 255.255.255.192 192.1.0.65 ip route 192.200.10.4 255.255.255.252 192.1.0.65
At the same time, because Router3 is no longer connected to other route
6th. TCP/IP routing protocol fault handlingFirst, the default gatewayWhen the destination address of the package is not in the router's routing table, such as when the router is configured with a default gateway, it is forwarded to the default gateway or discarded.show IP route; View the default gateway for Cisco routersSecond, static and dynamic routingThird, processing k_protocal/04937.htm "target=" _blank ">rip faultRIP is the distance vector routi
relatively complicated. To determine the optimal route, the routing algorithm must start and maintain the route table containing route information. The routing information varies depending on the routing algorithm used.
The routing algorithm fills in different information collected in the routing table, and tells the router about the relationship between the destination network and the next stop (nexthop) according to the route table. The router interconnection information is updated, and the r
nodes, that is, as the client Access portal, is also the client's access to the node to respond to the exit, the network address as the entire cluster VIP address, the intranet address and the backend server real Server on the same physical network, Real server must use a private IP address.Packet Flow Analysis
The user sends the request to the Director Server, the requested data message (the source IP is CIP, the destination IP is the VIP) reaches the kernel space.
Kernel space to
be directly attached to download.
Director first script:
Cat/etc/init.d/director #!/bin/sh # LVS script for VS/DR # chkconfig:345 # Description:lvs DR # # Processname:director #.
/etc/rc.d/init.d/functions vip=192.168.88.120 rip1=192.168.88.129 rip2=192.168.88.134 PORT=80 # case ' in start '/sbin/ifconfig eth1:1 $VIP broadcast $VIP netmask 255.255.255.255 UP/SBI N/route add-host $VIP Dev eth1:1 # Since This is the Director we must do able to forward packets echo 1 >
/proc/sys/net
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.