--%>

Insert virtual IP addres to a server in Solaris

How will you insert a virtual IP address to a server in Solaris. Given the interface qe0 & IP 10.10.1.150

E

Expert

Verified

Syntax:

#ifconfig qe0:1 plumb

# ifconfig qe0:1 10.10.1.150 up

where "qe0" is an interface (for example: le0) and N refer to a number between 1 and <MAX>. Removing the pseudo interface and related address is done along with "ifconfig qe0:1 10.10.1.150 down".

As along with physical interfaces, all you have to do is make the appropriate /etc/hostname.qe0:X file.

   Related Questions in Science

  • Q : Difference between program & operating

    Difference between program & operating system process: The process may be called the active state of a program. It also gives the status of given task mentioned in that particular program, it provides the info

  • Q : Linux file defaults permition Normal 0

    Normal 0 false false

  • Q : OpenBSD Normal 0 false false false

    Normal 0 false false

  • Q : To make the Service group constant

    Normal 0 false false

  • Q : Temporal Properties-Software Lifecycle

    Temporal Properties: Properties that hold for a state in isolation are called state properties. Temporal (or path) properties relate state properties of distinct states in the state space to each other. Such properties are also referred to as dynamic

  • Q : What are pioneer species What do you

    What do you understand by pioneer species? Explain role of these species.

  • Q : State Programs as Models Programs as

    Programs as Models  Program model checkers simply model check programs directly. They often adopt a modeling notation which is—or is close to—some popular implementation language such as C or Java (Visser et al. 2003; Stoller 2000; Mu

  • Q : Benefits of commensalism to species

    Explain the benefits commensalism offer to the species.

  • Q : Explain Program Model Checking Program

    Program model checking refers to the application of model-checking techniques to software systems, and in particular to the final implementation where the code itself is the target of the analysis (Figure shown below). It can be effective at uncoverin

  • Q : How to Identify Potential H/w and S/w

    Identify 1 potential Hardware and 1 Potential Software weaknesses from the Aircraft Solutions Company scenario below. Choose the most serious weakness in both cases. To define the asset or policy with sufficient detail to justify your assessment, your assessment must include: <