版权声明:本文为博主原创文章,未经博主允许不得转载。 https://blog.csdn.net/evilparadise/article/details/79878485
#cat /proc/sys/net/ipv4/ip_forward
echo "0" >/proc/sys/net/ipv4/ip_forward
#echo 'setting icmp redirects (1 on, 0 off) '
echo "1" >/proc/sys/net/ipv4/conf/all/send_redirects
#cat /proc/sys/net/ipv4/conf/all/send_redirects
echo "1" >/proc/sys/net/ipv4/conf/default/send_redirects
#cat /proc/sys/net/ipv4/conf/default/send_redirects
#cat /proc/sys/net/ipv4/conf/ens33/send_redirects
echo "1" >/proc/sys/net/ipv4/conf/ens33/send_redirects
/sbin/ifconfig ens33 192.168.94.128 broadcast 192.168.94.255 netmask 255.255.255.0
/sbin/ifconfig ens33:0 192.168.94.11 broadcast 192.168.94.11 netmask 255.255.255.255
/sbin/route add -host 192.168.94.11 dev ens33:0
/sbin/ifconfig ens33:0#for show
/bin/ping -c 1 192.168.94.11#for show
/bin/netstat –rn#for show
/sbin/ipvsadm –c
/sbin/ipvsadm -A -t 192.168.94.11:80 -s rr
/sbin/ipvsadm -a -t 192.168.94.11:80 -r 192.168.94.129:80 -g -w 1
/sbin/ipvsadm -a -t 192.168.94.11:80 -r 192.168.94.130:80 -g -w 1
ping -c 1 192.168.94.129
ping -c 1 192.168.94.130
/sbin/ipvsadm
/sbin/ifconfig ens33 192.168.94.129 broadcast 192.168.94.255 netmask 255.255.255.0
/sbin/route add default gw 192.168.94.2
/bin/netstat –rn#
ping -c 1 192.168.94.2
echo "0" >/proc/sys/net/ipv4/ip_forward
#cat /proc/sys/net/ipv4/ip_forward
ping -c 1 192.168.94.128
ping -c 1 192.168.94.11
/sbin/ifconfig lo:0 192.168.94.11 broadcast 192.168.94.11 netmask 0xffffffff up
/sbin/ifconfig lo:0#
/sbin/route add -host 192.168.94.11 dev lo:0
/bin/netstat –rn#
echo "1" >/proc/sys/net/ipv4/conf/all/arp_ignore
echo "1" >/proc/sys/net/ipv4/conf/lo/arp_ignore
cat /proc/sys/net/ipv4/conf/lo/arp_ignore
cat /proc/sys/net/ipv4/conf/all/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/all/arp_announce
echo "2" > /proc/sys/net/ipv4/conf/lo/arp_announce
/sbin/ifconfig ens33 192.168.94.130 broadcast 192.168.94.255 netmask 255.255.255.0
/sbin/route add default gw 192.168.94.2
/bin/netstat –rn#
ping -c 1 192.168.94.2
echo "0" >/proc/sys/net/ipv4/ip_forward
#cat /proc/sys/net/ipv4/ip_forward
ping -c 1 192.168.94.128
ping -c 1 192.168.94.11
/sbin/ifconfig lo:0 192.168.94.11 broadcast 192.168.94.11 netmask 0xffffffff up
/sbin/ifconfig lo:0#
/sbin/route add -host 192.168.94.11 dev lo:0
/bin/netstat –rn#
echo "1" >/proc/sys/net/ipv4/conf/all/arp_ignore
echo "1" >/proc/sys/net/ipv4/conf/lo/arp_ignore
cat /proc/sys/net/ipv4/conf/lo/arp_ignore
cat /proc/sys/net/ipv4/conf/all/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/all/arp_announce
echo "2" > /proc/sys/net/ipv4/conf/lo/arp_announce
1安装http。。。。80口
yum install httpd-devel.x86_64
使能
systemctl start httpd
2防火墙允许80端口实现apache-HTTP访问
firewall-cmd --add-service=http
firewall-cmd --permanent --add-service=http
firewall-cmd --reload
3修改apache默认页面
echo '192.168.94.129 it is work!' > /usr/share/httpd/noindex/index.html
echo '192.168.94.130 it is work!' > /usr/share/httpd/noindex/index.html
4执行上面三个脚本
注释:LB:
ip:192.168.94.128
bro:192.168.94.255
gate:192.168.94.2
vip:192.168.94.11
real server1:
ip:192.168.94.129
bro:192.168.94.255
gate:192.168.94.2
real server2:
ip:192.168.94.130
bro:192.168.94.255
gate:192.168.94.2