关于 lvs/tun 再实际部署中的问题
这两天再部署 lvs-tun 遇到一个问题, 经多番 百度 google 无果,无奈之下跑来向基地请求帮助. (话说我再内网做测试的时候是完全没有问题的,不同网段也没问题!!)
还请为小弟解惑..
问题描述:
客户端请求发送到 lvs-tun load balance server , ( 正常 )
lvs-tun load balance server 讲请求调度到 Realserver, (正常)
Realserver 不做回应. (不正常)
lvs-tun load balance server:
VIP: 98.126.175.x1 (eth0:0)
IP: 98.126.175.x2 (eth0)
ifconfig eth0:0 $VIP netmask 255.255.255.255 broadcast $VIP up
route add -host $VIP dev eth0:0
ipvsadm -A -t 98.126.172.x1 -s rr
ipvsadm -a -t 98.126.172.x1 -r 124.115.16.x -i
RealServer (linux)
IP: 124.115.16.x (eth0)
Tunl0: 98.126.175.x1 (tunl0)
ifconfig tunl0 $VIP netmask 255.255.255.255 broadcast $VIP up
route add -host $VIP dev tunl0
echo "1" > /proc/sys/net/ipv4/conf/all/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/all/arp_annouse
echo "1" > /proc/sys/net/ipv4/conf/tunl0/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/tunl0/arp_annouse
echo "0" > /proc/sys/net/ipv4/conf/tunl0/rp_filter
根据追踪观察所获信息:
lvs-tun load balance server:
[root@customer ~]# ifconfig
eth0:0 Link encap:Ethernet HWaddr 38:60:xx:or:EF:F8
inet addr:98.126.175.x1 Bcast:98.126.175.x1 Mask:255.255.255.255
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Interrupt:58 Base address:0xc000
[root@customer ~]# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
CUSTOMER.VPLS.N * 255.255.255.255 UH 0 0 0 eth0
98.126.175.136 * 255.255.255.248 U 0 0 0 eth0
169.254.0.0 * 255.255.0.0 U 0 0 0 eth0
default CUSTOMER.vpls.n 0.0.0.0 UG 0 0 0 eth0
[root@customer ~]# ipvsadm -l
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP CUSTOMER.VPLS.NET:http rr
-> 124.115.16.x:http Tunnel 1 0 3
RealServer:
[root@886 ~]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:1A:A0:10:C2:D6
inet addr:124.115.15.x Bcast:10.255.255.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1871668746 errors:0 dropped:0 overruns:0 frame:0
TX packets:168759354 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3430641193 (3.1 GiB) TX bytes:2968437672 (2.7 GiB)
Interrupt:169 Memory:f8000000-f8012100
tunl0 Link encap:IPIP Tunnel HWaddr
inet addr:98.126.175.x1 Mask:255.255.255.255
UP RUNNING NOARP MTU:1480 Metric:1
RX packets:1293 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:73836 (72.1 KiB) TX bytes:0 (0.0 b)
[root@886 ~]# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
CUSTOMER.vpls.n * 255.255.255.255 UH 0 0 0 tunl0
124.115.15.0 * 255.255.255.0 U 0 0 0 eth0
default 124.115.15.1 0.0.0.0 UG 0 0 0 eth0
请注意: 223.199.183.60 是我的adsl拨号的IP.
################################################################################################################
[root@886 lvs-tunneling]# tcpdump -i tunl0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tunl0, link-type RAW (Raw IP), capture size 96 bytes
12:11:49.101447 IP 223.199.183.60.chimera-hwm > CUSTOMER.vpls.net.http: S 673114586:673114586(0) win 16384
12:11:49.104111 IP 223.199.183.60.samsung-unidex > CUSTOMER.vpls.net.http: S 2602840284:2602840284(0) win 16384
12:11:49.350971 IP 223.199.183.60.4011 > CUSTOMER.vpls.net.http: S 2218501608:2218501608(0) win 16384
12:11:51.917436 IP 223.199.183.60.chimera-hwm > CUSTOMER.vpls.net.http: S 673114586:673114586(0) win 16384
[root@web186 lvs-tunneling]# tcpdump dst host 223.199.183.60
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
12:16:06.494391 IP CUSTOMER.vpls.net.http > 223.199.183.60.ctp-state: S 3674138755:3674138755(0) ack 616657295 win 5840
12:16:06.894327 IP CUSTOMER.vpls.net.http > 223.199.183.60.4048: S 3672239317:3672239317(0) ack 2933306975 win 5840
12:16:07.494235 IP CUSTOMER.vpls.net.http > 223.199.183.60.wafs: S 3672538146:3672538146(0) ack 544536033 win 5840
professionalzt
周四, 2012-05-31 10:11
Permalink
lvs load balance server:
lvs load balance server: 98.126.143.148 (CUSTOMER.VPLS.net)
VIP: 98.126.143.139 (CUSTOMER.vpls.net)
realServer: 124.115.15.x
tunl0: 98.126.143.139(CUSTOMER.vpls.net)
------------------------------------------------------------------
客户端: 124.115.15.32(同一机房)
客户端: 223.199.183.60(在家里拨号的 adsl IP)
问题描述: 再同一机房内是访问VIP是可以正常调度到 RealServer , 并且可以呈现网页.
在家里拨号的 adsl IP 访问VIP 也是可以正常调度到 RealServer, 但是RealServer 没有将应该传送的数据 转发给 223.199.183.60
RealServer:
[root@886 ~]: tcpdump -i eth0
17:05:54.929842 IP CUSTOMER.vpls.net > www.abc.com: IP 124.115.15.32.ctp > CUSTOMER.vpls.net.http: . ack 584267668 win 65535 (ipip-proto-4)
17:05:54.930122 IP CUSTOMER.vpls.net > www.abc.com: IP 124.115.15.32.ctp > CUSTOMER.vpls.net.http: P 0:638(638) ack 1 win 65535 (ipip-proto-4)
17:05:54.930130 IP CUSTOMER.vpls.net.http > 124.115.15.32.ctp: . ack 638 win 7018
17:05:54.930534 IP CUSTOMER.vpls.net.http > 124.115.15.32.ctp: . 1:2921(2920) ack 638 win 7018
17:16:27.796883 IP CUSTOMER.vpls.net > www.abc.com: IP 124.115.15.32.mobrien-chat > CUSTOMER.vpls.net.http: . ack 1241609980 win 65535 (ipip-proto-4)
17:16:27.797766 IP CUSTOMER.vpls.net > www.abc.com: IP 124.115.15.32.mobrien-chat > CUSTOMER.vpls.net.http: P 0:367(367) ack 216 win 65320 (ipip-proto-4)
17:16:27.797989 IP CUSTOMER.vpls.net.http > 124.115.15.32.mobrien-chat: P 216:1099(883) ack 367 win 12864
17:16:27.801602 IP CUSTOMER.vpls.net > www.abc.com: IP 124.115.15.32.isis-bcast > CUSTOMER.vpls.net.http: . ack 1247810504 win 65535 (ipip-proto-4)
17:16:27.801610 IP CUSTOMER.vpls.net.http > 124.115.15.32.isis-bcast: . 4381:7301(2920) ack 0 win 7504
17:06:42.765607 IP CUSTOMER.vpls.net.http > 223.199.183.60.22489: S 628323739:628323739(0) ack 1220849766 win 5792
17:06:46.369898 IP CUSTOMER.vpls.net > www.abc.com: IP 223.199.183.60.22487 > CUSTOMER.vpls.net.http: S 2148697811:2148697811(0) win 16384 (ipip-proto-4)
17:06:46.369909 IP CUSTOMER.vpls.net.http > 223.199.183.60.22487: S 628909313:628909313(0) ack 2148697812 win 5792
17:06:46.373831 IP CUSTOMER.vpls.net > www.abc.com: IP 223.199.183.60.22488 > CUSTOMER.vpls.net.http: S 1519492879:1519492879(0) win 16384 (ipip-proto-4)
17:06:46.373840 IP CUSTOMER.vpls.net.http > 223.199.183.60.22488: S 620655801:620655801(0) ack 1519492880 win 5792
17:06:48.764688 IP CUSTOMER.vpls.net.http > 223.199.183.60.22489: S 628323739:628323739(0) ack 1220849766 win 5792
17:06:49.164626 IP CUSTOMER.vpls.net.http > 223.199.183.60.22487: S 628909313:628909313(0) ack 2148697812 win 5792
17:06:49.164630 IP CUSTOMER.vpls.net.http > 223.199.183.60.22488: S 620655801:620655801(0) ack 1519492880 win 5792
Anonymous (没有被验证)
周三, 2014-07-16 07:11
Permalink
LVS-TUN其实也不能用于
LVS-TUN其实也不能用于全部跨网环境。。。
real-server回应client请求包时,到了IDC的路由器上,其到看到VIP的mac是伪造(或其他什么原因?),IDC的路由器是不会转发这个封包!!
除非real-server和vip是同一个网段的!!
professionalzt
周五, 2012-06-01 13:55
Permalink
如果 lvs load balance server 以及 Realserver 都在国外(即便不同地区) 也可以正常成功的部署
lvs/tun success !
success !
VIP="72.20.xx.23" (在输出中显示 . 或者是 ..http)
RS="98.126.xx.140" (在输出中显示 CUSTOMER.vpls.net )
我家IP=”223.199.158.88“
1. lvs-master eth0 in
[root@kickstart lvs-tunneling]# tcpdump 'port 80 and src host 223.199.158.88' -vv
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
21:29:15.536052 IP (tos 0x0, ttl 51, id 968, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.28863 > ..http: S, cksum 0x252c (correct), 3056099749:3056099749(0) win 14600
21:29:15.545016 IP (tos 0x0, ttl 51, id 48607, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.28866 > ..http: S, cksum 0x2e29 (correct), 790355889:790355889(0) win 14600
21:29:15.547519 IP (tos 0x0, ttl 51, id 57373, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.28867 > ..http: S, cksum 0x80cb (correct), 968262259:968262259(0) win 14600
21:29:15.731655 IP (tos 0x0, ttl 51, id 969, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28863 > ..http: ., cksum 0x8bbb (correct), 3056099750:3056099750(0) ack 903333398 win 115
21:29:15.742397 IP (tos 0x0, ttl 51, id 970, offset 0, flags [DF], proto: TCP (6), length: 461) 223.199.158.88.28863 > ..http: P 0:409(409) ack 1 win 115
21:29:15.744647 IP (tos 0x0, ttl 51, id 48608, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28866 > ..http: ., cksum 0xfda1 (correct), 790355890:790355890(0) ack 901799219 win 115
21:29:15.746145 IP (tos 0x0, ttl 51, id 57374, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28867 > ..http: ., cksum 0x7e98 (correct), 968262260:968262260(0) ack 898182928 win 115
21:29:15.939275 IP (tos 0x0, ttl 51, id 971, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28863 > ..http: ., cksum 0x8751 (correct), 409:409(0) ack 299 win 123
21:29:15.941274 IP (tos 0x0, ttl 51, id 972, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28863 > ..http: F, cksum 0x874e (correct), 409:409(0) ack 300 win 123
21:29:15.958014 IP (tos 0x0, ttl 51, id 48609, offset 0, flags [DF], proto: TCP (6), length: 369) 223.199.158.88.28866 > ..http: P 0:317(317) ack 1 win 115
21:29:16.154893 IP (tos 0x0, ttl 51, id 48610, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28866 > ..http: ., cksum 0xf750 (correct), 317:317(0) ack 465 win 123
21:29:16.156391 IP (tos 0x0, ttl 51, id 48611, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28866 > ..http: F, cksum 0xf74d (correct), 317:317(0) ack 466 win 123
21:29:19.932308 IP (tos 0x0, ttl 51, id 57375, offset 0, flags [DF], proto: TCP (6), length: 64) 223.199.158.88.28867 > ..http: ., cksum 0x5e97 (correct), 0:0(0) ack 1 win 115
21:29:26.131979 IP (tos 0x0, ttl 51, id 57376, offset 0, flags [DF], proto: TCP (6), length: 64) 223.199.158.88.28867 > ..http: ., cksum 0x2e27 (correct), 0:0(0) ack 1 win 115
21:29:35.547411 IP (tos 0x0, ttl 51, id 57377, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28867 > ..http: F, cksum 0x08a5 (correct), 0:0(0) ack 1 win 115
21:29:35.742791 IP (tos 0x0, ttl 51, id 57378, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.28867 > ..http: ., cksum 0xe254 (correct), 1:1(0) ack 2 win 115
2. lvs-master eth0 out
[root@kickstart lvs-tunneling]# tcpdump 'dst host 98.126.xx.140' -vv
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
21:38:21.488004 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 80) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 32908, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.29326 > ..http: S, cksum 0x331a (correct), 2074687392:2074687392(0) win 14600
21:38:21.683364 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 32909, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29326 > ..http: ., cksum 0x3b31 (correct), 2074687393:2074687393(0) ack 1481157984 win 115
21:38:21.695108 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 552) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 32910, offset 0, flags [DF], proto: TCP (6), length: 532) 223.199.158.88.29326 > ..http: P 0:480(480) ack 1 win 115
21:38:21.891737 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 32911, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29326 > ..http: ., cksum 0x3718 (correct), 480:480(0) ack 146 win 123
21:38:21.893487 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 32912, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29326 > ..http: F, cksum 0x3716 (correct), 480:480(0) ack 147 win 123
21:38:21.903980 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 80) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 50421, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.29327 > ..http: S, cksum 0x05b2 (correct), 1658027070:1658027070(0) win 14600
21:38:22.101106 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 50422, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29327 > ..http: ., cksum 0x3bf1 (correct), 1658027071:1658027071(0) ack 1479179700 win 115
21:38:22.109603 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 389) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 50423, offset 0, flags [DF], proto: TCP (6), length: 369) 223.199.158.88.29327 > ..http: P 0:317(317) ack 1 win 115
21:38:22.306230 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 50424, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29327 > ..http: ., cksum 0x3740 (correct), 317:317(0) ack 465 win 123
21:38:22.308229 IP (tos 0x0, ttl 51, id 0, offset 0, flags [DF], proto: IPIP (4), length: 72) . > CUSTOMER.vpls.net: IP (tos 0x0, ttl 51, id 50425, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29327 > ..http: F, cksum 0x373d (correct), 317:317(0) ack 466 win 123
3. lvs-Realserver eth0 in
[root@customer lvs-tunneling]# tcpdump -i eth0 'src host 72.20.xx.23' -vv
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
14:44:17.838103 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) ..http > 223.199.158.88.29460: S, cksum 0x1283 (correct), 1859206496:1859206496(0) ack 3533714534 win 5792
14:44:18.045934 IP (tos 0x0, ttl 64, id 65220, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29460: ., cksum 0x5444 (correct), 1:1(0) ack 481 win 54
14:44:18.046569 IP (tos 0x0, ttl 64, id 65221, offset 0, flags [DF], proto: TCP (6), length: 197) ..http > 223.199.158.88.29460: P 1:146(145) ack 481 win 54
14:44:18.046703 IP (tos 0x0, ttl 64, id 65222, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29460: F, cksum 0x53b1 (correct), 146:146(0) ack 481 win 54
14:44:18.245682 IP (tos 0x0, ttl 64, id 65223, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29460: ., cksum 0x5217 (correct), 147:147(0) ack 482 win 54
14:44:18.255713 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) ..http > 223.199.158.88.29461: S, cksum 0xbe60 (correct), 1862197371:1862197371(0) ack 3151886525 win 5792
14:44:18.461560 IP (tos 0x0, ttl 64, id 9529, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29461: ., cksum 0x00c6 (correct), 1:1(0) ack 318 win 54
14:44:18.462035 IP (tos 0x0, ttl 64, id 9530, offset 0, flags [DF], proto: TCP (6), length: 516) ..http > 223.199.158.88.29461: P 1:465(464) ack 318 win 54
14:44:18.462118 IP (tos 0x0, ttl 64, id 9531, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29461: F, cksum 0xfef4 (correct), 465:465(0) ack 318 win 54
14:44:18.661116 IP (tos 0x0, ttl 64, id 9532, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29461: ., cksum 0xfd5e (correct), 466:466(0) ack 319 win 54
4. lvs-Realserver tunl0 in
[root@customer lvs-tunneling]# tcpdump -i tunl0 -vv
tcpdump: listening on tunl0, link-type RAW (Raw IP), capture size 96 bytes
14:42:38.102131 IP (tos 0x0, ttl 51, id 32892, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.29420 > ..http: S, cksum 0x2970 (correct), 2806064676:2806064676(0) win 14600
14:42:38.298802 IP (tos 0x0, ttl 51, id 32893, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29420 > ..http: ., cksum 0xafa5 (correct), 2806064677:2806064677(0) ack 1753100253 win 115
14:42:38.310657 IP (tos 0x0, ttl 51, id 32894, offset 0, flags [DF], proto: TCP (6), length: 532) 223.199.158.88.29420 > ..http: P 0:480(480) ack 1 win 115
14:42:38.508228 IP (tos 0x0, ttl 51, id 32895, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29420 > ..http: ., cksum 0xab89 (correct), 480:480(0) ack 146 win 123
14:42:38.510045 IP (tos 0x0, ttl 51, id 32896, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29420 > ..http: F, cksum 0xab87 (correct), 480:480(0) ack 147 win 123
14:42:38.521681 IP (tos 0x0, ttl 51, id 43110, offset 0, flags [DF], proto: TCP (6), length: 60) 223.199.158.88.29421 > ..http: S, cksum 0x30c1 (correct), 3033862042:3033862042(0) win 14600
14:42:38.719051 IP (tos 0x0, ttl 51, id 43111, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29421 > ..http: ., cksum 0x884c (correct), 3033862043:3033862043(0) ack 1761893468 win 115
14:42:38.728096 IP (tos 0x0, ttl 51, id 43112, offset 0, flags [DF], proto: TCP (6), length: 369) 223.199.158.88.29421 > ..http: P 0:317(317) ack 1 win 115
14:42:38.927178 IP (tos 0x0, ttl 51, id 43113, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29421 > ..http: ., cksum 0x8399 (correct), 317:317(0) ack 465 win 123
14:42:38.929373 IP (tos 0x0, ttl 51, id 43114, offset 0, flags [DF], proto: TCP (6), length: 52) 223.199.158.88.29421 > ..http: F, cksum 0x8396 (correct), 317:317(0) ack 466 win 123
5. lvs-Realserver eth0 out
[root@customer lvs-tunneling]# tcpdump -i eth0 'port 80 and dst host 223.199.158.88' -vv
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
14:46:31.457276 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) ..http > 223.199.158.88.29528: S, cksum 0x59c5 (correct), 1983850643:1983850643(0) ack 2069642611 win 5792
14:46:31.664730 IP (tos 0x0, ttl 64, id 58685, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29528: ., cksum 0x9b87 (correct), 1:1(0) ack 481 win 54
14:46:31.665266 IP (tos 0x0, ttl 64, id 58686, offset 0, flags [DF], proto: TCP (6), length: 197) ..http > 223.199.158.88.29528: P 1:146(145) ack 481 win 54
14:46:31.665380 IP (tos 0x0, ttl 64, id 58687, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29528: F, cksum 0x9af4 (correct), 146:146(0) ack 481 win 54
14:46:31.863005 IP (tos 0x0, ttl 64, id 58688, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29528: ., cksum 0x995d (correct), 147:147(0) ack 482 win 54
14:46:31.875984 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) ..http > 223.199.158.88.29529: S, cksum 0x6306 (correct), 1984357308:1984357308(0) ack 3136108073 win 5792
14:46:32.081040 IP (tos 0x0, ttl 64, id 11511, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29529: ., cksum 0xa56d (correct), 1:1(0) ack 318 win 54
14:46:32.081548 IP (tos 0x0, ttl 64, id 11512, offset 0, flags [DF], proto: TCP (6), length: 516) ..http > 223.199.158.88.29529: P 1:465(464) ack 318 win 54
14:46:32.081616 IP (tos 0x0, ttl 64, id 11513, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29529: F, cksum 0xa39c (correct), 465:465(0) ack 318 win 54
14:46:32.280313 IP (tos 0x0, ttl 64, id 11514, offset 0, flags [DF], proto: TCP (6), length: 52) ..http > 223.199.158.88.29529: ., cksum 0xa206 (correct), 466:466(0) ack 319 win 54
一会再发一个 lvs load balance server (在国外) , Realserver (在国内) 无法正常成功部署的 信息输出.
Anonymous (没有被验证)
周三, 2014-03-05 19:51
Permalink
MQomCHazvu
Finding this post has anreswed my prayers
Anonymous (没有被验证)
周四, 2014-03-06 04:06
Permalink
jQVxaIJjVictkBHFRoy
I really codnlu't ask for more from this article.
Anonymous (没有被验证)
周日, 2014-03-23 23:17
Permalink
prlxuhyTobknrlohkdth
liability insurance martial arts link accredited colleges online free car insurance co auto owners insurance
Anonymous (没有被验证)
周四, 2014-11-06 09:55
Permalink
WCbLDoXmnEKBsdD
florida car insurance predisone no perscription car insurance rate free car insurance quotes online insurance quotes auto
Anonymous (没有被验证)
周四, 2012-08-16 14:53
Permalink
libipvs.c:1049: warning:
libipvs.c:1049: warning: passing argument 2 of ‘ipvs_nl_send_message’ from incompatible pointer type192.168.1.1