> The hash algorithm uses the source IP address, the destination IP address, > the Protocol field and the Incoming Interface Index in order to generate a > key.
Thanks David. How is chosen the next-hop with this generate key? I am looking for this algorithm. Regards, Samuel -----Message d'origine----- De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Envoyé : jeudi 17 juillet 2008 10:55 À : Gay,S,Samuel,JPECS R; juniper-nsp@puck.nether.net Objet : RE: [j-nsp] Load balancing: hash algorithm Hi, The hash algorithm uses the source IP address, the destination IP address, the Protocol field and the Incoming Interface Index in order to generate a key. Regards David -----Message d'origine----- De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] De la part de [EMAIL PROTECTED] Envoyé : jeudi 17 juillet 2008 10:46 À : juniper-nsp@puck.nether.net Objet : [j-nsp] Load balancing: hash algorithm Hi Group, Do you know how work hash algorithm used in load balancing (only layer-3)? Is there some documentation about it? Thanks, Samuel _______________________________________________ juniper-nsp mailing list juniper-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/juniper-nsp ********************************* This message and any attachments (the "message") are confidential and intended solely for the addressees. Any unauthorised use or dissemination is prohibited. Messages are susceptible to alteration. France Telecom Group shall not be liable for the message if altered, changed or falsified. If you are not the intended addressee of this message, please cancel it immediately and inform the sender. ******************************** _______________________________________________ juniper-nsp mailing list juniper-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/juniper-nsp