Hi all,

i do a lot of tests here, with no sucessful yet...


i tryed do it:


set vswitch like this:


DEFINE VSWITCH VSWSVC01 ETHERNET RDEV 0800.P0 GROUP GRPSRV01 VLAN 666
SET VMLAN MACPROTECT ON

SET VSWITCH VSWSVC01 GRANT DB2P101 VLAN 218
SET NIC USER DB2P101 0800 MACPROTECT ON

I get one victory, make linux comes up with correct vlan without load 802.1q
on linux...

but after logoff, the sles tries get another mac address just like Ursula
says... and then mac protection comes up:


.done    eth0      name: OSA Express Network card (0.0.0800)
eth.aafb9d: 0.0.0800: MAC address 02:61:01:00:00:29 is not authorized
TNETLINK answers: Unknown error 18446744073709486085
annot enable interface eth0.
nterface eth0 is not up
eb  3 15:24:44 ftpp102 ifup: Cannot enable interface eth0.
eb  3 15:24:44 ftpp102 ifup-route: interface eth0 is not up
eb  3 15:24:44 ftpp102 SuSEfirewall2: SuSEfirewall2 not active
   eth0
.failedWaiting for mandatory devices:  eth0 __NSC__
0 29 28 27 26 Feb  3 15:24:48 ftpp102 kernel: qeth.aafb9d: 0.0.0800: MAC
addres
 02:61:01:00:00:29 is not authorized
5 24 23 22 21

i'm a little lost here about this...  about do force arp response like
Ursula says i understandig this is a bad choice based on comments from Mark,
correct? there is another workaround that i can try? we are running z/vm 6.1
by the way :)

Thanks again.




On Wed, Feb 2, 2011 at 5:32 PM, Marcy Cortes
<marcy.d.cor...@wellsfargo.com>wrote:

> Channel bonding would be another.
> But even then, I wouldn't pick something that is in CP's range to assign.
>
> Marcy
>
> -----Original Message-----
> From: Linux on 390 Port [mailto:LINUX-390@vm.marist.edu] On Behalf Of Alan
> Altmark
> Sent: Wednesday, February 02, 2011 10:46 AM
> To: LINUX-390@vm.marist.edu
> Subject: Re: [LINUX-390] SLES 11 strange behavior network
>
> On Wednesday, 02/02/2011 at 01:29 EST, David Boyes <dbo...@sinenomine.net>
> wrote:
> > Aside from DECnet and SNA support, what still needs the ability to
> > overwrite the MAC address of an interface these days?
>
> Are all the MAC-level takeover HA solutions gone?  I thought some workload
> sprayers used MAC spoofing to perform transparent workload transfers.
>
> The only other reason I can think of to overwrite the MAC is in order to
> get a specific DHCP reservation (not the same as static IP).
>
> Alan Altmark
>
> z/VM and Linux on System z Consultant
> IBM System Lab Services and Training
> ibm.com/systems/services/labservices
> office: 607.429.3323
> alan_altm...@us.ibm.com
> IBM Endicott
>
> ----------------------------------------------------------------------
> For LINUX-390 subscribe / signoff / archive access instructions,
> send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or
> visit
> http://www.marist.edu/htbin/wlvindex?LINUX-390
> ----------------------------------------------------------------------
> For more information on Linux on System z, visit
> http://wiki.linuxvm.org/
>
> ----------------------------------------------------------------------
> For LINUX-390 subscribe / signoff / archive access instructions,
> send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or
> visit
> http://www.marist.edu/htbin/wlvindex?LINUX-390
> ----------------------------------------------------------------------
> For more information on Linux on System z, visit
> http://wiki.linuxvm.org/
>

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to