--Sig_/I.0bq/1R+5=8=Pola=1f=Za
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable
On Thu, 23 Jan 2014 10:59:57 -0500 (EST) Assaf wrote:
AM> If you enable VLAN tagging on the management network, which is
AM> configured on eth0 (Which also provides internet access from my
AM> understanding) then you will connectivity as (I assume) your physical
AM> switches aren't configured for VLANs.
I'm assuming "will connectivity" should have been "will lose
connectivity",
which is what I feared. I'm glad I asked!
AM> For an all-in-one, what I would suggest is the following procedure:
Excellent, I'll try that. Thanks!
My next question is for future planning. There is a second interface
(eth1) with a separate physical network which only contains the engine,
nodes and the nfs server.=20
+----------+
| internet |-----|-----------|----------|
+----------+ +--------+ +-------+ +-------+ < eth0
| engine | | node1 | | node2 |
+-----+ +--------+ +-------+ +-------+ < eth1
| nfs |-------|-----------|----------|
+-----+
Can the mgmt network be easily moved to eth1? Then the pubX would be
non-vlan on eth0, and mgmt + privY would be on eth1. If all the eth1
interfaces are connected to a dedicated/isolated switch, does that switch
need to explicitly support vlans, or does it matter?
Robert
--
Senior Software Engineer @ Parsons
--Sig_/I.0bq/1R+5=8=Pola=1f=Za
Content-Type: application/pgp-signature; name=signature.asc
Content-Disposition: attachment; filename=signature.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
iEYEARECAAYFAlLhTVoACgkQ7/fVLLY1mngsuwCeJoEbSAkeyFuCEcGETMErbMoK
HBUAn2KBoQo0f1FuxdC5USyUK2KaEYBP
=xWbb
-----END PGP SIGNATURE-----
--Sig_/I.0bq/1R+5=8=Pola=1f=Za--