{"id":107,"date":"2007-08-21T22:34:34","date_gmt":"2007-08-21T20:34:34","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=87"},"modified":"2007-08-21T22:34:34","modified_gmt":"2007-08-21T20:34:34","slug":"bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/","title":{"rendered":"Bind network interfaces on Linux for redundancy, load balancing and performance"},"content":{"rendered":"<div class=\"ExternalClassE9338A915F2944579F245E0D2ED8469F\">\n<p>If you have multiple network interfaces in your linux machine (and ideally they have the same speed &amp; duplex), you may want to 'bind' the adapters together to increase bandwidth and create some redundancy.<\/p>\n<p>Before going into the details on how to set this up under Fedora\/Openfiler\/other\u2026 linux flavors, I'd like to give some info about bonding (port trunking) and the types of bonding under Linux.<\/p>\n<p>Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports (1 mb each) into a three-megabits trunk port. That is equivalent with having one interface with three megabits speed.<\/p>\n<p>The \"bonding\" project has identified 6 bonding modes. It is recommended to choose the mode that suits your environment best. Keep in mind, some bonding modes rely on certain switch capabilities, so make sure to pick the right mode.<\/p>\n<div>\n<table style=\"border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 641px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr style=\"height: 479px;\">\n<td style=\"padding-right: 7px; padding-left: 7px; border: black 0.5pt solid;\"><span style=\"font-size: 10pt;\"><strong>mode=0 (balance-rr) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">Round-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=1 (active-backup) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">Active-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond's MAC address is externally visible on only one port (network adapter) to avoid confusing the switch. This mode provides fault tolerance. The primary option affects the behavior of this mode. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=2 (balance-xor) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">XOR policy: Transmit based on [(source MAC address XOR'd with destination MAC address) modulo slave count]. This selects the same slave for each destination MAC address. This mode provides load balancing and fault tolerance. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=3 (broadcast) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">Broadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=4 (802.3ad) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\">\u00a0\u00a0\u00a0\u00a0<em>Pre-requisites: <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a01. Ethtool support in the base drivers for retrieving <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0the speed and duplex of each slave. <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a02. A switch that supports IEEE 802.3ad Dynamic link <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0aggregation. <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0Most switches will require some type of configuration <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0to enable 802.3ad mode.<\/em> <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=5 (balance-tlb) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">Adaptive transmit load balancing: channel bonding that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave. Incoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave. <\/span><\/p>\n<p><span style=\"font-size: 10pt;\">\u00a0\u00a0\u00a0\u00a0<em>Prerequisite: <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0Ethtool support in the base drivers for retrieving the <\/em><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em>\u00a0\u00a0\u00a0\u00a0speed of each slave.<\/em> <\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><strong>mode=6 (balance-alb) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt;\">Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the slaves in the bond such that different peers use different hardware addresses for the server. <\/span><\/p>\n<p>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p>Here are the steps required to set up bonding on your system.<\/p>\n<p>Let's assume that you want to bind eth1 and eth2 together, using mode 5. The bonded interface needs to have IP 192.168.0.1<\/p>\n<p>You basically need to modify 4 files :<\/p>\n<div>\n<table style=\"border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 636px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"border-right: black 0.5pt solid; padding-right: 7px; border-top: black 0.5pt solid; padding-left: 7px; border-left: black 0.5pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><span style=\"text-decoration: underline;\"><strong>\/etc\/modprobe.conf<\/strong><\/span><br \/>\n#added for bonding<br \/>\nalias bond0 bonding mode=5 miimon=100 <\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: black 0.5pt solid; padding-right: 7px; padding-left: 7px; border-left: black 0.5pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><span style=\"text-decoration: underline;\"><strong>\/etc\/sysconfig\/network-scripts\/ifcfg-eth1<br \/>\n<\/strong><\/span>DEVICE=eth1<br \/>\nBOOTPROTO=none<br \/>\nONBOOT=yes<br \/>\nMASTER=bond0<br \/>\nSLAVE=yes<br \/>\nUSERCTL=no <\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: black 0.5pt solid; padding-right: 7px; padding-left: 7px; border-left: black 0.5pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><span style=\"text-decoration: underline;\"><strong>\/etc\/sysconfig\/network-scripts\/ifcfg-eth2<br \/>\n<\/strong><\/span>DEVICE=eth2<br \/>\nBOOTPROTO=none<br \/>\nONBOOT=yes<br \/>\nMASTER=bond0<br \/>\nSLAVE=yes<br \/>\nUSERCTL=no <\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: black 0.5pt solid; padding-right: 7px; padding-left: 7px; border-left: black 0.5pt solid; border-bottom: black 0.5pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><span style=\"text-decoration: underline;\"><strong>\/etc\/sysconfig\/network-scripts\/ifcfg-bond0<\/strong><\/span><br \/>\nDEVICE=bond0<br \/>\nONBOOT=yes<br \/>\nBOOTPROTO=none<br \/>\nIPADDR=192.168.0.1<br \/>\nNETMASK=255.255.255.0<br \/>\nUSERCTL=no <\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p>Reboot the system, and it should work.<\/p>\n<p>You can find more information about bonding on <a href=\"http:\/\/sourceforge.net\/projects\/bonding\/\">http:\/\/sourceforge.net\/projects\/bonding\/<\/a><\/p>\n<p>In case you were wondering why I mentioned Openfiler, which is not really a OS that should be used for general purposes, but at the current time, the bonding implementation in Openfiler is not really mature yet, so it is advised to set it up manually and things will work fine as well.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you have multiple network interfaces in your linux machine (and ideally they have the same speed &amp; duplex), you may want to 'bind' the adapters together to increase bandwidth and create some redundancy. Before going into the details on how to set this up under Fedora\/Openfiler\/other\u2026 linux flavors, I'd like to give some info &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Bind network interfaces on Linux for redundancy, load balancing and performance\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64,164],"tags":[131],"class_list":["post-107","post","type-post","status-publish","format-standard","hentry","category-linux","category-networking","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"If you have multiple network interfaces in your linux machine (and ideally they have the same speed &amp; duplex), you may want to &#039;bind&#039; the adapters together to increase bandwidth and create some redundancy. Before going into the details on how to set this up under Fedora\/Openfiler\/other\u2026 linux flavors, I&#039;d like to give some info &hellip; Continue reading &quot;Bind network interfaces on Linux for redundancy, load balancing and performance&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2007-08-21T20:34:34+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Bind network interfaces on Linux for redundancy, load balancing and performance\",\"datePublished\":\"2007-08-21T20:34:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/\"},\"wordCount\":700,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"Linux and Unix\"],\"articleSection\":[\"Linux and Unix\",\"Networking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/\",\"name\":\"Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2007-08-21T20:34:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/21\\\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bind network interfaces on Linux for redundancy, load balancing and performance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/","og_locale":"en_US","og_type":"article","og_title":"Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"If you have multiple network interfaces in your linux machine (and ideally they have the same speed &amp; duplex), you may want to 'bind' the adapters together to increase bandwidth and create some redundancy. Before going into the details on how to set this up under Fedora\/Openfiler\/other\u2026 linux flavors, I'd like to give some info &hellip; Continue reading \"Bind network interfaces on Linux for redundancy, load balancing and performance\"","og_url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2007-08-21T20:34:34+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Bind network interfaces on Linux for redundancy, load balancing and performance","datePublished":"2007-08-21T20:34:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/"},"wordCount":700,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["Linux and Unix"],"articleSection":["Linux and Unix","Networking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/","url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/","name":"Bind network interfaces on Linux for redundancy, load balancing and performance - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2007-08-21T20:34:34+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/21\/bind-network-interfaces-on-linux-for-redundancy-load-balancing-and-performance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Bind network interfaces on Linux for redundancy, load balancing and performance"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":16161,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=107"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/107\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}