A. Test topology:
Two. Test ideas:
A. Headquarters ASA does not configure the tunnel separation, branch office all traffic to go VPN
B. Headquarters ASA configuration NAT Allow Branch segment pat on public net
----Because the branch traffic will bounce traffic from the outside interface, you need to configure Same-security-traffic permit Intra-interface
Three. Basic configuration:
A.inside Router:
Interface ethernet0/0
IP address 10.1.1.2 25
Tags: cat dem protocol PPP span plugin send add IPSec1. Open Network Preferences2. Click +3. Enter the address and account number of the VPN4. Advanced--Tick send all traffic via VPN link5. Add DNS6. Because the corporate VPN is using the L2TP protocol and is not shared, MacOS needs some configuration to support it, otherwise it will prompt for the loss of the IPSEC shared key. Please verify your settings and try reconnecting. LONGQUANDEMACBOOK-AIR:PPP longquan$ pwd/etc/pppLONGQUANDEMACBOOK-AIR:
Summary of configuration formats of dynamic routing (ripV2, ospf, VPN, bgp, IS-IS)1. r12002router rip enable rip Protocol no atuo-summary disable automatic summary of version 2 2 network x mask x declaring the network segment (the subnet mask is a positive mask, mask can be disabled. 2. Enable the ospf protocol for ospfrouter ospf x, and add the Process Code router-id x to specify the router-id (the address must be ipv4) network x mask x area x declar
generate the most reasonable path (merge ).
(The basic logic of RIP is: if A is 6 away from B and I am 1 Away From A, the distance from A to B is 7)
For technical reasons (looping hops), rip considers that IP addresses over 15 cannot arrive. Therefore, rip is more used in the Internet (such as the entire China Telecom Network ). Such an internet part often belongs to the same ISP or has the same management organization, so it is called an autonomous system (as, autonomous system ). Hosts and
Use BGP when one of the following conditions exists
----- As allows data packets to pass through it to other self-made Systems
Multiple external connections, multiple carriers, and multiple Internet connections
You must control the inbound and outbound data streams.
BGP is not used when the following conditions exist:
Connect only to the as or Internet
When the vro memory and CPU performance is poor
《
BGP routing policies in ISP Networks
"
IEEE Network magazine 2005
1 Ways to configure local policythere are three classes of "knobs" that can be used to controlimport and export policies: 1) preference (demo-process) 2) filter (eliminate certain route) 3) tag (community) 2 BGP policy common practice and design pattern1) business relationship (1) inbound: Assign local-preference to influence the
The problems that arise:
A) R1 has a 7.7.7.0/24 route on it, but Ping 7.7.7.7 is not reached. (R7 same)
Now view the R1 routing table
R7#sh IP route
B 1.1.1.0 [20/0] via 5.5.5.5, 00:02:54/To save space incomplete display
It can be seen that R7 learned the route of the R1, from the surface to see the experiment is perfect, for the purpose, but then the problem arises, make a test, on the R7 ping R1
R7#ping 1.1.1.1
Type escape sequence to abort.
Sending 5, 0-byte ICMP Echos to 7.7.7.7, tim
Using ssh tunnel to connect to the mysql server, sshtunnel
Preface
In some cases, we can only know the Intranet address of the database and cannot connect to the database through the Intranet. However, we can log on to other machines on the same Intranet and these machines can access the database through the Intranet, then we can access the database through ssh tunnel.
Usage
The usage of ssh
In the two-layer network, when transmitting two beginning, it needs to be forwarded with the outer VLAN of the message, while the outer tag of the user network is usually inconsistent with the VLAN of the carrier network, so the VLAN stacking and VLAN mapping and dot1q tunnel etc. Unlike VLAN stacking, VLAN mapping replaces the user's outer VLAN with the carrier's VLAN, and then reverts to the original VLAN when it leaves the carrier's network, but th
Loading GRE ModulesModprobe Ip_greCreate a tunnel named officeIP tunnel addoffice mode GRE remote 111.206.164.122 local 111.206.0.88 TTL 255IP Link Set officeupAdd an IP address for tunnelIP Add add10.100.100.1/30 Dev OfficeCreate a routing table with a table name of 136IP route add default via 103.246.132.61 table 136To create a policy that specifies the route table 136 when the local source IP is 192.168.
http://acm.zju.edu.cn/onlinejudge/showProblem.do?problemCode=3604
Tunnel Network
Time limit: 2 Seconds Memory Limit: 65536 KB
Country Far-far-away is a big country with N cities. But it's now under a civil war. The rebel uses the ancient tunnel network which connects all N cities with N-1 inter-city tunnels for TR Ansportation. The government army want to destroy t
Description We must have seen the TV of the real war. As a matter of Zhangga, he also ran back to support the tunnel battle. It is a small town in Hebei, this small town is more complex, what kind of people have. So Zhangga can not walk the street, only in the tunnel walk. However, depending on the geological situation, the same length of the street, the tunnel m
The previous article
http://www.cnblogs.com/piperck/p/6188984.html using SSH config profile to manage SSH connections
The previous article described how to configure your own SSH config to easily manage your SSH connection, and how to use Ssh-add to store your own key password. Next, we will discuss the use of SSH to do forwarding and springboard of the relevant practice.First, let's start with a situation like this:Our external firewall blocks some common ports, and now only 22 80
the company's intranet computers.
Deeper project:
After the company's system network administrator finds this line of employee, it is necessary to write a "filter" to enhance the proxy function to prevent the establishment of such tunnel.
Idea: Write this "filter" and place it between work and proxy, that is to say, work HTTP request a: First receive our "filter" check, if there is no problem, then send it to proxy, b: The response to the proxy is
Sometimes back to SSH tunnel, the manual use of SSH to create these is not too big a problem, but if you try to boot, write a shell script and run the script in Rc.local is not successful, the reason is not known.Later discovered autossh this thing, not only can create SSH tunnel silent mode can also set automatic detection, and automatically try to link the options.The script that is provided in the attach
Now connected to an IDC MySQL server, due to network isolation, the need to ssh to a springboard to direct access to MySQL, and I want to use mysqlworkbench such as local clients directly connected to MySQL. The solution is to set up an SSH tunnel with the SSH command, and then Mysqlworkbench connect to the corresponding remote MySQL only by connecting to a local port.
Suppose the springboard is: 192.168.1.1 (it can be connected to MySQL)MySQL IP is:
HTTP tunnel principle and firewall penetration method-1
TunnelMany articles are interpreted as "Tunnel" and "channel ".
Tunnel is a communication method that bypasses the firewall port shielding, which can effectively shield the firewall from the port.
Principle:Packets at both ends of the firewall are encapsulated on the data packet type or port allowed by the f
The IPv6 tunnel is a IPV6 message encapsulated in the IPV4 message, allowing IPV6 packets to communicate through the IPV4 network. For equipment adopting tunnel technology, the source and destination address of the IPV6 datagram is encapsulated into the IPV4,IPV4 message at the entrance of the tunnel, respectively, the IPV4 address of the
1. If the next hop cannot be reached, do not consider2. Select a route with the maximum weight.3. If the route has the same weight, use the route with the highest local priority.4. If you have the same local priority, the BGP Route from the vrobgp is preferred.5. If there is no BGP Route from the vrobgp, select the route with the shortest AS length.6. If all the routes have the same AS length, select the ro
What is the next hop of a BGP third party? Compare the next hop of the route from which the router sends the route with the outgoing interface. If the route is in the same CIDR Block, the next hop of the route remains unchanged. Let's take a look at the following example: www.2cto.com R1, R2, and R3 routers. The interface IP addresses are 10.1.1.1/10.1.1.2 and 10.1.1.3 respectively. R1 and R2 run IBGP, R1 and R3 run EBGP, there is a loopback2 on R2 an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.