(config-if) # no shutdownR3 (config) # int f0/1R3 (config-if) # ip add 23.0.0.3 255.0.0.0 configure the interface ip AddressR3 (config-if) # no shutdownR2 route:R2 (config) # int f0/0R2 (config-if) # ip address 23.0.0.2 255.0.0.0 configure the interface ip addressR2 (config-if) # no shutdownR2 (config) # int loopback 0R2 (config-if) # ip address 172.16.1.1 255.255.0.0 configure the loopback address for testingR2 (config) # ip route 0.0.0.0 0.0.0.0 23.0.0.3 set the default static route
Ii. VPN c
: Cryptogen. 1.1 compilation Generation Cryptogen
Now that we have the source code for fabric, we can easily compile the required programs using the Make command. Fabric Official provides a specially compiled Cryptogen portal, we only need to run the following command:
CD ~/go/src/github.com/hyperledger/fabric make
Cryptogen
After the run system returns results:
Build/bin/cryptogen
cgo_cflags= "" Gobin=/home/studyzy/go/src/github.com/hyperledger/fabric/build/bin go Install-tags ""-ldflags "-X
. 1.1 Compiling build Cryptogen
Now that we have the source code for the fabric, we can easily compile the required program with the Make command. Fabric officially provides a portal specifically for compiling Cryptogen, and we just need to run the following command:
CD ~/go/src/github.com/hyperledger/fabric make
Cryptogen
The system returns results after the run:
Build/bin/cryptogen
cgo_cflags= "" Gobin=/home/studyzy/go/src/github.com/hyperledger/fabric/build/bin go Install-tags ""-ldflags "-
(you need to comply with some JDK conventions ).
Static Installation
Before installing and using JCE, you need to go to the Sun Web site (here is the secret sun provider as an example ). obtain the installation package. The JCE has sun's own security provider-sunjce. To install sunjce statically to the default provider list, you need to modify the Security Attribute file:
• • If you install JDK in C:/jdk1.3, edit the following file:
C:/jdk1.3/JRE/lib/security/Java. Security
To install sunjce,
Example 1:
These days have been plagued by a problem. The AES encryption of Nodejs is inconsistent with that encrypted by Java and C. Of course, you cannot decrypt it. Tangle for a long time: Later, it was not enough. I read the source code, or else I had to continue to struggle. On the Internet, nodejs AES is usually implemented differently from other languages. Okay ~~ Maybe.Nodejs crypto module.Copy codeThe Code is as follows:Var
]# Ansible-hTraceback (most recent call last):File "/usr/local/src/ansible-devel/bin/ansible", line From Ansible.runner import runnerFile "/usr/local/src/ansible-devel/lib/ansible/runner/__init__.py", line From Crypto.random import atforkFile "/usr/lib64/python2.6/site-packages/crypto/random/__init__.py", line From Crypto.random import _userfriendlyrngFile "/usr/lib64/python2.6/site-packages/crypto/random/_
This document describes the IPSec configuration between the router and the Cisco firewall. The traffic between the headquarters and the branch office uses the private IP address, when the branch's local area network user accesses the Internet, needs to carry on the address conversion.
Network topology
Configuration
Define the traffic to the router:
Access-list IPSec permit IP 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0
!---traffic to the router does not address conversion
Access-list Non
This article describes how to solve the inconsistency between AES encryption and other languages in Node. js. For example, if you need to communicate with C # and JAVA, refer
Example 1:
These days have been plagued by a problem. The AES encryption of Nodejs is inconsistent with that encrypted by Java and C. Of course, you cannot decrypt it. Tangle for a long time: Later, it was not enough. I read the source code, or else I had to continue to struggle. On the Internet, nodejs AES is usually impl
===========
_____ _ _ ____
| ____| | | | _ \
| _| | \| | | | | |
| |___ | |\ | | |_| |
| _____| |_| \_| |____/
three. What are the automation scripts doing?
BYFN.SH is a packaged automated deployment script in the demo, and we'll take a step-by-step analysis of what it does. 1. Start Block Chain network
./byfn.sh-m up will eventually perform networkup:
function Networkup () {
if [!-D "Crypto-config"]; then
generatecerts #
VPN Series 6: Comparison of Dmvpn instances in cisco dual-center single cloud and dual-center dual cloud Redundancy Design
Prerequisites
Router ios version
650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0J2225H1-0.jpg "/>
The show crypto results are different due to inconsistent versions of the previous version. This time, the same version is used to ensure accurate and consistent results.
I, "Dual-cen
Many people ask me how to implement IPSec VPN technology, and I've done a case to show you how to configure a router-based IPSec VPN.
Due to work needs, the company's Nanjing office and the Shanghai office to establish a VPN connection. Nanjing Office Network settings: Intranet IP 10.1.1.0/24, extranet IP 202.102.1.5/24, Shanghai office network settings: Intranet IP 10.1.2.0/24, external network IP 202.102.1.6/24.
The following configuration steps are performed on both sides of the router:
I.
(multicast/broadcast) IP packets within the tunnel. Therefore, DMVPN supports running Dynamic Routing Protocols over IPSec and mGRE tunnels. It should be noted that NHRP must be configured as dynamic multicast ing. In this way, when the branch router registers the unicast ing address on the NHRP server (Central router, NHRP creates a multicast/broadcast (multicast/broadcast) ing for this branch router at the same time. Cisco dmvpn configuration instance: Configure r1 # sh ruhostname r1 on the H
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.