Work for 8 years, did not develop an effective accumulation of experience, from today began to recall some of the problems encountered in the process and solutions.From last week after the company changed the firewall all the external MIP and VIP failure to say:Background: Juniper Firewall replacement, the old firewall configuration directly into the new firewall, after the line switch intranet access to all normal, testing outside the network release
network traffic through its scanning, can filter out some attacks, the firewall can also close the unused port, the firewall has a good protection, the intruder must first cross the security line of the firewall to reach the target computer, so for security reasons, the enterprise must purchase a firewall to ensure its server security , place the application system server in a dedicated zone inside the firewall. General hardware firewall than the performance of the software firewall is better,
continues to "uncertain" forwarding if the control board stops working.
Of course, this is very dangerous. If the network topology changes when the control panel stops working, the forwarding table of the forwarding board becomes invalid, resulting in incorrect packet forwarding. But why do we still need NSF?
The answer is that there are surplus control panels. nsf can switch from the main control panel to the backup control panel without interrupting forwarding. During this switching proce
Source Address:Https://www.juniper.net/techpubs/software/junos-security/junos-security10.2/junos-security-swconfig-mpls/topic-47253.htmlBody:This example shows us how to create an LSP in an IP network between routers using RSVP as the signaling protocol. (Translator Press: The so-called signaling protocol that I understand is used to distribute the label to determine which LSR is in which port to use which label's protocol. such as Cisco's Ldp,juniper
Sunnyvale_eng 10.1.10.0/242 set address Untrust Juniper Www.juniper. Net 3 SaveTo modify an address entry:1 unset Address Trust Sunnyvale_eng 2 Set address Trust Sunnyvale_eng 10.1.40.0/243 SaveTo delete an address entry:1 unset Address Trust "Sunnyvale_sw_eng"2 SaveTo create and edit an address group:1 Set Group address Trust "HQ 2nd Floor" Add "Santa Clara Eng"2 set Group address Trust "HQ 2nd Floor" a DD "Tech Pubs"3 SaveTo delete members and grou
times.4. Multi-SelectCurrently streaming telemetry technology, there are two options.One is sflow.And the other one is Openconfig Telemetry.(already deployed in Google, 30% of vendor devices have turned on streaming Telemetry, millions updates per second.) )Two of the above have been followed up by many manufacturers.For example, Cisco and Juniper can be configured for both of the above.Interested friends can go to see the official configuration docu
Recently, a customer's AAA was not correctly configured, causing him to be locked out of the device. Because it is a multi-switch stack unit in the production environment, it is not allowed to restart and ignore the configuration, remote operations are required to solve the problem, which undoubtedly increases the difficulty of solving the problem.
After several attempts, we found that some settings on Cisco ACS can bypass the authorization to access the device. We will share with you the situat
approaches 0 to become CDP. To distinguish this new concept from CDP a few years ago, the industry officially called the previous CDP concept near CDP (quasi CDP ), the new concept is true CDP ).
Iii. CDP international standards
I have to mention an organization that has been focusing on CDP. It is snia. The Global Network Storage Industry Association (snia) is an industry association that was established earlier and neutral to storage manufacturers, the purpose is to lead the development and p
Americaidc Hong Kong host server is located in the data center hkcolo. NET data center is the top-level telehouse data center. telehouse is a Fortune 500 multinational company with over 40 data centers in 12 countries around the world. It has 25 years of data center history, the telehouse Hong Kong data center covers an area of 30 thousand square meters and is a T3 + standard data center. It is one of the largest data centers in Hong Kong. Americaidc Hong Kong servers use Xeon dual-six-core, 48
good, such as banks, trusts, foreign companies, etc.; manufacturers, for example, Cisco, Huawei, Juniper, and ZTE
As a junior college student with no work experience (this threshold is low enough), how much can I get in January?My answer is 5.5 kb. Otherwise, you don't want to come back to see me. I am too embarrassed (of course, this kind of children's shoes is not available for the time being). Most junior college students in the same period are be
Information security company link! You have to check the situation!
Mainland manufacturers
Anshi (China), guanqun (China), vening stars, Neusoft Corporation, Tian Rongxin, Zoomlion Green Alliance, guanqun jinchen, jinnuo Netan, Fu Dan Guanghua, Huayi technology, Guangzhou keyou, Sichuan dengshi, Dongfang longma, science and engineering pioneer, Ziguang, skyline network security, Tsinghua, zhongke netwei, zhongda net.cn, anluo technology, jiean, Siwei century, xiongmao guard, Far East Netan,
Ssl vpn topic: Introduction
As applications migrate from the C/S structure to the Web, enterprises must face a new challenge, is how to implement flexible access to these applications anywhere without affecting end users. Over the past few decades, we have grown from a leased line to an IPSec VPN, and now an ssl vpn. Obviously, ssl vpn has many advantages. Simply put, as long as the client can access our internal network through a browser, it is inconvenient.
Basic s
$ sudo ip link set dev eth0 upMethod 2: macchangerThe macchanger command allows you to change the MAC address to the serial number of different manufacturers.Install macchanger In Debian, Ubuntu, or Linux Mint:$ sudo apt-get install macchangerInstall macchanger in Fedora:$ sudo yum install macchangerInstall macchanger in CentOS or RHEL:$ wget http://ftp.club.cc.cmu.edu/pub/gnu/macchanger/macchanger-1.6.0.tar.gz$ tar xvfvz macchanger-1.6.0.tar.gz$ cd macchanger-1.6.0 $ ./configure$ make$ sudo ma
generate protection policies, for details, see section 2.1 of Unix/linux Network Log Analysis and traffic monitoring.
5) using a passive policy means purchasing large bandwidth, which can effectively reduce the harm of DDOS attacks.
6 ). build a distributed system, deploy your business in multiple data centers, distribute access from different regions to the corresponding data centers, and deploy CDN, deploying firewalls (such as Cisco and Juniper fi
/zebra.conf.sample /etc/quagga/zebra.confIn CentOS6:# service zebra start# chkconfig zebra onIn CentOS7:# systemctl start zebra# systemctl enable zebraQuagga provides a command line tool unique to vtysh. You can enter commands that are compatible with and supported by vro vendors (such as Cisco and Juniper. We will use vtysh shell to configure BGP routing in the rest of the tutorial.Start the vtysh shell command and enter:# vtyshThe prompt will be cha
.
# Cp/usr/share/doc/quagga-XXXXX/zebra. conf. sample/etc/quagga/zebra. conf
In CentOS6:
# Service zebra start
# Chkconfig zebra on
In CentOS7:
# Systemctl start zebra
# Systemctl enable zebra
Quagga provides a command line tool unique to vtysh. You can enter commands that are compatible with and supported by vro vendors (such as Cisco and Juniper. We will use vtysh shell to configure BGP routing in the rest of the tutorial.
Start the vtysh
Tatukgis announced that it has upgraded the developer kernel Compact framework Mobile GIS Application Development Section, supported by tatukgis dk cf V10 (dk10.cf)Windows MobileAndCEOperating System (including wince, pocketpc, Windows Mobile 5.0/6.x, Windows Embedded handheld 6.x ). This upgrade brings DK. cf to a new level.
Although retail applications have gradually replaced traditional mobile operating systems, GIS solutions for enterprise and industrial industries still favor Windows Mobil
some foreign companies, from the name, we can see where his technology is biased. In fact, it should be the whitehat in the security textbook. From the perspective of know your enemy, the anti-hacking capability is indeed strong.
[CSO/ciso]Generally, only a large organization has a Chief Security Officer or Chief Information Security Officer. Without an independent CSO position, information security is generally considered by CIOs, CTO, and coo, in fact, they are also responsible for playing th
0
User-interface aux 0
User-interface vty 0 4
#
Return
PS: I wrote my blog for the first time. I hope to record my learning process. The world on the internet is really too broad. Let's get a little bit of accumulation! I have learned a lot about the configuration in the afternoon. In the past few days, with the help of Teacher Li, I have made great progress (I feel like I am. o) When I learned from him, I found that experience was really useful. When I encountered an error, I had to think of
understand real IT companies. So I will not be afraid to speak English later, although it is still very bad. When I read this article, some people will ask why you leave because the conditions are so good and the salary is quite high (30% higher than the first company). Why do you want to leave? For more information about the reason for leavingArticleMy SDET career.
After finishing my three years of work, I began to think carefully about my future path and found myself wandering for countless
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.