External network access test machine.The Windows machine uses SSH to reverse tunnel. Service side using reverse proxy
Install Openssh-win and set environment variables under win
Open cmdC:\users\administrator>ssh-p 22-r 1999:localhost:8080-b 0.0.0.0 [email protected]-R 1999 Port of the remote machine-B External network segment monitoring, no 127.0.0.1 monitoring8080 Native portThis way, the 1999 port of the extranet access 8.8.8.8 maps to
Title Link: http://acm.hdu.edu.cn/showproblem.php?pid=1540To give you a row of consecutive points, you can do the following three kinds of operations:1. Delete a point2, inquiry and length of the segment of a point (if the point has been deleted, the length is 0)3. Restore the last deleted pointThe segment tree calculates a continuous interval, and the node holds the left continuous length LM, and the right continuous length of RM1 /*2 * Problem:hdu 1540 tun
Problem descriptionduring the War of Resistance against Japan, tunnel warfare was carried off extensively in the vast area S of North China Plain. Generally speaking, villages connected by tunnels lay in a line. Except the ends, every village was directly connected with the neighboring ones.Frequently the invaders launched attack on some of the villages and destroyed the parts of tunnels in them. The eighth Route Army commanders requested the latest c
HDU 1540 Tunnel Warfare (line segment Tree single point update + interval merge), hduwarfareProblem DescriptionDuring the War of Resistance Against Japan, tunnel warfare was carried out extensively in the vast areas of north China Plain. generally speaking, ages connected by tunnels lay in a line. cannot the two at the ends, every village was directly connected with two neighboring ones.Frequently the invad
result after the combination of the user name and password, that is, the username: Password is base64-encoded.
In fact, encoding is meaningless to security. base64 cannot be regarded as encrypted in strict sense. Currently, encryption of keys is not required in the era of information security.AlgorithmThe encoding method is more appropriate. The user name and password can be obtained immediately after such a package is captured.
HTTP/1.0 200 connection established
After receiving the rece
During the War of Resistance Against Japan, tunnel warfare was carried out extensively in the vast areas of North China Plain. generally speaking, ages connected by tunnels lay in a line. cannot the two at the ends, every village was directly connected with two neighboring ones.
Frequently the invaders launched attack on some of the versions and destroyed the parts of tunnels in them. the Eighth Route Army commanders requested the latest connection
Ethernet tunnel technologies such as provider backbone transport (PBT) and Transport MPLS (T-MPLS) are generating a great deal of interest. tunnel technologies aim to enable "connection-oriented" Ethernet transport with high levels of reliability, manageability and scalability.
Note that PBT has been given a new name by the ieee in the project authorization, and we'll use the new name: provider backbone bri
I have been using chromebook for some time. At first I felt a little disappointed. Later I found that I could use the test channel to update the test version. The new test version has improved the performance and availability.
Flash supports hardware acceleration, and video playback smoothness is basically acceptable (high bit rate or some frame drop). It is also convenient to watch movies/American dramas when used with the help of offline downloading and online playback of the arms;
Webpage
is restored, the restored data packets are forwarded to the corresponding server.
Http://www.http-tunnel.com/is an on-line tunnel server for professional HTTP Channel services. users in the LAN can use the ICQ, e-mail, PC Anywhere, MSN, QQ, Napster and other software blocked by the firewall.
First,The HTTP-tunnel server must use the http-tunnel client.Progra
Recently debug public number function, do not want to submit to the server every time to read the log
So on the server with the Nginx reverse proxy to the server 80 port received the request forwarded to the 127.0.0.1:9000
Then using SSH to tunnel the server 9000 port mapped to my local development machine 80
SSH Tunnel Reference http://my.oschina.net/magicly007/blog/480706
Assume server external domain na
Creating an IP tunnel using GRE on Linux
Contents [Hide]· 1 IP tunelling· 2 Starting Configuration· 3 tunnelling ObjectiveO 3.1 Create TunnelsO 3.2 Additional RoutesO 3.3 Delete Tunnels· 4 Network DiagramO 4.1 Debian Configuration· 5 References
IP tunellingWe'll do IPv4 tunneling using GRE. GRE is a tunneling protocol this was originally developed by Cisco, and it can do a few more things than Ip-in-ip Tunnelin G. For examp
Address: Use IP tunnel to open up private network requirements
There are 2 isolated networks, and the topology is shown in the diagram below. ServerA want direct access to the private network of the ServerB connection
|
1.1.1.1 2.2.2.2 |
+---------+ public +---------+ | Private
| ServerA +-----------+ ServerB +-----+
+--------
[Experimental environment] veryhuo.com
C3640-IK9O3S-M Version 12.4 (10) veryhuo.com
[Tutorial Objective] Lie's Fire Network
The tunnel technology is used to expand the frame relay switch simulated by the router to make up for the insufficient frame relay interface caused by limited router interfaces. Lie-fire-network
[Experiment topology]
Liehuo.net
Veryhuo.com
[Experiment description] liehuo.net
In the experimental environment, because frame relay
return a response or response data to the server, and the server will forward it to the client. Servers and gateways are independent applications, so their responsibilities are clearly divided. This simple protocol (input request, transfer, and response) is the oldest and most commonly used Server Extension Interface CGI.
6. cgi applications are independent of servers, so they can be used in almost any language in advance. CGI processing is invisible to users. The client does not know the trans
This article attempts to describe what a VPN tunnel is in simple language and explains how VPN provides strong anonymous and privacy protection.
The operation performed by the VPN tunnel is called Data encapsulation. To understand what encapsulation is, let's make a simple analogy. If you are a political refugee living in another country, the secret of your place of residence is crucial to your personal saf
. Modprobe IPv6 again. Execution successful. The server already has an IPv6 address.
12.the operation log is on the Windows table, and ipv 6.txt is started"
13. Move to my documents> documents.
14. Establish a tunnel connection for the two machines
15. The ideas are summarized as follows:
① Specify the IPv6 address for the two machines.
② Enable tunnel on two machines, ifconfig sit0 up
③ Direc
1. First, load the kernel module ip_gre.o. the GRE module in the previous versions of kernal is ip_gre.o, and RHEL5 is called ip_gre.ko.
Modprobe-l | grep ip_gre.ko
The above command is to look at this module
Insmode/lib/modules/2.4.20-8/kernel/net/ipv4/ip_gre.ko
The above command loads the ip_gre.ko module.
Note that you need to load it again after each restart or logout.
2. Start the GRE Tunnel
Ip tunnel
Tags: SSH tunnel encrypted WiresharkUse the "SSH to build up" the tunnel access to other computer can make the communication encrypted and secured, tested on th E HTTP service by using the SSH tunnel access,1, use the Wireshark to capture the data without the SSH tunnel, host as 192.168.0.103, remote server as 192.168.
Article Title: Configure ipip and gre tunnels in Linux. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open-source, and other basic categories.
Create a ifcfg-tunl1 file under/etc/sysconfig/network-scripts
The content is as follows:
DEVICE = tunl1
TYPE = IPIP
PEER_OUTER_IPADDR = 219.216.98.110
MY_INNER_IPADDR = 10.0.1.1/24
Configuring the gre
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.