Answers to questions from netizens on January 30, 8.3 (2nd working weeks)

Source: Internet
Author: User

Answers to questions from netizens on January 30, 8.3 (2nd working weeks)

Answers to questions from netizens on January 30, 8.3 (2nd working weeks)


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/56/wKiom1Pne8nA4XrnAABaQMle6LI699.jpg "Title =" 6.png" alt = "wkiom1pne8na4xrnaw.mle6li699.jpg"/>

Answer 1:In fact, you don't have to worry about this kind of thing. These two software are used for graphic management devices. The method is the same as the goal. I think you should think about it like this, you can use the one that you think is handy with. If you want me to tell you how good or bad it is, my principle is: "New is always better than old"

Note: You need to control devices and software, instead of letting devices and software tie you down. Cisco has many business models, and there are new products every month. You can find out who is better or worse!


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/56/wKiom1PnfAbSkxIEAAH4Gi-HPLA573.jpg "Title =" 7.png" alt = "wKiom1PnfAbSkxIEAAH4Gi-HPLA573.jpg"/>

Answer 2:To put it simply, the VLAN is encapsulated in the VLAN to transmit the private VLAN through the public VLAN. I cannot explain this to you in one or two sentences, we recommend that you first read some books based on the second-layer VPN architecture. We recommend that you do not understand it separately. If you can understand the second-layer VPN (based on the data link layer, naturally, you will understand. This is an essential technology for telecom operators.


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/56/wKiom1PnfDyjYC4MAAC4I3umJrc913.jpg "Title =" 8.png" alt = "wkiom1pnfdyjyc4maac4i3umjrc913.jpg"/>

Answer 3:This is too much. Any version of the Microsoft Server can be used for the operating system, but you can say "there is still a ing on the vro." Where should you use a peanut shell, only peanut shells are relatively simple. There are also common home broadband routers.


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/56/wKioL1PnfYSQkhKrAADAlCVqGK4780.jpg "Title =" 9.png" alt = "wkiol1pnfysqkhkraadalcvqgk4780.jpg"/>

Answer 4:There are many such management software, which are basically based on desktop management, device management, and service management. However, SNMP, NetFlow, and most of them are commercial software. We recommend you a good book:

Original: Network managementaccounting and performance strategies

Chinese version: Network Management: billing and performance management policies

It is recommended that you read the English text and read it all. You can basically become a management expert and instruct developers to complete the development of management projects.

We recommend that you use:

Software available: AT-SNMPcV8_CN_Eval (downloadable)

Combined with video: http://edu.51cto.com/course/course_id-861.html

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/56/wKiom1PnfJnQq7C7AACq72RlXos618.jpg "Title =" 10.png" alt = "wkiom1pnfjnqq7c7aacq72rlxos618.jpg"/>

Answer 5:If the scanned string is Ro, it indicates read-only. In this status, you cannot use SNMP to intrude into the vro. However, you can attack its routing protocol and insert rogue routes, generally, the network administrator installs water in his mind. Remote Management usually uses Telnet. The Telnet password is not encrypted. If the Telnet password is captured, everything is OK, it is not difficult to implement this. There is a good book written by Americans dedicated to Cisco. The title of the book Cisco cyber hacker is too dark, but reading this book requires you to have a good foundation. You can try it.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/56/wKioL1Pnfeixj_lqAAFdi73go-c852.jpg "Title =" 11.png" alt = "wKioL1Pnfeixj_lqAAFdi73go-c852.jpg"/>Answer 6:The IP address assigned to the VPN Client by the VPN gateway of any manufacturer or device (or your VPN Server) must be in a subnet with the inside of the VPN Client, you only need to pay attention to the VPN route. The VPN route is not the same as the conventional route. It is a route that passes through the security tunnel to the target private network when your VPN dial-up is successful and an IP address has been obtained.


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/56/wKioL1PnfmfiKpkfAADPKITVXbE999.jpg "Title =" 12.png" alt = "wkiol1pnfmfikpkfaadpkitvxbe999.jpg"/>

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/56/wKiom1PnfX_ztVi0AADmIPxWwWo764.jpg "Title =" 13.png" alt = "wkiom1pnfx_ztvi0aadmipxwwwo764.jpg"/>


This article is from the "unknown Christ" blog, please be sure to keep this source http://7658423.blog.51cto.com/7648423/1538334

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.