IS-IS Basic ConceptsTechnorati label: CCIS, ISP, IS-IS, IS first. ISIS --- Intermediate System-Intermediate system ---- Intermediate system terminology: IS: Intermediate System Intermediate system (Router) DIS: Designated Intermediate system specify Intermediate system (Designated Router) ES: end system (Host) SysID: System ID (Router ID) PDU: Packet data unit packet data unit (IP Packet) LSP: link State Protocol Data unit Link State Data unit (ospf l
(config-if) # ip add 3.3.3.3 255.255.255.255 P (config-if) # no sh R4PE2 (config) # int f0/0PE2 (config-if) # ip add 100.1.1.6 255.255.255.252PE2 (config-if) # no shPE2 (config) # int F0/1PE2 (config-if) # ip add 192.168.2.1 255.255.255.0PE2 (config-if) # no shPE2 (config) # int lo0PE2 (config-if) # ip add 4.4.4.4 255.255.255.255 R5: CE2 (config) # int s0/1CE2 (config-if) # ip add 192.168.2.2 255.255.255.0CE2 (config-if) # no shCE2 (config) # int lo0CE2 (config-if) # ip add 5.5.5.5 255.255.255.
IP OSPF priority command?Router-id 223.255.255.255.Why not 255.255.255.255? Because BGP can only recognize 223.255.255.255, if you set a Router-id greater than 223.255.255.255, BGP and OSPF redistribution will be problematic ( BGP and OSPF must use the same router-id when doing BGP and OSPF redistribution
Some of the other redistribution considerations:
1. Redistribution only once on the same router. If you redistribute the RIP into OSPF and then reassign OSPF to
The links listed below are online documents, and enthusiasts who are interested in information security can serve as an introductory guide.
Background knowledge
General knowledge
Sun Certified-solaris 910 Security Administrator Learning Guide
PICOCTF Information
Application software Security
Code specification for owasp security Code
Vulnerability Mining
Windows ISV Software Security Defense
Mobile Security
OWASP Ten mobile phone security risks
Network security
General Network Attack type
Revers
Is-is neighbors cannot establish the following troubleshooting:
Network environment
The Is-is routing protocol is run between two NE80, and a Ip-trunk interface is connected through the transmission via 3 2.5G POS interface. Ip-trunk link status is up, two NE80 devices can ping each other, but cannot establish is-is neighbor relationship.
Fault analysis
There may be several reasons for this
Is-is configuration is inconsistent on step 12 devices.
Step 22 device versions are inco
and ISIS two kinds of IGP protocols, and OSPF should be much wider than ISIS, the students who understand OSPF and the number of OSPF are far greater than ISIS, so it is more necessary to have a good review Spf--shorest path Tree's path selection principle.
Here again to review the SPF algorithm, understanding of SPF, CSPF is based on SPF evolved. It is also a
:
[Root @ localhost src] # wget https://gist.githubusercontent.com/JimWestergren/3053250/raw/d9e279e31cbee4a1520f59108a4418ae396b2dde/index-with-redis.php[Root @ localhost src] # chown php-fpm: php-fpm index-with-redis.php[Root @ localhost src] # mv predis. php index-with-redis.php/data/www/blog
Modify the index-with-redis.php as needed as follows:$ Cf = 0; // set to 1 if you are using cloudflare$ Debug = 1; // set to 1 if you want to see execution ti
. '; fixed. '; Case self: NOT_VULN: return'; the patch status cannot be identified ';. $ host.';. IIS is not used and the vulnerability may not exist. '; Case self: NOT_VULN_MS: return'; the patch status cannot be identified ';. $ host.';. The vulnerability may not exist. '; Case self: NOT_VULN_CF: return';. $ host. '; CloudFlare CDN acceleration may be used, leading to vulnerability detection or non-existent. ';} Return'; seems to be broken '; ;}$ ho
://ajax.cloudflare.com; img-src 'self' https://ssl.google-analytics.com ; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; font-src 'self' https://fonts.googleapis.com https://fonts.gstatic.com; object-src 'none'";
After I restart my nginx server, securityheaders is displayed. i/O's current security rating for the website: Get A + (enable HPKP) HPKP working mechanism: it will allow the browser to automatically query the HPKP header, check whether these pin codes match the SPKI
symmetric encryption, because the ChaCha20-Poly1305 is a AEAD mode, MAC algorithms are not required, so the MAC column is displayed as AEAD.
To learn more about CipherSuite, read the long article "TLS protocol analysis and modern encrypted communication protocol design". In short, when configuring CipherSuite, you must refer to the authoritative documentation, such as the recommended configuration of Mozilla and the configuration used by CloudFlare.
Today, I found that the host could not be accessed. I thought there was something wrong with burst. I wrote an email asking why. I accidentally saw an email written by burst in my inbox, the title is that the traffic usage exceeds the standard. I can only use surprise to describe this email, because the traffic of the purchased VPs is 1000 GB/month. How can this problem be solved? What surprised me more, I used veportal to check that the traffic usage was 23424.44 GB. I relied on it for more tha
Talking about JavaScript-based DDOS attacks and javascriptddos
CloudFlare protects millions of websites and summarizes the oldest and most common non-DDoS attacks. In traditional DDoS attacks, attackers can control a large number of bots and then send a large number of requests to the target server to prevent legal users from accessing the website.
However, in recent years, DDoS attack technologies have been constantly updated: attackers use a new an
significance of the problem.
Cloudflare had a significant outage as a result of the leap second. Cloudflare is exactly the kind of company, that should is able to use Go successfully.
This meant, the problem is too important to being left unresolved. So fixed the underlying problem, and did so without adding a new API.
Explaining gradual code repair
Another problem that comes up in large codebases was the
This is an article by Cloudflare Filippo Valsorda, published in Gopher Academy in 2016, although it has been in the past two years, but it still has meaning.
Previously crypto/tls too slow and net/http very young, so for Go Web server, it is usually wise of us to put it behind the reverse proxy, such as Nginx, and now do not need.
In CloudFlare we recently experimented with direct burst of pure go service a
1, use Web/dir_scanner2, set TARGET http://www.****.com3, runsource:https://sourceforge.net/projects/websploit/Websploit advanced MITM framework[+]autopwn–used from Metasploit for Scan and Exploit Target service[+]wmap–scan,crawl Er Target used from Metasploit wmap plugin[+]format infector–inject Reverse bind payload to file Format[+]phpmya DMin scanner[+]cloudflare Resolver[+]lfi bypasser[+]apache Users scanner[+]dir bruter[+]admin Finder[+]MLITM at
SPDY indicator This extension, if the site support HTTP/2 then automatically display as blue, if Gray is not supported, in addition to Chrome51 later need to support ALPN, Otherwise demote to http/1.1OpenSSL versionALPN needs OpenSSL 1.0.2 support, the current Oneinstack version has been supported OpenSSL 1.0.2, you can enter nginx-v for viewing.
Nginx HTTPS optimization
On the V2 to see a user sharing the configuration rules, measured running points have significantly improved, you can dir
information can be processed in storage.
(2) Support batch URI query
(3) Support for specifying a custom JSON format fingerprint rule file
(The default fingerprint file is placed in/usr/lib/perl5/www/apps.json, the path will vary depending on the installation path of the CPAN module.)
You can use Perl-v to see the @inc variable to determine the path, or more violent find.
Installation:
Cpan-i Www::wappalyzerClone Https://github.com/tanjiti/FingerPrint.git
Run:
(1) Obtaining a fingerprin
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.