亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? dynmnd.conf

?? mosquiteo mobile iP 4 the handover program
?? CONF
字號:
# $Id: dynmnd.conf,v 1.56 2001/10/20 13:36:07 jm Exp $# Mobile Node configuration file## Dynamic hierarchial IP tunnel# Copyright (C) 1998-2001, Dynamics group## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2 as# published by the Free Software Foundation. See README and COPYING for# more details.########################################################################## NOTE! #	This is an example configuration file designed to give#	perspective to the system configuration AND to provide#	a basis for a working simple test environment.#	The values of some of the parameters may not be the#	same as the daemon's defaults, so don't get confused.##	To get a minimal test working, you will need to check the#	following items:#	  * MNHomeIPAddress#	  * HAIPAddress#	  * EnableFADecapsulation#	  * HomeNetPrefix (if using FA decapsulation or#	    dynamics HA address resolution)#	  * SPI and SharedSecret#	The rest of the items should work with their preset values in#	most cases and they can be used to fine tune the operations#	after the basic operation have been tested successfully.########################################################################## The Mobile Nodes's IP address in the Home Network.# If using AAA (see UseAAA below), home address can be set to 0.0.0.0 in order# to request a home address from the AAA infrastructure. This requires that# also MN NAI is configured.MNHomeIPAddress 192.168.242.2# The Mobile Node's Network Access Identifier (NAI) [RFC2794]# If configured, this NAI is used in registration requests to identify the# mobile user for AAA services.## MNNetworkAccessIdentifier "user@example.com"# UseAAA < TRUE | FALSE >. TRUE enables AAA extensions (key requests using# material from AAA, HA and home address discovery using AAA, etc.). This# requires that MN NAI and AAA related items below are configured.# FALSE disables these extensions.UseAAA FALSE# The IP address of Mobile Node's Home Agent. In case of a private HA address# this is the address of the surrogate HA. If the HA address is unknown, set# this to 0.0.0.0 and make sure that HomeNetPrefix is correct for dynamic# HA address resolution or use AAA to discover HA address. If the HA has# multiple interfaces, this should be the address of the "public" interface,# i.e., the one toward default gateway (it has to be reachable from the foreign# networks).HAIPAddress 192.168.242.1# If the HA has more than one interfaces, HAIPAddress should be configured to# be the one reachable from the Internet (i.e., from the foreign networks the# MN may visit). To allows MN to detect other HA's interfaces, their IP# addresses may be configured here. MN will use this list in addition to# HAIPAddress when determining whether an agent advertisement is from its own# HA (i.e., when MN is at home). Multiple lines containing different addresses# may be used to configure more than one alternative HA address.# AlternativeHAIPAddress 10.1.2.3# AlternativeHAIPAddress 10.2.3.4# AllowHomeAddrFromForeignNet < TRUE | FALSE >. TRUE allows AAA to assign# a home agent and home address from the foreign network (assuming they are# set to 0.0.0.0 above). FALSE means that both the home agent and the home# address must be from the home domain.AllowHomeAddrFromForeignNet FALSE# The following configuration options PrivateHAIPAddress, PrivateHAIdentifier,# and HANetworkAccessIdentifier are only used with home networks that use# private IP addresses and a surrogate HA. In other cases they should be left# commented.# The private IP address of Mobile Node's Home Agent.# Needed only, if surrogate HA is used.# PrivateHAIPAddress 192.168.200.200# The identifier for the private HA in SHA (unique 32-bit number)# PrivateHAIdentifier 1# Home Agent Network Access Identifier (NAI)# If configured, this NAI is used to match the HA agent advertisements when# a MN is determining whether it is at home or not. This is mainly used with# private HA address that may not be globally unique.## HANetworkAccessIdentifier "ha@example.com"# EnableFADecapsulation < TRUE | FALSE >. TRUE enables a mode where# the FA decapsulates the IP-within-IP encapsulated IP packets.# FALSE disables this mode and sets the default mode where the # MN decapsulates the IP-within-IP encapsulated IP packets.# With FA decapsulation the MN uses its home address in the interface even in# the foreign network and with MN decapsulation MN needs to acquire a# co-located care-of address from the visited network (this needs an external# program; see man pages for more information).# The two modes cannot be used simultaneously.EnableFADecapsulation TRUE# Network address of home network (CIDR format: a.b.c.d/prefix_length)# This is used with FA decapsulation and dynamics HA address resolution. If# commented, the routing entry is not removed nor added. The home net entry# may optionally be used with MN decapsulation - see MNDecapsRouteHandling# option below.## Example: 192.168.242.0/24HomeNetPrefix 192.168.242.0/24# Home net default gateway# This entry can be used to force a gateway that the MN uses when it is# at home. If this is left commented, the MN tries to use the default route# that was in use when the program was started.## HomeNetGateway 192.168.242.254############################################################################## a SPI (Security Parameter Index) must be defined for every MN.# It is used for indexing the security association at the Home Agent.SPI 1000## The SharedSecret is provided as a HEX number string. The shared secret can# also be given as a character string # (e.g. character string "ABCDE" corresponds to HEX number string 4142434445).# Note: RFC 2002 specifies that the default key size is 128 bits (i.e.# 16 bytes or 32 hex 'characters'). Dynamics supports also other key lengths.# This shared secret is used with the HA. This must be commented out when using# AAA infrastructure for key generation. In this case, the AAA related items# below must be configured.# SharedSecret < shared secret ># SharedSecret 016A352B2F235ESharedSecret "test"## Authentication algorithm#    1: MD5/prefix+suffix (a.k.a. keyed-MD5) [RFC 2002]#    4: HMAC-MD5 [RFC 2104]#    5: SHA-1 [FIPS 180-1]#    6: HMAC-SHA1 [RFC 2104]# Note! MD5/prefix+suffix has known weaknesses and use of HMAC-MD5 is# recommented. MD5/prefix+suffix algorithm is for backwards compatability with# older versions that do not support more secure HMAC-MD5.AuthenticationAlgorithm 4## Replay prevention method:#   0: none#   1: time stamps#   2: noncesReplayMethod 1## Mobile Node may have optional security associations with Foreign# Agents. If the security association exists an additional Mobile Node -# Foreign Agent Authentication Extension is added to the registration requests.## The following list contains the shared secrets indexed by SPI (and# Foreign Agent IP address). The algorithm field specifies the method# used for key distribution (see the list above). The format of the share# secret field is identical to the one used with the MN-HA security# association list above.#FA_SECURITY_BEGIN# SPI		FA IP		Alg.	Shared Secret#2001		192.168.0.1	4	0123456789ABCDEF#2002		192.168.0.2	4	"eslkfj89jr3hduh3R!as"FA_SECURITY_END# MN-AAA Authentication and Challenge/Response [RFC3012]# If the MN does not have a security association with an FA, it may use AAA# infrastructure for authentication. If this is used, also MN NAI# ('MNNetworkAccessIdentifier' above) should be configured.# SPI to be used in MN-AAA authentication.# Reserved SPI values:#   2 = CHAP_SPI, CHAP style authentication using MD5 [RFC 3012]#   3 = MD5/prefix+suffix [draft-ietf-mobileip-aaa-key-03.txt]#   4 = HMAC MD5 [draft-ietf-mobileip-aaa-key-03.txt]# MN-AAA-SPI 12345# Shared secret for MN-AAA authentication (see 'SharedSecret' above for format# instructions)# MN-AAA-SharedSecret "test"# Algorithms to be used for MN-AAA authentication and key generation#   1 = MD5/prefix+suffix (RFC 2002)#   2 = RADIUS authentication (Sec. 8 of RFC 3012)#   3 = MD5/prefix+suffix (RFC 2002)  (alias for 1 above)#   4 = HMAC-MD5 (Sec. 6 of RFC 3012; RFC 2104)#   5 = SHA-1 (FIPS 180-1)#   6 = HMAC-SHA1 (RFC 2104)# Note: with algorithm 2, 'MN-AAA-SPI' should be set to reserved number# CHAP_SPI (default: 2).# MN-AAA-AuthenticationAlgorithm 4# MN-AAA-KeyGenerationAlgorithm 4############################################################################## TunnelingMode < 1 | 2 | 3 | 4 ># The packets between the MN and a Correspondent Node (CN) can be routed using# different routes. This option can be used to select, which mode will be# selected.# Possible values:# 1 = automatic, prefer reverse tunnel (i.e. bi-directional tunnel)# 2 = automatic, prefer triangle tunnel (i.e. tunnel only in CN->MN direction)# 3 = accept only reverse tunnel# 4 = accept only triangle tunnelTunnelingMode 1# When MN can get its own co-located care-of address and use reverse tunneling,# the normal method is to set the default route to the tunnel. This means that# all the packets destined to other networks than the current subnet in the# visited network are send via the HA. If the co-located COA is public, it can# be used for sessions that do not need constant IP address (e.g. most of the# web browsing). The following configuration option specifies the routing# operation that is used with the co-located COA.# Possible values:#   0 = set default route to the tunnel#   1 = set only the home net route to the tunnel (the above HomeNetPrefix#       options must be set)#   2 = do not change the routing entries (i.e. some external means must be#       used to direct traffic to the tunnel, e.g. manually adding host route#       to a specific host)MNDecapsRouteHandling 0# DefaultTunnelLifetime is the lifetime suggested in registration# The lifetime is defined in seconds, default value is 300.# The request timer will be set according to this value. If the FA's agent# advertisment has a smaller time, it is used instead.# Special case: 65535 (or more) seconds means unlimited time (the binding will# not expire)# MNDefaultTunnelLifetime [ seconds ]MNDefaultTunnelLifetime 300# UDP port to be used for sending registration requests# Port 434 is allocated for Mobile IP signaling and this should not be changed# unless the network is known to use some other port (i.e. all the FAs and HAs# must have the same port configured).UDPPort 434# Socket priority for signaling sockets (UDP) can be set with SO_PRIORITY to# allow easier QoS configuration. If this argument is set, the given value is# used as a priority for the signaling socket. E.g. CBQ class can be used to# make sure that signaling is not disturbed by other traffic on a congested# link.# This feature is still undocumented and can be left commented.## SocketPriority 1# The log messages are written through syslog service. The facility to be# used defaults to LOG_LOCAL0, but it can be set with this parameter# to any of the possible facilities (LOG_AUTHPRIV, LOG_DAEMON, and so on).# The processing of log messages is defined in /etc/syslog.conf file.SyslogFacility LOG_DAEMON# Ignore these interfaces. No agent advertisements are received nor# agent solicitations sent for these interfaces.IGNORE_INTERFACES_BEGINlodummy0tunl0 gre0IGNORE_INTERFACES_END# Other programs may set routing entries so that the data connection may# fail. The MN can try to enforce the routes that it believes should be used.# This operation should currently be used only with FA decapsulation. If the# route enforcement is activated the MN daemon prevents certain route changes.EnforceRoutes FALSE# MN can be instructed to poll for current AP address when using a wireless# LAN driver that supports wireless extensions. This can be used to speed up# handoffs when using managed mode (BSS).# Polling interval is configured in micro seconds# (i.e., 1000000 equals to 1 second)# -1 = AP polling disabledAPPollingInterval -1# MN can be instructed to send periodic agent solicitations to find new FAs.# Normally, MN uses agent solicitations when it does not have a valid agent# advertisement. Periodic solicitation occurs even if the connection seems to# be up. This will cause more broadcast messages and is thus disabled in the# default configuration, but it can speed up handoffs in some environments.# Solicitation interval is configured in micro seconds (usec)# (i.e., 1000000 usec equals to 1 second). A rnadom time between 0 and 0.5# second will be added to solicitation intervals to prevent unwanted# synchronization of broadcast messages. In addition, solicitations will not be# send more often than once per second, so this interval should not be# configured to be less than 1000000 usec.# -1 = Periodic agent solicitation disabledSolicitationInterval -1############################################################################## Mobile Nodes use unix domain sockets to communicate through their API# interfaces.# The group and owner must be names as strings, no groupIDs or userIDs are# allowed. The file permissions are set in octal values like in chmod(1).# The configuration parameters of the two API sockets are as follows:MNAPIReadSocketPath "/var/run/dynamics_mn_read"MNAPIReadSocketGroup "root"MNAPIReadSocketOwner "root"MNAPIReadSocketPermissions 0666#MNAPIAdminSocketPath "/var/run/dynamics_mn_admin"MNAPIAdminSocketGroup "root"MNAPIAdminSocketOwner "root"MNAPIAdminSocketPermissions 0700## Every configuration file must end to the keyword 'END'.END

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
k8久久久一区二区三区 | 精品一区二区三区免费观看| 久久综合999| 91成人在线免费观看| 久久99精品视频| 亚洲综合视频网| 中文天堂在线一区| 日韩一区二区免费视频| 风间由美一区二区三区在线观看 | 久久国产精品99精品国产| 国产精品久久毛片| 日韩欧美一二区| 99re热这里只有精品视频| 喷水一区二区三区| 亚洲成人av一区二区| 久久久久久久久97黄色工厂| 欧美一区二区三区男人的天堂| av亚洲精华国产精华| 精品一区二区三区在线播放视频| 亚洲一区电影777| 亚洲国产成人私人影院tom| 91精品国产丝袜白色高跟鞋| 欧美午夜影院一区| 一本大道av伊人久久综合| 成人激情小说网站| 国产精品99久久久久久宅男| 久久99精品国产91久久来源| 视频一区国产视频| 午夜视黄欧洲亚洲| 亚洲国产毛片aaaaa无费看| 亚洲精品成人精品456| 中文字幕一区免费在线观看| 欧美国产日本韩| 国产情人综合久久777777| 久久久精品国产免费观看同学| 精品欧美一区二区在线观看| 日韩一区二区三区在线视频| 欧美精品日韩一区| 欧美精品精品一区| 欧美一级免费观看| 欧美一区二区三区视频在线观看| 欧美老肥妇做.爰bbww| 欧美日韩黄色一区二区| 欧美日韩国产乱码电影| 欧美剧情片在线观看| 制服丝袜av成人在线看| 日韩一区和二区| 精品欧美乱码久久久久久1区2区 | 欧美大片一区二区三区| 日韩免费一区二区三区在线播放| 日韩午夜激情av| 精品第一国产综合精品aⅴ| 欧美精品一区二区在线播放| 久久精品日韩一区二区三区| 国产精品久久久99| 日韩码欧中文字| 亚洲国产成人va在线观看天堂| 亚洲一卡二卡三卡四卡 | 男人的j进女人的j一区| 日本成人在线电影网| 久久99久久久久| 国产91综合一区在线观看| 99精品视频免费在线观看| 欧美中文一区二区三区| 6080午夜不卡| 国产欧美一区二区精品秋霞影院| 国产精品不卡在线| 亚洲国产日日夜夜| 久久精品99国产国产精| 国产99久久久国产精品| 欧美伊人久久大香线蕉综合69| 91精品国产aⅴ一区二区| 久久久蜜桃精品| 亚洲精品免费在线| 免费成人av在线| www国产精品av| ...av二区三区久久精品| 亚洲地区一二三色| 国产精品中文字幕日韩精品| 色噜噜偷拍精品综合在线| 日韩午夜激情av| 亚洲同性同志一二三专区| 蜜桃视频一区二区三区| 成人免费电影视频| 欧美精品18+| 国产嫩草影院久久久久| 午夜激情综合网| 国产成人亚洲精品青草天美| 欧美中文字幕久久| 国产日韩精品一区二区浪潮av| 亚洲一区二区三区中文字幕在线| 国产一区二区三区不卡在线观看| 色噜噜狠狠色综合中国| 亚洲精品在线免费播放| 亚洲午夜影视影院在线观看| 国产成人午夜电影网| 欧美在线视频不卡| 欧美激情中文字幕| 美女网站视频久久| 91久久精品一区二区二区| 久久久久久久久久久久久久久99 | 国产亚洲精品超碰| 午夜欧美2019年伦理| www.视频一区| 2022国产精品视频| 日韩专区中文字幕一区二区| 色综合久久久久综合| 国产亚洲精品久| 久久99久久99| 777亚洲妇女| 亚洲国产乱码最新视频| yourporn久久国产精品| 精品国产凹凸成av人导航| 午夜伦理一区二区| 色综合久久久久| 日本成人在线网站| 欧美日韩精品高清| 亚洲一区二区高清| 色噜噜狠狠色综合欧洲selulu| 国产精品女同一区二区三区| 国产一区不卡在线| 日韩美一区二区三区| 日韩和的一区二区| 欧美日韩中文字幕一区| 最新不卡av在线| 成人av动漫网站| 国产精品理论片| 成人丝袜18视频在线观看| 久久免费视频一区| 久久99国产精品免费网站| 欧美一区二区三区电影| 日韩黄色免费电影| 日韩欧美在线不卡| 蜜臀91精品一区二区三区| 日韩女优av电影| 麻豆国产欧美日韩综合精品二区| 7777女厕盗摄久久久| 日本不卡免费在线视频| 91精品国产入口| 久久99精品网久久| 久久久99久久精品欧美| 粉嫩蜜臀av国产精品网站| 亚洲国产精品激情在线观看| 成人免费毛片app| |精品福利一区二区三区| 91在线无精精品入口| 亚洲精选在线视频| 欧美日韩在线一区二区| 日本一不卡视频| 日韩欧美激情在线| 国产福利一区二区三区视频在线 | 26uuu另类欧美| 国产精品一二三| 最新久久zyz资源站| 欧美视频三区在线播放| 日本人妖一区二区| 日韩福利视频导航| 欧美不卡激情三级在线观看| 韩国v欧美v日本v亚洲v| 国产亚洲欧美在线| 91免费精品国自产拍在线不卡 | 亚洲444eee在线观看| 正在播放亚洲一区| 激情综合色综合久久| 国产精品国产自产拍高清av| 日本韩国欧美在线| 日韩国产在线一| 久久久久国产成人精品亚洲午夜| 白白色亚洲国产精品| 五月天婷婷综合| 国产天堂亚洲国产碰碰| 一本色道**综合亚洲精品蜜桃冫 | 北条麻妃国产九九精品视频| 樱花草国产18久久久久| 日韩你懂的电影在线观看| 高清视频一区二区| 亚洲高清不卡在线| 久久综合久久99| 欧美亚洲一区二区三区四区| 蜜桃精品视频在线| 亚洲免费资源在线播放| 日韩精品一区国产麻豆| 91亚洲国产成人精品一区二区三 | 免费成人美女在线观看| 国产免费成人在线视频| 欧美日韩中文字幕一区| 高清在线观看日韩| 爽好久久久欧美精品| 国产女同性恋一区二区| 欧美日韩在线免费视频| 成人视屏免费看| 午夜国产精品一区| 最新日韩av在线| 久久新电视剧免费观看| 欧美视频精品在线| 成人黄色在线视频| 美腿丝袜在线亚洲一区| 亚洲综合色视频| 国产精品三级在线观看| 日韩一区二区高清|