亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-vrrp-spec-v2-05.txt

?? VRRP雙機熱備份協議源嗎
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   virtual router is restricted to a single LAN.   To minimize network traffic, only the Master for each virtual router   sends periodic VRRP Advertisement messages.  A Backup router will not   attempt to pre-empt the Master unless it has higher priority.  This   eliminates service disruption unless a more preferred path becomes   available.  It's also possible to administratively prohibit all pre-   emption attempts.  The only exception is that a VRRP router will   always become Master of any virtual router associated with addresses   it owns.  If the Master becomes unavailable then the highest priority   Backup will transition to Master after a short delay, providing a   controlled transition of the virtual router responsibility with   minimal service interruption.   VRRP defines three types of authentication providing simple   deployment in insecure environments, added protection against   misconfiguration, and strong sender authentication in security   conscious environments.  Analysis of the protection provided and   vulnerability of each mechanism is deferred to Section 10.0 Security   Considerations.  In addition new authentication types and data can be   defined in the future without affecting the format of the fixed   portion of the protocol packet, thus preserving backward compatible   operation.   The VRRP protocol design provides rapid transition from Backup to   Master to minimize service interruption, and incorporates   optimizations that reduce protocol complexity while guaranteeing   controlled Master transition for typical operational scenarios.  Thedraft-ietf-vrrp-spec-v2-05.txt                                  [Page 7]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   optimizations result in an election protocol with minimal runtime   state requirements, minimal active protocol states, and a single   message type and sender.  The typical operational scenarios are   defined to be two redundant routers and/or distinct path preferences   among each router.  A side effect when these assumptions are violated   (i.e., more than two redundant paths all with equal preference) is   that duplicate packets may be forwarded for a brief period during   Master election.  However, the typical scenario assumptions are   likely to cover the vast majority of deployments, loss of the Master   router is infrequent, and the expected duration in Master election   convergence is quite small ( << 1 second ).  Thus the VRRP   optimizations represent significant simplifications in the protocol   design while incurring an insignificant probability of brief network   degradation.4.  Sample Configurations4.1  Sample Configuration 1   The following figure shows a simple network with two VRRP routers   implementing one virtual router.  Note that this example is provided   to help understand the protocol, but is not expected to occur in   actual practice.             +-----------+      +-----------+             |   Rtr1    |      |   Rtr2    |             |(MR VRID=1)|      |(BR VRID=1)|             |           |      |           |     VRID=1  +-----------+      +-----------+     IP A ---------->*            *<--------- IP B                     |            |                     |            |   ------------------+------------+-----+--------+--------+--------+--                                        ^        ^        ^        ^                                        |        |        |        |                                      (IP A)   (IP A)   (IP A)   (IP A)                                        |        |        |        |                                     +--+--+  +--+--+  +--+--+  +--+--+                                     |  H1 |  |  H2 |  |  H3 |  |  H4 |                                     +-----+  +-----+  +--+--+  +--+--+      Legend:               ---+---+---+--  =  Ethernet, Token Ring, or FDDI                            H  =  Host computer                           MR  =  Master Router                           BR  =  Backup Router                            *  =  IP Address                         (IP)  =  default router for hostsdraft-ietf-vrrp-spec-v2-05.txt                                  [Page 8]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   Eliminating all mention of VRRP (VRID=1) from the figure above leaves   it as a typical IP deployment.  Each router is permanently assigned   an IP address on the LAN interface (Rtr1 is assigned IP A and Rtr2 is   assigned IP B), and each host installs a static default route through   one of the routers (in this example they all use Rtr1's IP A).   Moving to the VRRP environment, each router has the exact same   permanently assigned IP address.  Rtr1 is said to be the IP address   owner of IP A, and Rtr2 is the IP address owner of IP B.  A virtual   router is then defined by associating a unique identifier (the   virtual router ID) with the address owned by a router.  Finally, the   VRRP protocol manages virtual router failover to a backup router.   The example above shows a virtual router configured to cover the IP   address owned by Rtr1 (VRID=1,IP_Address=A).  When VRRP is enabled on   Rtr1 for VRID=1 it will assert itself as Master, with priority=255,   since it is the IP address owner for the virtual router IP address.   When VRRP is enabled on Rtr2 for VRID=1 it will transition to Backup,   with priority=100, since it is not the IP address owner.  If Rtr1   should fail then the VRRP protocol will transition Rtr2 to Master,   temporarily taking over forwarding responsibility for IP A to provide   uninterrupted service to the hosts.   Note that in this example IP B is not backed up, it is only used by   Rtr2 as its interface address.  In order to backup IP B, a second   virtual router must be configured.  This is shown in the next   section.draft-ietf-vrrp-spec-v2-05.txt                                  [Page 9]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 20004.2  Sample Configuration 2   The following figure shows a configuration with two virtual routers   with the hosts spitting their traffic between them.  This example is   expected to be very common in actual practice.             +-----------+      +-----------+             |   Rtr1    |      |   Rtr2    |             |(MR VRID=1)|      |(BR VRID=1)|             |(BR VRID=2)|      |(MR VRID=2)|     VRID=1  +-----------+      +-----------+  VRID=2     IP A ---------->*            *<---------- IP B                     |            |                     |            |   ------------------+------------+-----+--------+--------+--------+--                                        ^        ^        ^        ^                                        |        |        |        |                                      (IP A)   (IP A)   (IP B)   (IP B)                                        |        |        |        |                                     +--+--+  +--+--+  +--+--+  +--+--+                                     |  H1 |  |  H2 |  |  H3 |  |  H4 |                                     +-----+  +-----+  +--+--+  +--+--+      Legend:               ---+---+---+--  =  Ethernet, Token Ring, or FDDI                            H  =  Host computer                           MR  =  Master Router                           BR  =  Backup Router                            *  =  IP Address                         (IP)  =  default router for hosts   In the example above, half of the hosts have configured a static   route through Rtr1's IP A and half are using Rtr2's IP B.  The   configuration of virtual router VRID=1 is exactly the same as in the   first example (see section 4.1), and a second virtual router has been   added to cover the IP address owned by Rtr2 (VRID=2, IP_Address=B).   In this case Rtr2 will assert itself as Master for VRID=2 while Rtr1   will act as a backup.  This scenario demonstrates a deployment   providing load splitting when both routers are available while   providing full redundancy for robustness.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 10]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 20005.0  Protocol   The purpose of the VRRP packet is to communicate to all VRRP routers   the priority and the state of the Master router associated with the   Virtual Router ID.   VRRP packets are sent encapsulated in IP packets.  They are sent to   the IPv4 multicast address assigned to VRRP.5.1  VRRP Packet Format   This section defines the format of the VRRP packet and the relevant   fields in the IP header.       0                   1                   2                   3       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |Version| Type  | Virtual Rtr ID|   Priority    | Count IP Addrs|      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |   Auth Type   |   Adver Int   |          Checksum             |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |                         IP Address (1)                        |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |                            .                                  |      |                            .                                  |      |                            .                                  |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |                         IP Address (n)                        |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |                     Authentication Data (1)                   |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      |                     Authentication Data (2)                   |      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+5.2  IP Field Descriptions5.2.1  Source Address   The primary IP address of the interface the packet is being sent   from.5.2.2  Destination Address   The IP multicast address as assigned by the IANA for VRRP is:       224.0.0.18draft-ietf-vrrp-spec-v2-05.txt                                 [Page 11]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   This is a link local scope multicast address.  Routers MUST NOT   forward a datagram with this destination address regardless of its   TTL.5.2.3  TTL   The TTL MUST be set to 255.  A VRRP router receiving a packet with   the TTL not equal to 255 MUST discard the packet.5.2.4  Protocol   The IP protocol number assigned by the IANA for VRRP is 112   (decimal).5.3 VRRP Field Descriptions5.3.1  Version   The version field specifies the VRRP protocol version of this packet.   This document defines version 2.5.3.2  Type   The type field specifies the type of this VRRP packet.  The only   packet type defined in this version of the protocol is:       1      ADVERTISEMENT   A packet with unknown type MUST be discarded.5.3.3  Virtual Rtr ID (VRID)   The Virtual Router Identifier (VRID) field identifies the virtual   router this packet is reporting status for.5.3.4  Priority   The priority field specifies the sending VRRP router's priority for   the virtual router.  Higher values equal higher priority.  This field   is an 8 bit unsigned integer field.   The priority value for the VRRP router that owns the IP address(es)   associated with the virtual router MUST be 255 (decimal).   VRRP routers backing up a virtual router MUST use priority values   between 1-254 (decimal).  The default priority value for VRRP routers   backing up a virtual router is 100 (decimal).draft-ietf-vrrp-spec-v2-05.txt                                 [Page 12]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   The priority value zero (0) has special meaning indicating that the   current Master has stopped participating in VRRP.  This is used to   trigger Backup routers to quickly transition to Master without having   to wait for the current Master to timeout.5.3.5  Count IP Addrs   The number of IP addresses contained in this VRRP advertisement.5.3.6  Authentication Type   The authentication type field identifies the authentication method   being utilized.  Authentication type is unique on a Virtual Router   basis.  The authentication type field is an 8 bit unsigned integer.   A packet with unknown authentication type or that does not match the   locally configured authentication method MUST be discarded.   The authentication methods currently defined are:      0 - No Authentication      1 - Simple Text Password      2 - IP Authentication Header5.3.6.1 No Authentication   The use of this authentication type means that VRRP protocol   exchanges are not authenticated.  The contents of the Authentication   Data field should be set to zero on transmission and ignored on   reception.5.3.6.2 Simple Text Password   The use of this authentication type means that VRRP protocol   exchanges are authenticated by a clear text password.  The contents   of the Authentication Data field should be set to the locally   configured password on transmission.  There is no default password.   The receiver MUST check that the Authentication Data in the packet   matches its configured authentication string.  Packets that do not   match MUST be discarded.   Note that there are security implications to using Simple Text   password authentication, and one should see the Security   Consideration section of this document.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
午夜精品久久一牛影视| 亚洲香肠在线观看| 成人高清免费在线播放| 国产精品无人区| 99久久久免费精品国产一区二区| 日韩毛片高清在线播放| 欧美丝袜自拍制服另类| 亚洲高清视频的网址| 欧美一区二区三区四区五区| 麻豆精品一区二区三区| 久久女同互慰一区二区三区| 成人毛片视频在线观看| 一区二区在线电影| 7777精品伊人久久久大香线蕉完整版 | 中文字幕av资源一区| 不卡一区二区在线| 亚洲sss视频在线视频| 欧美成人精品福利| www.在线欧美| 无码av中文一区二区三区桃花岛| 91精品免费观看| 国产盗摄一区二区三区| 一区二区三区在线看| 欧美一级搡bbbb搡bbbb| 成人免费黄色在线| 亚洲午夜国产一区99re久久| 精品精品国产高清一毛片一天堂| 波多野结衣亚洲一区| 午夜精品福利视频网站| 国产欧美视频在线观看| 欧美日韩美少妇| 国产成人亚洲综合a∨猫咪| 亚洲在线视频网站| 久久蜜桃av一区精品变态类天堂 | 国产精品影视在线观看| 亚洲猫色日本管| 精品福利av导航| 欧美在线免费视屏| 国产a级毛片一区| 奇米色一区二区| 亚洲激情五月婷婷| 久久精品一区二区三区不卡| 欧美日韩一区三区| 99国产精品久久久久久久久久久| 蜜臀久久久99精品久久久久久| 亚洲三级视频在线观看| 国产视频911| 日韩欧美自拍偷拍| 欧美三级中文字幕| 91丝袜高跟美女视频| 国产激情一区二区三区四区| 日韩影视精彩在线| 亚洲最快最全在线视频| 国产精品美女久久久久av爽李琼| 日韩欧美三级在线| 欧美高清你懂得| 欧美性受xxxx黑人xyx性爽| 不卡av在线免费观看| 国产福利一区二区三区视频| 久久草av在线| 日本不卡视频在线观看| 亚洲一本大道在线| 亚洲精品视频一区二区| 国产精品久久久久7777按摩| 2020国产精品| www激情久久| 久久婷婷一区二区三区| 欧美成人伊人久久综合网| 欧美日本不卡视频| 欧美色成人综合| 欧美日韩在线综合| 欧美日韩一区在线观看| 欧美日韩精品一区二区三区| 欧美日韩国产在线观看| 精品污污网站免费看| 欧美丝袜丝交足nylons| 欧美日韩日本视频| 欧美日韩国产综合草草| 5566中文字幕一区二区电影| 欧美日韩免费一区二区三区| 欧美视频一区在线| 欧美裸体一区二区三区| 欧美一区二区视频网站| 日韩欧美高清dvd碟片| 精品国产精品网麻豆系列| 久久女同精品一区二区| 中文字幕免费不卡| 亚洲欧美日韩国产成人精品影院| 亚洲男人电影天堂| 亚洲444eee在线观看| 日韩电影网1区2区| 韩国在线一区二区| 岛国一区二区在线观看| 91在线小视频| 欧美性猛交一区二区三区精品| 欧美裸体bbwbbwbbw| 精品欧美一区二区三区精品久久 | 午夜一区二区三区在线观看| 天天色天天操综合| 国内国产精品久久| av亚洲精华国产精华精| 日本丶国产丶欧美色综合| 欧美精品v国产精品v日韩精品 | 偷窥国产亚洲免费视频| 美国三级日本三级久久99| 国产精品123| 91丨九色丨黑人外教| 欧美性淫爽ww久久久久无| 日韩欧美一级特黄在线播放| 国产精品免费视频一区| 亚洲图片欧美色图| 黑人精品欧美一区二区蜜桃| 色综合婷婷久久| 日韩欧美色综合网站| 亚洲天天做日日做天天谢日日欢 | 91精品国产一区二区| 久久久精品天堂| 亚洲最新在线观看| 国产精品一区二区免费不卡| 色呦呦国产精品| 精品国产麻豆免费人成网站| 亚洲欧美日韩国产手机在线| 麻豆久久久久久| 91免费观看在线| 精品国产凹凸成av人网站| 一区二区理论电影在线观看| 精品一区二区免费在线观看| 99精品一区二区| 国产亚洲一区二区在线观看| 午夜精品久久一牛影视| 99视频精品全部免费在线| 日韩欧美亚洲国产精品字幕久久久| 综合精品久久久| 国产乱码字幕精品高清av| 欧美这里有精品| 国产精品视频yy9299一区| 蜜桃av噜噜一区| 欧美三级中文字| 亚洲天堂a在线| 成人一区二区三区视频| 欧美成人一区二区| 日韩国产在线观看一区| 色偷偷久久一区二区三区| 国产人成亚洲第一网站在线播放| 亚洲aⅴ怡春院| 欧美图片一区二区三区| 自拍偷拍国产亚洲| 成人免费福利片| 国产欧美日韩在线| 国内成人自拍视频| 日韩免费看的电影| 日韩和欧美的一区| 91精品国产品国语在线不卡| 亚洲不卡一区二区三区| 日本精品一级二级| 亚洲欧美日本韩国| 91视频国产资源| 亚洲色图.com| 99国产精品国产精品毛片| 欧美国产日本韩| 成人一级片在线观看| 欧美国产日韩a欧美在线观看| 国产一区美女在线| 久久久久国产免费免费| 国产精选一区二区三区| 精品国产免费视频| 国产美女一区二区三区| 久久久国产午夜精品| 国产成人在线视频免费播放| 国产清纯白嫩初高生在线观看91 | 亚洲欧美精品午睡沙发| 一本大道av一区二区在线播放| 国产精品护士白丝一区av| 99久久精品费精品国产一区二区| 最好看的中文字幕久久| 色婷婷久久久亚洲一区二区三区| 亚洲视频资源在线| 在线看不卡av| 秋霞国产午夜精品免费视频| 精品av久久707| 国产成人综合在线| 亚洲乱码日产精品bd| 欧洲精品视频在线观看| 丝袜亚洲另类欧美综合| 精品久久久久99| 成人高清视频在线观看| 亚洲国产中文字幕| 欧美一区欧美二区| 国产成人精品一区二区三区四区 | 91久久精品一区二区三区| 亚洲一区二区三区四区在线观看| 91精品久久久久久蜜臀| 国内精品第一页| 亚洲欧洲精品一区二区三区| 欧美日韩性生活| 国产综合色产在线精品| 一区二区三区在线高清| 日韩一区二区三区电影在线观看 | 一区二区高清视频在线观看| 欧美一级日韩免费不卡|