亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-vrrp-spec-v2-05.txt

?? VRRP雙機熱備份協議源嗎
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
        packet (including fixed fields, IP Address(es), and        Authentication Data).      - MUST verify the VRRP checksum      - MUST verify that the VRID is configured on the receiving        interface and the local router is not the IP Address owner        (Priority equals 255 (decimal)).      - MUST verify that the Auth Type matches the locally configured        authentication method for the virtual router and perform that        authentication method   If any one of the above checks fails, the receiver MUST discard the   packet, SHOULD log the event and MAY indicate via network management   that an error occurred.      - MAY verify that "Count IP Addrs" and the list of IP Address        matches the IP_Addresses configured for the VRID   If the above check fails, the receiver SHOULD log the event and MAY   indicate via network management that a misconfiguration was detected.   If the packet was not generated by the address owner (Priority does   not equal 255 (decimal)), the receiver MUST drop the packet,   otherwise continue processing.      - MUST verify that the Adver Interval in the packet is the same as        the locally configured for this virtual router   If the above check fails, the receiver MUST discard the packet,   SHOULD log the event and MAY indicate via network management that a   misconfiguration was detected.7.2 Transmitting VRRP Packets   The following operations MUST be performed when transmitting a VRRP   packet.      - Fill in the VRRP packet fields with the appropriate virtual        router configuration state      - Compute the VRRP checksumdraft-ietf-vrrp-spec-v2-05.txt                                 [Page 20]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000      - Set the source MAC address to Virtual Router MAC Address      - Set the source IP address to interface primary IP address      - Set the IP protocol to VRRP      - Send the VRRP packet to the VRRP IP multicast group   Note: VRRP packets are transmitted with the virtual router MAC   address as the source MAC address to ensure that learning bridges   correctly determine the LAN segment the virtual router is attached   to.7.3 Virtual Router MAC Address   The virtual router MAC address associated with a virtual router is an   IEEE 802 MAC Address in the following format:      00-00-5E-00-01-{VRID} (in hex in internet standard bit-order)   The first three octets are derived from the IANA's OUI.  The next two   octets (00-01) indicate the address block assigned to the VRRP   protocol.  {VRID} is the VRRP Virtual Router Identifier.  This   mapping provides for up to 255 VRRP routers on a network.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 21]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 20008.  Operational Issues8.1 ICMP Redirects   ICMP Redirects may be used normally when VRRP is running between a   group of routers.  This allows VRRP to be used in environments where   the topology is not symmetric.   The IP source address of an ICMP redirect should be the address the   end host used when making its next hop routing decision.  If a VRRP   router is acting as Master for virtual router(s) containing addresses   it does not own, then it must determine which virtual router the   packet was sent to when selecting the redirect source address.  One   method to deduce the virtual router used is to examine the   destination MAC address in the packet that triggered the redirect.   It may be useful to disable Redirects for specific cases where VRRP   is being used to load share traffic between a number of routers in a   symmetric topology.8.2  Host ARP Requests   When a host sends an ARP request for one of the virtual router IP   addresses, the Master virtual router MUST respond to the ARP request   with the virtual MAC address for the virtual router.  The Master   virtual router MUST NOT respond with its physical MAC address.  This   allows the client to always use the same MAC address regardless of   the current Master router.   When a VRRP router restarts or boots, it SHOULD not send any ARP   messages with its physical MAC address for the IP address it owns, it   should only send ARP messages that include Virtual MAC addresses.   This may entail:    - When configuring an interface, VRRP routers should broadcast a      gratuitous ARP request containing the virtual router MAC address      for each IP address on that interface.    - At system boot, when initializing interfaces for VRRP operation;      delay gratuitous ARP requests and ARP responses until both the IP      address and the virtual router MAC address are configured.8.3 Proxy ARP   If Proxy ARP is to be used on a VRRP router, then the VRRP router   must advertise the Virtual Router MAC address in the Proxy ARPdraft-ietf-vrrp-spec-v2-05.txt                                 [Page 22]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   message.  Doing otherwise could cause hosts to learn the real MAC   address of the VRRP router.8.4 Potential Forwarding Loop   A VRRP router SHOULD not forward packets addressed to the IP   Address(es) it becomes Master for if it is not the owner.  Forwarding   these packets would result in unnecessary traffic.  Also in the case   of LANs that receive packets they transmit (e.g., token ring) this   can result in a forwarding loop that is only terminated when the IP   TTL expires.   One such mechanism for VRRP routers is to add/delete a reject host   route for each adopted IP address when transitioning to/from MASTER   state.9.  Operation over FDDI, Token Ring, and ATM LANE9.1 Operation over FDDI   FDDI interfaces remove from the FDDI ring frames that have a source   MAC address matching the device's hardware address.  Under some   conditions, such as router isolations, ring failures, protocol   transitions, etc., VRRP may cause there to be more than one Master   router.  If a Master router installs the virtual router MAC address   as the hardware address on a FDDI device, then other Masters'   ADVERTISEMENTS will be removed from the ring during the Master   convergence, and convergence will fail.   To avoid this an implementation SHOULD configure the virtual router   MAC address by adding a unicast MAC filter in the FDDI device, rather   than changing its hardware MAC address.  This will prevent a Master   router from removing any ADVERTISEMENTS it did not originate.9.2  Operation over Token Ring   Token ring has several characteristics that make running VRRP   difficult. These include:    - In order to switch to a new master located on a different bridge      token ring segment from the previous master when using source      route bridges, a mechanism is required to update cached source      route information.    - No general multicast mechanism supported across old and new tokendraft-ietf-vrrp-spec-v2-05.txt                                 [Page 23]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000      ring adapter implementations. While many newer token ring adapters      support group addresses, token ring functional address support is      the only generally available multicast mechanism. Due to the      limited number of token ring functional addresses these may      collide with other usage of the same token ring functional      addresses.   Due to these difficulties, the preferred mode of operation over token   ring will be to use a token ring functional address for the VRID   virtual MAC address. Token ring functional addresses have the two   high order bits in the first MAC address octet set to B'1'.  They   range from 03-00-00-00-00-80 to 03-00-02-00-00-00 (canonical format).   However, unlike multicast addresses, there is only one unique   functional address per bit position. The functional addresses   addresses  03-00-00-10-00-00 through 03-00-02-00-00-00 are reserved   by the Token Ring Architecture [TKARCH] for user-defined   applications.  However, since there are only 12 user-defined token   ring functional addresses, there may be other non-IP protocols using   the same functional address. Since the Novell IPX [IPX] protocol uses   the 03-00-00-10-00-00 functional address, operation of VRRP over   token ring will avoid use of this functional address. In general,   token ring VRRP users will be responsible for resolution of other   user-defined token ring functional address conflicts.   VRIDs are mapped directly to token ring functional addresses. In   order to decrease the likelihood of functional address conflicts,   allocation will begin with the largest functional address. Most non-   IP protocols use the first or first couple user-defined functional   addresses and it is expected that VRRP users will choose VRIDs   sequentially starting with 1.      VRID      Token Ring Functional Address      ----      -----------------------------         1             03-00-02-00-00-00         2             03-00-04-00-00-00         3             03-00-08-00-00-00         4             03-00-10-00-00-00         5             03-00-20-00-00-00         6             03-00-40-00-00-00         7             03-00-80-00-00-00         8             03-00-00-01-00-00         9             03-00-00-02-00-00        10             03-00-00-04-00-00        11             03-00-00-08-00-00   Or more succinctly, octets 3 and 4 of the functional address are   equal to (0x4000 >> (VRID - 1)) in non-canonical format.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 24]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   Since a functional address cannot be used used as a MAC level source   address, the real MAC address is used as the MAC source address in   VRRP advertisements. This is not a problem for bridges since packets   addressed to functional addresses will be sent on the spanning-tree   explorer path [802.1D].   The functional address mode of operation MUST be implemented by   routers supporting VRRP on token ring.   Additionally, routers MAY support unicast mode of operation to take   advantage of newer token ring adapter implementations that support   non-promiscuous reception for multiple unicast MAC addresses and to   avoid both the multicast traffic and usage conflicts associated with   the use of token ring functional addresses. Unicast mode uses the   same mapping of VRIDs to virtual MAC addresses as Ethernet.  However,   one important difference exists. ARP request/reply packets contain   the virtual MAC address as the source MAC address. The reason for   this is that some token ring driver implementations keep a cache of   MAC address/source routing information independent of the ARP cache.   Hence, these implementations need have to receive a packet with the   virtual MAC address as the source address in order to transmit to   that MAC address in a source-route bridged network.   Unicast mode on token ring has one limitation that should be   considered.  If there are VRID routers on different source-route   bridge segments and there are host implementations that keep their   source-route information in the ARP cache and do not listen to   gratuitous ARPs, these hosts will not update their ARP source-route   information correctly when a switch-over occurs. The only possible   solution is to put all routers with the same VRID on the same source-   bridge segment and use techniques to prevent that bridge segment from   being a single point of failure. These techniques are beyond the   scope this document.   For both the multicast and unicast mode of operation, VRRP   advertisements sent to 224.0.0.18 should be encapsulated as described   in [RFC1469].9.3  Operation over ATM LANE   Operation of VRRP over ATM LANE on routers with ATM LANE interfaces   and/or routers behind proxy LEC's are beyond the scope of this   document.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 25]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 200010. Security Considerations   VRRP is designed for a range of internetworking environments that may   employ different security policies.  The protocol includes several   authentication methods ranging from no authentication, simple clear   text passwords, and strong authentication using IP Authentication   with MD5 HMAC.  The details on each approach including possible   attacks and recommended environments follows.   Independent of any authentication type VRRP includes a mechanism   (setting TTL=255, checking on receipt) that protects against VRRP   packets being injected from another remote network.  This limits most   vulnerabilities to local attacks.   The security measures discussed in the following sections only   provide various kinds of authentication.  No confidentiality is   provided.  Confidentiality is not necessary for the correct operation   of VRRP and there is no information in the VRRP messages that must be   kept secret from other nodes on the LAN.10.1 No Authentication   The use of this authentication type means that VRRP protocol   exchanges are not authenticated.  This type of authentication SHOULD   only be used in environments were there is minimal security risk and   little chance for configuration errors (e.g., two VRRP routers on a   LAN).10.2 Simple Text Password   The use of this authentication type means that VRRP protocol

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成在线观看| 久久久欧美精品sm网站| 亚洲黄网站在线观看| 一本高清dvd不卡在线观看| 自拍偷自拍亚洲精品播放| 96av麻豆蜜桃一区二区| 亚洲永久免费视频| 欧美精品 日韩| 久久99精品一区二区三区三区| 欧美成人伊人久久综合网| 风间由美一区二区三区在线观看 | 日韩精品综合一本久道在线视频| 免费欧美日韩国产三级电影| 精品99一区二区| 成人毛片在线观看| 亚洲一区二区三区视频在线播放| 在线成人av网站| 国内精品嫩模私拍在线| 亚洲人妖av一区二区| 欧美午夜精品免费| 国内精品免费在线观看| **欧美大码日韩| 91精品久久久久久久91蜜桃| 国产一区二区三区在线看麻豆| 国产精品黄色在线观看| 欧美性受xxxx| 国精产品一区一区三区mba视频| 国产精品的网站| 日韩精品中文字幕在线不卡尤物| 成人午夜在线视频| 日韩**一区毛片| 中文字幕精品一区二区三区精品| 欧洲精品中文字幕| 国产一区在线观看麻豆| 亚洲色图清纯唯美| wwww国产精品欧美| 欧美三级电影在线看| 国产ts人妖一区二区| 五月天激情小说综合| 国产精品美女久久久久aⅴ| 欧美三区在线观看| av电影在线观看一区| 精品在线观看视频| 亚洲国产精品一区二区尤物区| 国产午夜精品久久久久久久| 欧美日韩国产小视频在线观看| 国产二区国产一区在线观看| 五月婷婷综合激情| 亚洲蜜臀av乱码久久精品| 精品国产乱码久久久久久夜甘婷婷| 欧美在线观看视频一区二区 | 91精品国产入口| 色综合久久综合网97色综合| 国产一区不卡视频| 免费人成黄页网站在线一区二区| 亚洲一区成人在线| 亚洲欧美一区二区三区孕妇| 欧美成人免费网站| 日韩欧美一卡二卡| 91麻豆精品国产| 欧美日韩午夜影院| 在线观看免费视频综合| 成人中文字幕电影| 成人激情黄色小说| www.亚洲免费av| 成人黄色电影在线| 成人国产精品免费| 大陆成人av片| 成人免费黄色大片| bt7086福利一区国产| 成人国产精品免费观看动漫| 成人性色生活片免费看爆迷你毛片| 麻豆久久久久久| 久久se精品一区精品二区| 男男gaygay亚洲| 麻豆免费看一区二区三区| 免费高清不卡av| 久久99日本精品| 国产在线国偷精品免费看| 国产在线国偷精品免费看| 狠狠色综合播放一区二区| 国产资源精品在线观看| 国产一区二区三区四| 国产电影一区二区三区| 成人av片在线观看| 91麻豆.com| 精品视频999| 日韩久久免费av| 久久中文字幕电影| 国产精品美女久久久久久久久久久| 国产日韩欧美制服另类| 国产精品初高中害羞小美女文| 1区2区3区欧美| 亚洲午夜私人影院| 免费观看成人av| 丁香激情综合五月| 欧美性色综合网| 欧美一区二区视频在线观看2022| 欧美videossexotv100| 国产欧美日本一区二区三区| 中文字幕在线免费不卡| 亚洲一区在线观看网站| 免费观看30秒视频久久| 国产成人在线影院| 日本伦理一区二区| 欧美大片一区二区| 日韩一区中文字幕| 免费一级片91| 菠萝蜜视频在线观看一区| 在线免费视频一区二区| 精品日韩一区二区三区| 国产精品久久久久久妇女6080| 亚洲国产另类av| 国产毛片一区二区| 在线观看日韩电影| 久久久亚洲精品石原莉奈| 亚洲女同ⅹxx女同tv| 久久精品72免费观看| 91在线观看高清| 精品国精品国产尤物美女| 亚洲日本在线a| 久久精品国产第一区二区三区| 大胆欧美人体老妇| 日韩一区二区在线看片| 日韩理论片在线| 久久成人久久爱| 欧洲亚洲精品在线| 国产欧美1区2区3区| 五月婷婷综合激情| 99久久国产免费看| 亚洲精品在线观看视频| 亚洲一区二区美女| 成人99免费视频| 2023国产精品自拍| 丝袜诱惑制服诱惑色一区在线观看| 国产99久久久精品| 91精品国产色综合久久不卡电影| 亚洲欧洲综合另类在线 | 国产黄色成人av| 制服丝袜国产精品| 亚洲精品成人精品456| 国产精品一区二区三区四区| 欧美三级电影在线观看| ●精品国产综合乱码久久久久| 九九在线精品视频| 制服丝袜av成人在线看| 亚洲男人都懂的| 波多野洁衣一区| 久久久久久一二三区| 日韩中文字幕亚洲一区二区va在线 | 3d动漫精品啪啪一区二区竹菊| 国产精品国产三级国产aⅴ入口 | 国产日本欧美一区二区| 免费亚洲电影在线| 91麻豆精品国产综合久久久久久| 亚洲色图在线看| 99久久精品免费| 欧美国产综合一区二区| 国产专区综合网| 精品福利一区二区三区| 免费xxxx性欧美18vr| 51久久夜色精品国产麻豆| 亚洲国产精品久久人人爱| 日本精品裸体写真集在线观看| 国产精品久久久久永久免费观看 | 亚洲精品一区二区三区香蕉| 蜜臀久久久久久久| 日韩一级成人av| 蜜桃视频在线观看一区二区| 91精品国产综合久久久久久漫画 | 懂色av一区二区三区免费看| 国产色综合久久| 成人爽a毛片一区二区免费| 久久精品欧美日韩精品| 国产精品一区二区免费不卡| 久久久久国产精品免费免费搜索| 国产精品一区二区x88av| 久久蜜桃av一区二区天堂| 国产九色精品成人porny | 91免费看片在线观看| 亚洲日本va在线观看| 在线观看欧美日本| 天堂在线一区二区| 欧美zozozo| 不卡免费追剧大全电视剧网站| 日韩一区有码在线| 欧美日韩mp4| 激情av综合网| 国产精品免费视频网站| 色噜噜偷拍精品综合在线| 亚洲国产成人tv| 欧美xxxx老人做受| 成人的网站免费观看| 亚洲免费av观看| 欧美一二三在线| 丁香婷婷深情五月亚洲| 亚洲一区二区三区四区的| 欧美r级电影在线观看| 成人av资源站| 午夜免费久久看|