亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-vrrp-spec-v2-05.txt

?? VRRP雙機熱備份協議源嗎
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   exchanges are authenticated by a simple clear text password.   This type of authentication is useful to protect against accidental   misconfiguration of routers on a LAN.  It protects against routers   inadvertently backing up another router.  A new router must first be   configured with the correct password before it can run VRRP with   another router.  This type of authentication does not protect against   hostile attacks where the password can be learned by a node snooping   VRRP packets on the LAN.  The Simple Text Authentication combined   with the TTL check makes it difficult for a VRRP packet to be sent   from another LAN to disrupt VRRP operation.   This type of authentication is RECOMMENDED when there is minimal risk   of nodes on a LAN actively disrupting VRRP operation.  If this type   of authentication is used the user should be aware that this clear   text password is sent frequently, and therefore should not be thedraft-ietf-vrrp-spec-v2-05.txt                                 [Page 26]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   same as any security significant password.10.3 IP Authentication Header   The use of this authentication type means the VRRP protocol exchanges   are authenticated using the mechanisms defined by the IP   Authentication Header [AUTH] using "The Use of HMAC-MD5-96 within ESP   and AH", [HMAC].  This provides strong protection against   configuration errors, replay attacks, and packet   corruption/modification.   This type of authentication is RECOMMENDED when there is limited   control over the administration of nodes on a LAN.  While this type   of authentication does protect the operation of VRRP, there are other   types of attacks that may be employed on shared media links (e.g.,   generation of bogus ARP replies) that are independent from VRRP and   are not protected.   Specifically, although securing VRRP prevents unauthorized machines   from taking part in the election protocol, it does not protect hosts   on the network from being deceived.  For example, a gratuitous ARP   reply from what purports to be the virtual router's IP address can   redirect traffic to an unauthorized machine.  Similarly, individual   connections can be diverted by means of forged ICMP Redirect   messages.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 27]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 200011. Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.   The IETF has been notified of intellectual property rights claimed in   regard to some or all of the specification contained in this   document.  For more information consult the online list of claimed   rights.12. Acknowledgments   The authors would like to thank Glen Zorn, and Michael Lane, Clark   Bremer, Hal Peterson, Tony Li, Barbara Denny, Joel Halpern, Steve   Bellovin, Thomas Narten, Rob Montgomery, and Rob Coltun for their   comments and suggestions.13.  References   [802.1D]  International Standard ISO/IEC 10038: 1993, ANSI/IEEE Std             802.1D, 1993 edition.   [AUTH]    Kent, S., R. Atkinson, "IP Authentication Header", RFC2402,             November 1998.   [CKSM]    Braden, R., D. Borman, C. Partridge, "Computing the             Internet Checksum", RFC1071, September 1988.draft-ietf-vrrp-spec-v2-05.txt                                 [Page 28]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   [DISC]    Deering, S., "ICMP Router Discovery Messages", RFC1256,             September 1991.   [DHCP]    Droms, R., "Dynamic Host Configuration Protocol", RFC2131,             March 1997.   [HMAC]    Madson, C., R. Glenn, "The Use of HMAC-MD5-96 within ESP             and AH", RFC2403, November 1998.   [HSRP]    Li, T., B. Cole, P. Morton, D. Li, "Cisco Hot Standby             Router Protocol (HSRP)", RFC2281, March 1998.   [IPSTB]   Higginson, P., M. Shand, "Development of Router Clusters to             Provide Fast Failover in IP Networks", Digital Technical             Journal, Volume 9 Number 3, Winter 1997.   [IPX]     Novell Incorporated., "IPX Router Specification", Version             1.10, October 1992.   [OSPF]    Moy, J., "OSPF version 2", RFC2328, STD0054, April 1998.   [RIP]     Malkin, G., "RIP Version 2", RFC2453, STD0056, November             1998.   [RFC1469] Pusateri, T., "IP Multicast over Token Ring Local Area             Networks", RFC1469, June 1993.   [RFC2026] Bradner, S., "The Internet Standards Process -- Revision             3", RFC2026, BCP00009, October 1996.   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate             Requirement Levels", RFC2119, BCP0014, March 1997.   [TKARCH]  IBM Token-Ring Network, Architecture Reference, Publication             SC30-3374-02, Third Edition, (September, 1989).14. Author's Addresses   Steven Knight                           Phone: +1 612 943-8990   Ascend Communications                   EMail: Steven.Knight@ascend.com   High Performance Network Division   10250 Valley View Road, Suite 113   Eden Prairie, MN USA 55344   USAdraft-ietf-vrrp-spec-v2-05.txt                                 [Page 29]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   Douglas Weaver                          Phone: +1 612 943-8990   Ascend Communications                   EMail: Doug.Weaver@ascend.com   High Performance Network Division   10250 Valley View Road, Suite 113   Eden Prairie, MN USA 55344   USA   David Whipple                           Phone: +1 206 703-3876   Microsoft Corporation                   EMail: dwhipple@microsoft.com   One Microsoft Way   Redmond, WA 98052-6399   USA   Robert Hinden                           Phone: +1 650 625-2004   Nokia                                   EMail: hinden@iprg.nokia.com   313 Fairchild Drive   Mountain View, CA 94043   USA   Danny Mitzel                            Phone: +1 650 625-2037   Nokia                                   EMail: mitzel@iprg.nokia.com   313 Fairchild Drive   Mountain View, CA 94043   USA   Peter Hunt                              Phone: +1 650 625-2093   Nokia                                   EMail: hunt@iprg.nokia.com   313 Fairchild Drive   Mountain View, CA 94043   USA   P. Higginson                            Phone: +44 118 920 6293   Digital Equipment Corp.                 EMail: higginson@mail.dec.com   Digital Park   Imperial Way   Reading   Berkshire   RG2 0TE   UK   M. Shand                                Phone: +44 118 920 4424   Digital Equipment Corp.                 EMail: shand@mail.dec.com   Digital Park   Imperial Way   Reading   Berkshire   RG2 0TE   UKdraft-ietf-vrrp-spec-v2-05.txt                                 [Page 30]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 2000   Acee Lindem                             Phone: 1-919-254-1805   IBM Corporation                         E-Mail: acee@raleigh.ibm.com   P.O. Box 12195   Research Triangle Park, NC  27709   USAdraft-ietf-vrrp-spec-v2-05.txt                                 [Page 31]INTERNET-DRAFT     Virtual Router Redundancy Protocol    January 5, 200014. Changes from RFC2338    - Revised the section 4 examples text with a clearer description of      mapping of IP address owner, priorities, etc.    - Clarify the section 7.1 text describing address list validation.    - Corrected text in Preempt_Mode definition.    - Changed authentication to be per Virtual Router instead of per      Interface.    - Added new subsection (9.3) stating that VRRP over ATM LANE is      beyond the scope of this document.    - Clarified text describing received packet length check.    - Clarified text describing received authentication check.    - Clarified text describing VRID verification check.    - Added new subsection (8.4) describing need to not forward packets      for adopted IP addresses.    - Added clarification to the security considerations section.    - Added reference for computing the internet checksum.    - Updated references and author information.draft-ietf-vrrp-spec-v2-05.txt             

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天天色综合成人网| 欧美亚洲动漫制服丝袜| 日韩亚洲欧美综合| 亚洲成人久久影院| av在线不卡免费看| 亚洲人成伊人成综合网小说| 国产在线看一区| 精品国产乱码久久久久久免费| 亚洲综合久久久| 欧美日韩一级视频| 日本欧美一区二区三区乱码| 制服丝袜亚洲网站| 精品亚洲成a人在线观看| 精品国产一区二区亚洲人成毛片| 强制捆绑调教一区二区| 欧美一区二区三区白人| 精东粉嫩av免费一区二区三区| 精品国产亚洲一区二区三区在线观看 | 一区二区三区不卡在线观看| 欧美午夜寂寞影院| 奇米777欧美一区二区| 久久久久国产精品厨房| 99精品视频一区二区三区| 亚洲精品国产一区二区精华液 | 日韩av一区二区在线影视| 精品国产91洋老外米糕| 成人激情视频网站| 日韩av电影免费观看高清完整版 | 91浏览器打开| 日韩av成人高清| 国产精品久久久久久久久久久免费看 | 综合激情成人伊人| 91精品国产综合久久久蜜臀图片 | 狠狠色丁香久久婷婷综| 国产精品久久久久久久久晋中| 欧美精品乱码久久久久久| 国产精品一区专区| 亚洲v中文字幕| 亚洲乱码国产乱码精品精小说| 精品国产露脸精彩对白| 在线看国产一区| 91视频精品在这里| 夫妻av一区二区| 久久66热re国产| 蜜臀久久久99精品久久久久久| 一区二区三区**美女毛片| 国产精品污www在线观看| 欧美一级高清大全免费观看| 欧美色偷偷大香| 欧美精品久久99| 欧美综合色免费| 欧美久久久久中文字幕| 欧美日韩国产系列| 91精品国产综合久久婷婷香蕉| 欧美日韩mp4| 日韩欧美国产小视频| 91精品国产色综合久久不卡蜜臀| 欧美日韩一区久久| 欧美日韩不卡在线| 26uuu色噜噜精品一区二区| 精品少妇一区二区三区| 久久综合九色综合97婷婷女人| 精品国产亚洲在线| ●精品国产综合乱码久久久久 | 久久品道一品道久久精品| 337p粉嫩大胆噜噜噜噜噜91av | 欧美日韩国产综合一区二区| 欧美精品 国产精品| 亚洲精品在线观看网站| 亚洲国产激情av| 亚洲成人av一区| 久久99精品国产麻豆婷婷| 国产美女av一区二区三区| 不卡影院免费观看| 欧美日本免费一区二区三区| 久久久久久久久久久99999| 国产精品久久久久久久久久免费看 | 国产精品国产三级国产三级人妇 | 秋霞电影网一区二区| 国产白丝精品91爽爽久久| 91国偷自产一区二区三区观看| 日韩一区二区免费高清| 亚洲理论在线观看| 国产精品一区二区在线观看不卡 | 国产精品网曝门| 日日欢夜夜爽一区| 懂色一区二区三区免费观看| 欧美日韩激情一区| 亚洲激情自拍视频| zzijzzij亚洲日本少妇熟睡| 欧美一区二区视频观看视频| 夜夜嗨av一区二区三区四季av | 精品盗摄一区二区三区| 午夜精品久久久久久久久久| 91视频在线观看| 国产精品女主播在线观看| 激情图区综合网| 日韩久久久久久| 另类的小说在线视频另类成人小视频在线| 不卡的av电影在线观看| 国产精品久久精品日日| 成人午夜激情视频| 国产精品网站导航| 91在线免费播放| 一区二区三区精品| 欧美日韩中字一区| 天涯成人国产亚洲精品一区av| 欧美性极品少妇| 日本一区中文字幕| 日韩片之四级片| 国产一区二区三区在线观看免费视频 | 欧美视频自拍偷拍| 日本亚洲天堂网| 久久久久久影视| 成人激情av网| 亚洲一区二区三区视频在线播放| 欧美精品丝袜中出| 国产在线不卡一区| 亚洲精品高清视频在线观看| 欧美日韩国产小视频| 国产一区二区三区日韩| 亚洲欧洲www| 精品国内二区三区| 91久久精品一区二区三| 国产在线视视频有精品| 国产精品电影一区二区| 欧美一区二区三区在线看| 成人国产一区二区三区精品| 午夜精品久久久久| 亚洲欧美日韩综合aⅴ视频| 欧美电视剧在线观看完整版| 91啪九色porn原创视频在线观看| 午夜精品视频一区| 亚洲欧美一区二区三区孕妇| 日韩写真欧美这视频| 一本久久a久久免费精品不卡| 蜜臀av国产精品久久久久| 一区二区三区.www| 亚洲丝袜另类动漫二区| 久久精子c满五个校花| 日韩一级二级三级| 欧美日韩国产在线播放网站| 99riav一区二区三区| 成人综合婷婷国产精品久久免费| 久久99精品国产麻豆婷婷洗澡| 亚洲国产成人porn| 亚洲成人动漫在线免费观看| 亚洲女同女同女同女同女同69| 国产网站一区二区三区| 国产清纯白嫩初高生在线观看91 | 91免费看`日韩一区二区| 国产一区欧美一区| 韩国女主播一区二区三区| 麻豆91在线播放| 久久福利视频一区二区| 精东粉嫩av免费一区二区三区 | 亚洲欧美一区二区三区极速播放 | 性久久久久久久久久久久| 亚洲成av人综合在线观看| 亚洲国产精品久久久久婷婷884| 午夜欧美视频在线观看| 奇米色一区二区| 国产在线精品国自产拍免费| a级精品国产片在线观看| 99精品偷自拍| 91精品国产一区二区三区 | 91麻豆精品国产91久久久久| 日韩欧美一区二区视频| 国产免费成人在线视频| 一区二区日韩电影| 精品写真视频在线观看 | 毛片av中文字幕一区二区| 粉嫩av一区二区三区粉嫩| 91久久精品一区二区三| 日韩三级免费观看| 亚洲毛片av在线| 国产成人一区在线| 欧美日韩成人一区二区| 亚洲欧美在线另类| 精品一区二区三区日韩| 欧美私模裸体表演在线观看| 久久久99精品久久| 天天影视涩香欲综合网| 99免费精品视频| 精品少妇一区二区三区 | 老司机精品视频线观看86| 91在线观看污| 国产蜜臀av在线一区二区三区 | 一区二区三区四区在线播放| 国产又粗又猛又爽又黄91精品| 欧美日韩一级视频| 一区二区三区欧美日韩| 国产成人啪免费观看软件| 欧美变态tickle挠乳网站| 男人操女人的视频在线观看欧美| 在线日韩国产精品| 亚洲国产aⅴ成人精品无吗| 色猫猫国产区一区二在线视频| 国产精品久久久久aaaa| 成人污污视频在线观看|