亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc2338.txt.vrrp

?? VRRP雙機(jī)熱備份協(xié)議源嗎
?? VRRP
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
   convergence, and convergence will fail.   To avoid this an implementation SHOULD configure the virtual router   MAC address by adding a unicast MAC filter in the FDDI device, rather   than changing its hardware MAC address.  This will prevent a Master   router from removing any ADVERTISEMENTS it did not originate.9.2  Operation over Token Ring   Token ring has several characteristics which make running VRRP   difficult. These include:    - In order to switch to a new master located on a different bridge      token ring segment from the previous master when using source      route bridges, a mechanism is required to update cached source      route information.    - No general multicast mechanism supported across old and new token      ring adapter implementations. While many newer token ring adapters      support group addresses, token ring functional address support is      the only generally available multicast mechanism. Due to the      limited number of token ring functional addresses these may      collide with other usage of the same token ring functional      addresses.   Due to these difficulties, the preferred mode of operation over token   ring will be to use a token ring functional address for the VRID   virtual MAC address. Token ring functional addresses have the two   high order bits in the first MAC address octet set to B'1'.  They   range from 03-00-00-00-00-80 to 03-00-02-00-00-00 (canonical format).   However, unlike multicast addresses, there is only one unique   functional address per bit position. The functional addresses   addresses  03-00-00-10-00-00 through 03-00-02-00-00-00 are reserved   by the Token Ring Architecture [TKARCH] for user-defined   applications.  However, since there are only 12 user-defined token   ring functional addresses, there may be other non-IP protocols using   the same functional address. Since the Novell IPX [IPX] protocol usesKnight, et. al.             Standards Track                    [Page 21]RFC 2338                          VRRP                        April 1998   the 03-00-00-10-00-00 functional address, operation of VRRP over   token ring will avoid use of this functional address. In general,   token ring VRRP users will be responsible for resolution of other   user-defined token ring functional address conflicts.   VRIDs are mapped directly to token ring functional addresses. In   order to decrease the likelihood of functional address conflicts,   allocation will begin with the largest functional address. Most non-   IP protocols use the first or first couple user-defined functional   addresses and it is expected that VRRP users will choose VRIDs   sequentially starting with 1.   VRID      Token Ring Functional Address   ----      -----------------------------      1             03-00-02-00-00-00      2             03-00-04-00-00-00      3             03-00-08-00-00-00      4             03-00-10-00-00-00      5             03-00-20-00-00-00      6             03-00-40-00-00-00      7             03-00-80-00-00-00      8             03-00-00-01-00-00      9             03-00-00-02-00-00     10             03-00-00-04-00-00     11             03-00-00-08-00-00   Or more succinctly, octets 3 and 4 of the functional address are   equal to (0x4000 >> (VRID - 1)) in non-canonical format.   Since a functional address cannot be used used as a MAC level source   address, the real MAC address is used as the MAC source address in   VRRP advertisements. This is not a problem for bridges since packets   addressed to functional addresses will be sent on the spanning-tree   explorer path [802.1D].   The functional address mode of operation MUST be implemented by   routers supporting VRRP on token ring.   Additionally, routers MAY support unicast mode of operation to take   advantage of newer token ring adapter implementations which support   non-promiscuous reception for multiple unicast MAC addresses and to   avoid both the multicast traffic and usage conflicts associated with   the use of token ring functional addresses. Unicast mode uses the   same mapping of VRIDs to virtual MAC addresses as Ethernet.  However,   one important difference exists. ARP request/reply packets contain   the virtual MAC address as the source MAC address. The reason for   this is that some token ring driver implementations keep a cache of   MAC address/source routing information independent of the ARP cache.Knight, et. al.             Standards Track                    [Page 22]RFC 2338                          VRRP                        April 1998   Hence, these implementations need have to receive a packet with the   virtual MAC address as the source address in order to transmit to   that MAC address in a source-route bridged network.   Unicast mode on token ring has one limitation which should be   considered.  If there are VRID routers on different source-route   bridge segments and there are host implementations which keep their   source-route information in the ARP cache and do not listen to   gratuitous ARPs, these hosts will not update their ARP source-route   information correctly when a switch-over occurs. The only possible   solution is to put all routers with the same VRID on the same source-   bridge segment and use techniques to prevent that bridge segment from   being a single point of failure. These techniques are beyond the   scope this document.   For both the multicast and unicast mode of operation, VRRP   advertisements sent to 224.0.0.18 should be encapsulated as described   in [RFC1469].10. Security Considerations   VRRP is designed for a range of internetworking environments that may   employ different security policies.  The protocol includes several   authentication methods ranging from no authentication, simple clear   text passwords, and strong authentication using IP Authentication   with MD5 HMAC.  The details on each approach including possible   attacks and recommended environments follows.   Independent of any authentication type VRRP includes a mechanism   (setting TTL=255, checking on receipt) that protects against VRRP   packets being injected from another remote network.  This limits most   vulnerabilities to local attacks.10.1 No Authentication   The use of this authentication type means that VRRP protocol   exchanges are not authenticated.  This type of authentication SHOULD   only be used in environments were there is minimal security risk and   little chance for configuration errors (e.g., two VRRP routers on a   LAN).10.2 Simple Text Password   The use of this authentication type means that VRRP protocol   exchanges are authenticated by a simple clear text password.Knight, et. al.             Standards Track                    [Page 23]RFC 2338                          VRRP                        April 1998   This type of authentication is useful to protect against accidental   misconfiguration of routers on a LAN.  It protects against routers   inadvertently backing up another router.  A new router must first be   configured with the correct password before it can run VRRP with   another router.  This type of authentication does not protect against   hostile attacks where the password can be learned by a node snooping   VRRP packets on the LAN.  The Simple Text Authentication combined   with the TTL check makes it difficult for a VRRP packet to be sent   from another LAN to disrupt VRRP operation.   This type of authentication is RECOMMENDED when there is minimal risk   of nodes on a LAN actively disrupting VRRP operation.  If this type   of authentication is used the user should be aware that this clear   text password is sent frequently, and therefore should not be the   same as any security significant password.10.3 IP Authentication Header   The use of this authentication type means the VRRP protocol exchanges   are authenticated using the mechanisms defined by the IP   Authentication Header [AUTH] using "The Use of HMAC-MD5-96 within ESP   and AH", [HMAC].  This provides strong protection against   configuration errors, replay attacks, and packet   corruption/modification.   This type of authentication is RECOMMENDED when there is limited   control over the administration of nodes on a LAN.  While this type   of authentication does protect the operation of VRRP, there are other   types of attacks that may be employed on shared media links (e.g.,   generation of bogus ARP replies) which are independent from VRRP and   are not protected.11. Acknowledgments   The authors would like to thank Glen Zorn, and Michael Lane, Clark   Bremer, Hal Peterson, Tony Li, Barbara Denny, Joel Halpern, Steve   Bellovin, and Thomas Narten for their comments and suggestions.12.  References   [802.1D]  International Standard ISO/IEC 10038: 1993, ANSI/IEEE Std             802.1D, 1993 edition.   [AUTH]    Kent, S., and R. Atkinson, "IP Authentication Header",             Work in Progress.   [DISC]    Deering, S., "ICMP Router Discovery Messages", RFC 1256,             September 1991.Knight, et. al.             Standards Track                    [Page 24]RFC 2338                          VRRP                        April 1998   [DHCP]    Droms, R., "Dynamic Host Configuration Protocol", RFC 2131,             March 1997.   [HMAC]    Madson, C., and R. Glenn, "The Use of HMAC-MD5-96 within             ESP and AH", Work in Progress.   [HSRP]    Li, T., Cole, B., Morton, P., and D. Li, "Cisco Hot Standby             Router Protocol (HSRP)", RFC 2281, March 1998.   [IPSTB]   Higginson, P., M. Shand, "Development of Router Clusters to             Provide Fast Failover in IP Networks", Digital Technical             Journal, Volume 9 Number 3, Winter 1997.   [IPX]     Novell Incorporated., "IPX Router Specification", Version             1.10, October 1992.   [OSPF]    Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.   [RIP]     Hedrick, C., "Routing Information Protocol", RFC 1058,             June 1988.   [RFC1469] Pusateri, T., "IP over Token Ring LANs", RFC 1469, June             1993.   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate             Requirement Levels", BCP 14, RFC 2119, March 1997.   [TKARCH]  IBM Token-Ring Network, Architecture Reference, Publication             SC30-3374-02, Third Edition, (September, 1989).13. Authors' Addresses   Steven Knight                        Phone: +1 612 943-8990   Ascend Communications                EMail: Steven.Knight@ascend.com   High Performance Network Division   10250 Valley View Road, Suite 113   Eden Prairie, MN USA 55344   USA   Douglas Weaver                       Phone: +1 612 943-8990   Ascend Communications                EMail: Doug.Weaver@ascend.com   High Performance Network Division   10250 Valley View Road, Suite 113   Eden Prairie, MN USA 55344   USAKnight, et. al.             Standards Track                    [Page 25]RFC 2338                          VRRP                        April 1998   David Whipple                        Phone: +1 206 703-3876   Microsoft Corporation                EMail: dwhipple@microsoft.com   One Microsoft Way   Redmond, WA USA 98052-6399   USA   Robert Hinden                        Phone: +1 408 990-2004   Nokia                                EMail: hinden@iprg.nokia.com   232 Java Drive   Sunnyvale, CA 94089   USA   Danny Mitzel                         Phone: +1 408 990-2037   Nokia                                EMail: mitzel@iprg.nokia.com   232 Java Drive   Sunnyvale, CA 94089   USA   Peter Hunt                           Phone: +1 408 990-2093   Nokia                                EMail: hunt@iprg.nokia.com   232 Java Drive   Sunnyvale, CA 94089   USA   P. Higginson                         Phone: +44 118 920 6293   Digital Equipment Corp.              EMail: higginson@mail.dec.com   Digital Park   Imperial Way   Reading   Berkshire   RG2 0TE   UK   M. Shand                             Phone: +44 118 920 4424   Digital Equipment Corp.              EMail: shand@mail.dec.com   Digital Park   Imperial Way   Reading   Berkshire   RG2 0TE   UK   Acee Lindem                          Phone: 1-919-254-1805   IBM Corporation                      E-Mail: acee@raleigh.ibm.com   P.O. Box 12195   Research Triangle Park, NC  27709   USAKnight, et. al.             Standards Track                    [Page 26]RFC 2338                          VRRP                        April 199814.  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Knight, et. al.             Standards Track                    [Page 27]

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产成人综合自拍| 麻豆精品在线观看| 成人免费va视频| 久久综合五月天婷婷伊人| 午夜视频久久久久久| 99久久综合狠狠综合久久| 精品播放一区二区| 蜜桃视频在线观看一区| 欧美电影在哪看比较好| 亚洲午夜精品网| 欧美亚洲丝袜传媒另类| 伊人婷婷欧美激情| 欧美综合欧美视频| 天天综合天天做天天综合| 欧美日韩小视频| 久久国产精品露脸对白| 日韩美女一区二区三区四区| 久久成人免费日本黄色| 欧美激情一区二区三区| 99久久精品免费看国产| 樱桃视频在线观看一区| 91麻豆精品国产无毒不卡在线观看| 日产国产高清一区二区三区| 精品粉嫩aⅴ一区二区三区四区| 国产精品一区专区| 亚洲欧美aⅴ...| 欧美日韩在线观看一区二区| 麻豆高清免费国产一区| 国产精品网站一区| 欧美亚男人的天堂| 久草中文综合在线| 亚洲人亚洲人成电影网站色| 欧美巨大另类极品videosbest| 久久精品国产久精国产| 亚洲欧洲av一区二区三区久久| 欧美日韩1234| 成人av网站在线| 欧美日韩激情一区| 北条麻妃一区二区三区| 亚洲国产美国国产综合一区二区| 日韩欧美国产系列| 91视频观看免费| 国产高清不卡一区二区| 亚洲6080在线| 自拍偷拍亚洲综合| 26uuu精品一区二区| 欧美性受极品xxxx喷水| 波多野结衣中文一区| 免费在线观看成人| 亚洲国产中文字幕在线视频综合| 国产日韩欧美电影| 日韩欧美中文字幕精品| 欧美影院精品一区| 99国产精品99久久久久久| 国产超碰在线一区| 国产又黄又大久久| 麻豆精品国产传媒mv男同| 日韩—二三区免费观看av| 亚洲综合视频在线观看| 亚洲欧洲美洲综合色网| 国产欧美日产一区| 久久精品人人爽人人爽| 精品动漫一区二区三区在线观看| 欧美色视频一区| 色哟哟日韩精品| 一本久久a久久精品亚洲| 一本色道亚洲精品aⅴ| 91丨九色丨蝌蚪丨老版| 色综合久久久久综合| 91官网在线观看| 欧美精品三级日韩久久| 欧美一级一区二区| 26uuu久久天堂性欧美| 国产三级久久久| 国产精品福利av| 亚洲综合久久av| 免费在线欧美视频| 国产高清视频一区| 99久久精品国产毛片| 99久久99久久综合| 欧美四级电影网| 精品久久久久久最新网址| 久久嫩草精品久久久久| 中文字幕欧美区| 亚洲欧美综合在线精品| 婷婷六月综合亚洲| 国产精品一色哟哟哟| 色8久久精品久久久久久蜜| 欧美一级专区免费大片| 国产精品国产成人国产三级 | 亚洲一区影音先锋| 丝袜诱惑亚洲看片| 岛国精品一区二区| 在线精品亚洲一区二区不卡| 日韩精品专区在线| 国产精品免费网站在线观看| 国产精品视频一二| 亚洲h精品动漫在线观看| 国产成人av一区二区三区在线 | 亚洲国产成人私人影院tom| 亚洲综合一区在线| 国产一区二区在线视频| 91久久精品网| 国产精品美女久久久久久久久久久| 午夜激情综合网| www.在线欧美| 2019国产精品| 日韩av不卡在线观看| 91美女视频网站| 国产精品网站导航| 狠狠久久亚洲欧美| 欧美一区二区国产| 亚洲一区av在线| 99久久婷婷国产综合精品电影| 精品久久久网站| 麻豆精品国产传媒mv男同| 欧美日韩国产综合一区二区| 一区二区三区欧美| 91美女精品福利| 亚洲人成网站影音先锋播放| 成人激情动漫在线观看| 国产欧美精品区一区二区三区| 狠狠色狠狠色合久久伊人| 91精品国产欧美一区二区成人| 亚洲v日本v欧美v久久精品| 色天使久久综合网天天| 夜夜嗨av一区二区三区网页| 欧美中文字幕一二三区视频| 亚洲国产一区二区三区青草影视| 91婷婷韩国欧美一区二区| 亚洲人成精品久久久久久| 色国产精品一区在线观看| 亚洲尤物视频在线| 欧美区在线观看| 精品一区二区成人精品| 国产欧美一区二区精品性色| 成人av电影在线网| 亚洲欧美激情小说另类| 欧美无砖专区一中文字| 全国精品久久少妇| 日本一区二区三区久久久久久久久不| 国产成人精品一区二| 亚洲天堂精品在线观看| 欧美日韩精品一区二区三区四区 | 成人午夜在线视频| 亚洲男人天堂av网| 91女厕偷拍女厕偷拍高清| 亚洲va在线va天堂| 欧美日韩一级片在线观看| 秋霞电影网一区二区| 国产精品无遮挡| 欧美性xxxxxx少妇| 激情伊人五月天久久综合| 亚洲免费观看高清完整版在线观看 | 夜夜揉揉日日人人青青一国产精品| 8x8x8国产精品| 成人av在线网站| 日韩不卡一区二区三区| 国产精品乱码人人做人人爱 | 亚洲黄色小说网站| 日韩视频一区二区| 在线观看亚洲精品视频| 国产综合一区二区| 午夜久久电影网| 中文字幕综合网| 国产免费成人在线视频| 日韩欧美电影一二三| 欧美综合亚洲图片综合区| 国产精品系列在线播放| 久久电影网电视剧免费观看| 一区二区三区日韩精品| 中文字幕一区二区日韩精品绯色| 日韩视频123| 7777精品伊人久久久大香线蕉最新版| 91香蕉视频mp4| 97超碰欧美中文字幕| 成人国产精品免费观看动漫 | 久久婷婷一区二区三区| 日韩亚洲欧美在线| 5月丁香婷婷综合| 51久久夜色精品国产麻豆| 在线观看国产一区二区| 91麻豆精东视频| av在线播放一区二区三区| 国产在线国偷精品产拍免费yy| 国内不卡的二区三区中文字幕| 精品一区二区久久久| 国产精品原创巨作av| 福利一区二区在线观看| 国产.欧美.日韩| 99热精品国产| 一本色道亚洲精品aⅴ| 一本色道久久综合狠狠躁的推荐 | 国产永久精品大片wwwapp| 国产麻豆成人精品| www.av精品| 欧美日韩精品三区| 欧美精品一区二区三区久久久 | 欧美性生交片4| 制服.丝袜.亚洲.中文.综合 |