亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? uml_netjig.8

?? ipsec vpn
?? 8
?? 第 1 頁 / 共 4 頁
字號:
adds the contents of the file to the argument list..TP\fB\-\-label\fP\ \fIstring\fPadds the string to all error messages generated by \fBwhack\fP..LPThe help form of \fBwhack\fP is self-explanatory..TP\fB\-\-help\fPdisplay the usage message..TP\fB\-\-version\fPdisplay the version of \fBwhack\fP..LPThe connection form describes a potential connection to \fBpluto\fP.\fBpluto\fP needs to know what connections can and should be negotiated.When \fBpluto\fP is the initiator, it needs to know what to propose.When \fBpluto\fP is the responder, it needs to know enough to decide whetheris is willing to set up the proposed connection..LPThe description of a potential connection can specify a large numberof details.  Each connection has a unique name.  This name will appearin a updown shell command, so it should not contain punctuationthat would make the command ill-formed..TP\fB\-\-name\fP\ \fIconnection-name\fP.LPThe topology ofcircuit is symmetric, so to save space here is half a picture:\ \ \ client_subnet<\-\->host:ikeport<\-\->nexthop<\-\-\-A similar trick is used in the flags.  The same flag names are used forboth ends.  Those before the \fB\-\-to\fP flag describe the left sideand those afterwards describe the right side.  When \fBpluto\fP attemptsto use the connection, it decides whether it is the left side or the rightside of the connection, based on the IP numbers of its interfaces..TP\fB\-\-id\fP\ \fIid\fPthe identity of the end.  Currently, this can be an IP address (specifiedas dotted quad or as a Fully Qualified Domain Name, which will be resolvedimmediately) or as a Fully Qualified Domain Name itself (prefixed by ``@''to signify that it should not be resolved), or as user@FQDN.\fBpluto\fP only authenticates the identity, and does not use it foraddressing, so, for example, an IP address need not be the one to whichpackets are to be sent.  If the option is absent, theidentity defaults to the IP address specified by \fB\-\-host\fP..\" The identity is transmitted in the IKE protocol, and is what is authenticated..TP\fB\-\-host\fP\ \fIip\(hyaddress\fP.TP\fB\-\-host\fP\ \fB%any\fP.TP\fB\-\-host\fP\ \fB%opportunistic\fPthe IP address of the end (generally the public interface).If \fBpluto\fP is to act as a responderfor IKE negotiations initiated from unknown IP addresses (the``Road Warrior'' case), theIP address should be specified as \fB%any\fP (currently,the obsolete notation \fB0.0.0.0\fP is also accepted for this).If \fBpluto\fP is to opportunistically initiate the connection,use \fB%opportunistic\fP.TP\fB\-\-ikeport\fP\ \fIport\(hynumber\fPthe UDP port that IKE listens to on that host.  The default is 500.(\fBpluto\fP on this machine uses the port specified by its own commandline argument, so this only affects where \fBpluto\fP sends messages.).TP\fB\-\-nexthop\fP\ \fIip\(hyaddress\fPwhere to route packets for the peer's client (presumably for the peer too,but it will not be used for this).When \fBpluto\fP installs an IPsec SA, it issues a route command.It uses the nexthop as the gateway.The default is the peer's IP address (this can be explicitly written as\fB%direct\fP; the obsolete notation \fB0.0.0.0\fP is accepted).This option is necessary if \fBpluto\fP's host's interface used for sendingpackets to the peer is neither point-to-point nor directly connected to thepeer..TP\fB\-\-client\fP\ \fIsubnet\fPthe subnet for which the IPsec traffic will be destined.  If not specified,the host will be the client.The subnet can be specified in any of the forms supported by \fIipsec_atosubnet\fP(3).The general form is \fIaddress\fP/\fImask\fP.  The \fIaddress\fP can be eithera domain name or four decimal numbers (specifying octets) separated by dots.The most convenient form of the \fImask\fP is a decimal integer, specifyingthe number of leading one bits in the mask.  So, for example, 10.0.0.0/8would specify the class A network ``Net 10''..TP\fB\-\-updown\fP\ \fIupdown\fPspecifies an external shell command to be run whenever \fBpluto\fPbrings up or down a connection.The script is used to build a shell command, so it may contain positionalparameters, but ought not to have punctuation that would cause theresulting command to be ill-formed.The default is \fIipsec _updown\fP..TP\fB\-\-to\fPseparates the specification of the left and right ends of the connection..LPThe potential connection description also specifies characteristics ofrekeying and security..TP\fB\-\-psk\fPPropose and allow preshared secret authentication for IKE peers.  This authenticationrequires that each side use the same secret.  May be combined with \fB\-\-rsasig\fP;at least one must be specified..TP\fB\-\-rsasig\fPPropose and allow RSA signatures for authentication of IKE peers.  This authenticationrequires that each side have have a private key of its own and know thepublic key of its peer.  May be combined with \fB\-\-psk\fP;at least one must be specified..TP\fB\-\-encrypt\fPAll proposed or accepted IPsec SAs will include non-null ESP.The actual choices of transforms are wired into \fBpluto\fP..TP\fB\-\-authenticate\fPAll proposed IPsec SAs will include AH.All accepted IPsec SAs will include AH or ESP with authentication.The actual choices of transforms are wired into \fBpluto\fP.Note that this has nothing to do with IKE authentication..TP\fB\-\-compress\fPAll proposed IPsec SAs will include IPCOMP (compression).This will be ignored if KLIPS is not configured with IPCOMP support..TP\fB\-\-tunnel\fPthe IPsec SA should use tunneling.  Implicit if the SA is for clients.Must only be used with \fB\-\-authenticate\fP or \fB\-\-encrypt\fP..TP\fB\-\-ipv4\fPThe host addresses will be interpreted as IPv4 addresses.  This is thedefault.  Note that for a connection, all host addresses must be ofthe same Address Family (IPv4 and IPv6 use different Address Families)..TP\fB\-\-ipv6\fPThe host addresses (including nexthop) will be interpreted as IPv6 addresses.Note that for a connection, all host addresses must be ofthe same Address Family (IPv4 and IPv6 use different Address Families)..TP\fB\-\-tunnelipv4\fPThe client addresses will be interpreted as IPv4 addresses.  The default isto match what the host will be.  This does not imply \fB\-\-tunnel\fP so theflag can be safely used when no tunnel is actually specified.Note that for a connection, all tunnel addresses must be of the sameAddress Family..TP\fB\-\-tunnelipv6\fPThe client addresses will be interpreted as IPv6 addresses.  The default isto match what the host will be.  This does not imply \fB\-\-tunnel\fP so theflag can be safely used when no tunnel is actually specified.Note that for a connection, all tunnel addresses must be of the sameAddress Family..TP\fB\-\-pfs\fPThere should be Perfect Forward Secrecy \- new keying material willbe generated for each IPsec SA rather than being derived from the ISAKMPSA keying material.Since the group to be used cannot be negotiated (a dubious feature of thestandard), \fBpluto\fP will propose the same group that was used during Phase 1.We don't implement a stronger form of PFS which would require that theISAKMP SA be deleted after the IPSEC SA is negotiated..TP\fB\-\-disablearrivalcheck\fPIf the connection is a tunnel, allow packets arriving through the tunnelto have any source and destination addresses..LPIf none of the \fB\-\-encrypt\fP, \fB\-\-authenticate\fP, \fB\-\-compress\fP,or \fB\-\-pfs\fP flags is given, the initiating the connection willonly build an ISAKMP SA.  For such a connection, client subnets haveno meaning and must not be specified..LPMore work is needed to allow for flexible policies.  Currentlypolicy is hardwired in the source file spdb.c.  The ISAKMP SAs may useOakley groups MODP1024 and MODP1536; 3DES encryption; SHA1-96and MD5-96 authentication.  The IPsec SAs may use 3DES andMD5-96 or SHA1-96 for ESP, or just MD5-96 or SHA1-96 for AH.IPCOMP Compression is always Deflate..TP\fB\-\-ikelifetime\fP\ \fIseconds\fPhow long \fBpluto\fP will propose that an ISAKMP SA be allowed to live.The default is 3600 (one hour) and the maximum is 28800 (8 hours).This option will not affect what is accepted.\fBpluto\fP will reject proposals that exceed the maximum..TP\fB\-\-ipseclifetime\fP\ \fIseconds\fPhow long \fBpluto\fP will propose that an IPsec SA be allowed to live.The default is 28800 (eight hours) and the maximum is 86400 (one day).This option will not affect what is accepted.\fBpluto\fP will reject proposals that exceed the maximum..TP\fB\-\-rekeymargin\fP\ \fIseconds\fPhow long before an SA's expiration should \fBpluto\fP try to negotiatea replacement SA.  This will only happen if \fBpluto\fP was the initiator.The default is 540 (nine minutes)..TP\fB\-\-rekeyfuzz\fP\ \fIpercentage\fPmaximum size of random component to add to rekeymargin, expressed asa percentage of rekeymargin.  \fBpluto\fP will select a delay uniformlydistributed within this range.  By default, the percentage will be 100.If greater determinism is desired, specify 0.  It may be appropriatefor the percentage to be much larger than 100..TP\fB\-\-keyingtries\fP\ \fIcount\fPhow many times \fBpluto\fP should try to negotiate an SA,either for the first time or for rekeying.A value of 0 is interpreted as a very large number: never give up.The default is three..TP\fB\-\-dontrekey\fPDo not initiate rekeying.  This applies to Phase 1 and Phase 2.This is currently the only automatic way for a connection to terminate.It may be useful with Road Warrior or Opportunistic connections..TP\fB\-\-delete\fPwhen used in the connection form, it causes any previous connectionwith this name to be deleted before this one is added.  Unlike anormal delete, no diagnostic is produced if there was no previousconnection to delete.  Any routing in place for the connection is undone..LPThe delete form deletes a named connection description and anySAs established or negotiations initiated using this connection.Any routing in place for the connection is undone..TP\fB\-\-delete\fP.TP\fB\-\-name\fP\ \fIconnection-name\fP.LPThe deletestate form deletes the state object with the specified serial number.This is useful for selectively deleting instances of connections..TP\fB\-\-deletestate\fP\ \fIstate-number\fP.LPThe route form of the \fBwhack\fP command tells \fBpluto\fP to set uprouting for a connection.Although like a traditional route, it uses an ipsec device as avirtual interface.Once routing is set up, no packets will besent ``in the clear'' to the peer's client specified in the connection.A TRAP shunt eroute will be installed; if outbound traffic is caught,Pluto will initiate the connection.An explicit \fBwhack\fP route is not always needed: if it hasn't beendone when an IPsec SA is being installed, one will be automatically attempted..LPWhen a routing is attempted for a connection, there must not alreadybe a routing for a different connection with the same subnet but differentinterface or destination, or ifthere is, it must not be being used by an IPsec SA.  Otherwise theattempt will fail..TP\fB\-\-route\fP.TP\fB\-\-name\fP\ \fIconnection-name\fP.LPThe unroute form of the \fBwhack\fP command tells \fBpluto\fP to undoa routing.  \fBpluto\fP will refuse if an IPsec SA is using the connection.If another connection is sharing the same routing, it will be left in place.Without a routing, packets will be sent without encryption or authentication..TP\fB\-\-unroute\fP.TP\fB\-\-name\fP\ \fIconnection-name\fP.LPThe initiate form tells \fBpluto\fP to initiate a negotiation with another\fBpluto\fP (or other IKE daemon) according to the named connection.Initiation requires a route that \fB\-\-route\fP would provide;if none is in place at the time an IPsec SA is being installed,\fBpluto\fP attempts to set one up..TP\fB\-\-initiate\fP.TP\fB\-\-name\fP\ \fIconnection-name\fP.TP\fB\-\-asynchronous.LPThe initiate form of the \fBwhack\fP command will relay back from\fBpluto\fP status information via the UNIX domain socket (unless\-\-asynchronous is specified).  The status information is meant tolook a bit like that from \fBFTP\fP.  Currently \fBwhack\fP simplycopies this to stderr.  When the request is finished (eg. the SAs areestablished or \fBpluto\fP gives up), \fBpluto\fP closes the channel,causing \fBwhack\fP to terminate..LPThe terminate form tells \fBpluto\fP to delete any SAs that use the specifiedconnection and to stop any negotiations in process.It does not prevent new negotiations from starting (the delete formhas this effect)..TP\fB\-\-terminate\fP.TP\fB\-\-name\fP\ \fIconnection-name\fP.LPThe public key for informs \fBpluto\fP of the RSA public key for a potential peer.Private keys must be kept secret, so they are kept in.IR ipsec.secrets (5)..TP\fB\-\-keyid\ \fP\fIid\fPspecififies the identity of the peer for which a public key should be used.Its form is identical to the identity in the connection.If no public key is specified, \fBpluto\fP attempts to find KEY recordsfrom DNS for the id (if a FQDN) or through reverse lookup (if an IP address).Note that there several interesting ways in which this is not secure..TP\fB\-\-addkey\fPspecifies that the new key is added to the collection; otherwise thenew key replaces any old ones..TP\fB\-\-pubkeyrsa\ \fP\fIkey\fPspecifies the value of the RSA public key.  It is a sequence of bytesas described in RFC 2537 ``RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)''.It is denoted in a way suitable for \fIipsec_ttodata\fP(3).For example, a base 64 numeral starts with 0s..LPThe listen form tells \fBpluto\fP to start listening for IKE requestson its public interfaces.  To avoid race conditions, it is normal toload the appropriate connections into \fBpluto\fP before allowing itto listen.  If \fBpluto\fP isn't listening, it is pointless toinitiate negotiations, so it will refuse requests to do so.  Wheneverthe listen form is used, \fBpluto\fP looks for public interfaces andwill notice when new ones have been added and when old ones have beenremoved.  This is also the trigger for \fBpluto\fP to read the\fIipsec.secrets\fP file.  So listen may useful more than once..TP\fB\-\-listen\fPstart listening for IKE traffic on public interfaces..TP\fB\-\-unlisten\fPstop listening for IKE traffic on public interfaces..LPThe status form will display information about the internal state of\fBpluto\fP: information about each potential connection, abouteach state object, and about each shunt that \fBpluto\fP is managingwithout an associated connection..TP\fB\-\-status\fP.LPThe shutdown form is the proper way to shut down \fBpluto\fP.It will tear down the SAs on this machine that \fBpluto\fP has negotiated.It does not inform its peers, so the SAs on their machines remain..TP\fB\-\-shutdown\fP.SS Examples.LP

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91在线观看视频| 国产一区 二区| 成人国产精品免费网站| 日韩午夜在线观看视频| 一区二区三区在线视频播放| 丰满放荡岳乱妇91ww| 欧美一区二区三区视频| 艳妇臀荡乳欲伦亚洲一区| 国产成人亚洲综合a∨婷婷| 欧美一区二区福利在线| 亚洲国产综合人成综合网站| 99re视频这里只有精品| 久久久91精品国产一区二区三区| 日韩高清不卡一区二区三区| 在线观看精品一区| 亚洲婷婷国产精品电影人久久| 国产一区在线视频| 欧美r级在线观看| 日本不卡一区二区| 欧美男男青年gay1069videost| 综合分类小说区另类春色亚洲小说欧美| 国产资源在线一区| 日韩精品一区二区三区在线| 日本不卡视频一二三区| 91精品久久久久久久久99蜜臂| 亚洲愉拍自拍另类高清精品| 色域天天综合网| 亚洲蜜桃精久久久久久久| 99麻豆久久久国产精品免费优播| 国产精品青草综合久久久久99| 国产老妇另类xxxxx| 2022国产精品视频| 国产麻豆精品久久一二三| 欧美r级电影在线观看| 久久91精品久久久久久秒播| 亚洲大片精品永久免费| 91久久人澡人人添人人爽欧美| 亚洲色图第一区| 91网址在线看| 一区二区欧美国产| 欧美日韩在线不卡| 日韩国产精品久久| 欧美一二三区精品| 国内精品久久久久影院薰衣草| 久久久久久夜精品精品免费| 国产成人啪免费观看软件| 国产精品麻豆一区二区 | 国产午夜精品一区二区三区四区 | 综合久久久久久| 91麻豆精品在线观看| 亚洲男同性视频| 欧美日韩久久不卡| 免费在线观看精品| 久久先锋影音av| 不卡一卡二卡三乱码免费网站| 亚洲私人影院在线观看| 精品视频一区二区三区免费| 日本在线不卡视频一二三区| 日韩欧美不卡在线观看视频| 国产综合色视频| 国产精品夫妻自拍| 欧美日韩在线直播| 久88久久88久久久| 中文字幕一区日韩精品欧美| 欧美综合久久久| 奇米888四色在线精品| 久久婷婷色综合| 国产成人精品影视| 伊人开心综合网| 91精品国产综合久久国产大片 | 依依成人综合视频| 91精品国产色综合久久不卡蜜臀| 国产一区二区福利视频| 亚洲天天做日日做天天谢日日欢| 欧美日韩综合不卡| 狠狠色综合播放一区二区| 欧美国产精品一区| 欧美日本高清视频在线观看| 国产在线不卡视频| 亚洲欧美一区二区不卡| 91精品国产综合久久福利软件| 国产麻豆成人精品| 亚洲一区精品在线| 26uuu精品一区二区三区四区在线| 成人亚洲一区二区一| 午夜精品久久久久久久久| 久久久久久久精| 欧美做爰猛烈大尺度电影无法无天| 久久精品72免费观看| 久久99国产精品免费| 亚洲欧美日韩一区二区| 日韩美一区二区三区| 色综合久久久久综合| 精品在线播放免费| 亚洲最大成人网4388xx| 久久综合色鬼综合色| 欧美在线免费视屏| 国产成人av在线影院| 亚洲成av人在线观看| 国产精品久久久久影院| 日韩亚洲欧美综合| 91成人免费在线视频| 国产黄色成人av| 免费观看久久久4p| 亚洲精品一二三| 久久久久久久久久电影| 91精品国产综合久久久蜜臀图片| 国产成人av电影免费在线观看| 香蕉加勒比综合久久| 国产精品久久久久影院老司| 欧美tk丨vk视频| 欧美日韩免费不卡视频一区二区三区| 成人性生交大片免费看视频在线 | 国产成人精品三级| 日本在线不卡一区| 亚洲一区自拍偷拍| 中文字幕一区二区三区四区| 久久亚洲影视婷婷| 91精品国产一区二区人妖| 日本乱码高清不卡字幕| 不卡一区二区在线| 国产成人小视频| 国产综合久久久久久鬼色| 日韩av电影天堂| 亚洲国产综合视频在线观看| 国产精品久久久久久久久图文区| 亚洲精品在线网站| 3751色影院一区二区三区| 91福利在线看| 91在线免费播放| 成人免费毛片高清视频| 黑人巨大精品欧美黑白配亚洲| 日本aⅴ免费视频一区二区三区| 亚洲国产一区在线观看| 亚洲人吸女人奶水| 国产精品成人免费| 中文字幕在线不卡一区| 国产精品免费av| 国产精品久久久久久久久免费樱桃 | 欧美伊人久久久久久午夜久久久久| 国产不卡免费视频| 欧美精品视频www在线观看 | 国产suv精品一区二区883| 韩国午夜理伦三级不卡影院| 久久国产生活片100| 免费看日韩精品| 免费日韩伦理电影| 美女网站在线免费欧美精品| 秋霞影院一区二区| 日本不卡1234视频| 免费亚洲电影在线| 精品一区二区在线播放| 久久精品国产精品亚洲红杏| 精品一区二区三区在线播放| 久久99精品久久久久| 狠狠色狠狠色综合系列| 国产一区不卡精品| 成人午夜视频福利| a在线欧美一区| 色国产综合视频| 欧美日韩一级片网站| 在线成人免费观看| 欧美一卡二卡在线| 26uuu精品一区二区| 欧美激情资源网| 最新中文字幕一区二区三区| 亚洲精选一二三| 亚洲一区二区在线视频| 视频一区国产视频| 久久国产精品99久久人人澡| 国产精品99久| 99国产精品99久久久久久| 欧美性大战久久| 337p亚洲精品色噜噜狠狠| 精品国产sm最大网站免费看| 国产午夜精品久久久久久免费视| 国产精品大尺度| 亚洲国产日韩a在线播放| 麻豆精品在线播放| 成人丝袜18视频在线观看| 91视视频在线直接观看在线看网页在线看| 一本色道久久综合狠狠躁的推荐| 欧美亚洲动漫精品| 日韩精品一区二区三区四区| 欧美国产激情一区二区三区蜜月| 亚洲欧美视频在线观看| 日韩精品免费专区| 国产成人综合在线观看| 91亚洲精华国产精华精华液| 欧美日韩在线直播| 久久久天堂av| 一区二区在线观看不卡| 免费欧美在线视频| 成人动漫视频在线| 777a∨成人精品桃花网| 久久久久久久网| 亚洲国产精品尤物yw在线观看| 狠狠久久亚洲欧美| 91精品办公室少妇高潮对白| 精品久久久久久综合日本欧美|