亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? uml_netjig.8

?? openswan
?? 8
?? 第 1 頁 / 共 4 頁
字號:
It would be normal to start \fBpluto\fP in one of the system initializationscripts.  It needs to be run by the superuser.  Generally, no arguments are needed.To run in manually, the superuser can simply type\ \ \ ipsec plutoThe command will immediately return, but a \fBpluto\fP process will be leftrunning, waiting for requests from \fBwhack\fP or a peer..LPUsing \fBwhack\fP, several potential connections would be described:.HP.na\ \ \ ipsec whack \-\-name\ silly\-\-host\ 127.0.0.1 \-\-to \-\-host\ 127.0.0.2\-\-ikelifetime\ 900 \-\-ipseclifetime\ 800 \-\-keyingtries\ 3.ad.LPSince this silly connection description specifies neither encryption,authentication, nor tunneling, it could only be used to establishan ISAKMP SA..HP.na\ \ \ ipsec whack \-\-name\ secret \-\-host\ 10.0.0.1 \-\-client\ 10.0.1.0/24\-\-to \-\-host\ 10.0.0.2 \-\-client\ 10.0.2.0/24\-\-encrypt.ad.LPThis is something that must be done on both sides.  If the otherside is \fBpluto\fP, the same \fBwhack\fP command could be used on it(the command syntax is designed to not distinguish which end is ours)..LPNow that the connections are specified, \fBpluto\fP is ready to handlerequests and replies via the public interfaces.  We must tell it to discoverthose interfaces and start accepting messages from peers:\ \ \ ipsec whack \-\-listen.LPIf we don't immediately wish to bring up a secure connection betweenthe two clients, we might wish to prevent insecure traffic.The routing form asks \fBpluto\fP to cause the packets sent fromour client to the peer's client to be routed through the ipsec0device; if there is no SA, they will be discarded:\ \ \ ipsec whack \-\-route secret.LPFinally, we are ready to get \fBpluto\fP to initiate negotiationfor an IPsec SA (and implicitly, an ISAKMP SA):\ \ \ ipsec whack \-\-initiate\ \-\-name\ secretA small log of interesting events will appear on standard output(other logging is sent to syslog)..LP\fBwhack\fP can also be used to terminate \fBpluto\fP cleanly, tearing downall SAs that it has negotiated.\ \ \ ipsec whack \-\-shutdownNotification of any IPSEC SA deletion, but not ISAKMP SA deletionis sent to the peer.  Unfortunately, such Notification is not reliable.Furthermore, \fBpluto\fP itself ignores Notifications..SS The updown command.LPWhenever \fBpluto\fP brings a connection up or down, it invokesthe updown command.  This command is specified using the \fB\-\-updown\fPoption.  This allows for customized control over routing and firewall manipulation..LPThe updown is invoked for five different operations.  Each ofthese operations can be for our client subnet or for our host itself..TP\fBprepare-host\fP or \fBprepare-client\fPis run before bringing up a new connection if no other connectionwith the same clients is up.  Generally, this is useful for deleting aroute that might have been set up before \fBpluto\fP was run orperhaps by some agent not known to \fBpluto\fP..TP\fBroute-host\fP or \fBroute-client\fPis run when bringing up a connection for a new peer client subnet(even if \fBprepare-host\fP or \fBprepare-client\fP was run).  Thecommand should install a suitable route.  Routing decisions are basedonly on the destination (peer's client) subnet address, unlike erouteswhich discriminate based on source too..TP\fBunroute-host\fP or \fBunroute-client\fPis run when bringing down the last connection for a particular peerclient subnet.  It should undo what the \fBroute-host\fP or \fBroute-client\fPdid..TP\fBup-host\fP or \fBup-client\fPis run when bringing up a tunnel eroute with a pair of client subnetsthat does not already have a tunnel eroute.This command should install firewall rules as appropriate.It is generally a good idea to allow IKE messages (UDP port 500)travel between the hosts..TP\fBdown-host\fP or \fBdown-client\fPis run when bringing down the eroute for a pair of client subnets.This command should delete firewall rules as appropriate.  Note thatthere may remain some inbound IPsec SAs with these client subnets..LPThe script is passed a large number of environment variables to specifywhat needs to be done..TP\fBPLUTO_VERSION\fPindicates what version of this interface is being used.  This documentdescribes version 1.1.  This is upwardly compatible with version 1.0..TP\fBPLUTO_VERB\fPspecifies the name of the operation to be performed(\fBprepare-host\fP,r \fBprepare-client\fP,\fBup-host\fP, \fBup-client\fP,\fBdown-host\fP, or \fBdown-client\fP).  If the address family forsecurity gateway to security gateway communications is IPv6, thena suffix of -v6 is added to the verb..TP\fBPLUTO_CONNECTION\fPis the name of the connection for which we are routing..TP\fBPLUTO_NEXT_HOP\fPis the next hop to which packets bound for the peer must be sent..TP\fBPLUTO_INTERFACE\fPis the name of the ipsec interface to be used..TP\fBPLUTO_ME\fPis the IP address of our host..TP\fBPLUTO_MY_CLIENT\fPis the IP address / count of our client subnet.If the client is just the host, this will be the host's own IP address / max(where max is 32 for IPv4 and 128 for IPv6)..TP\fBPLUTO_MY_CLIENT_NET\fPis the IP address of our client net.If the client is just the host, this will be the host's own IP address..TP\fBPLUTO_MY_CLIENT_MASK\fPis the mask for our client net.If the client is just the host, this will be 255.255.255.255..TP\fBPLUTO_PEER\fPis the IP address of our peer..TP\fBPLUTO_PEER_CLIENT\fPis the IP address / count of the peer's client subnet.If the client is just the peer, this will be the peer's own IP address / max(where max is 32 for IPv4 and 128 for IPv6)..TP\fBPLUTO_PEER_CLIENT_NET\fPis the IP address of the peer's client net.If the client is just the peer, this will be the peer's own IP address..TP\fBPLUTO_PEER_CLIENT_MASK\fPis the mask for the peer's client net.If the client is just the peer, this will be 255.255.255.255..LPAll output sent by the script to stderr or stdout is logged.  Thescript should return an exit status of 0 if and only if it succeeds..SS Rekeying.LPWhen an SA that was initiated by \fBpluto\fP has only a bit oflifetime left,\fBpluto\fP will initiate the creation of a new SA.  This applies toISAKMP and IPsec SAs.The rekeying will be initiated when the SA's remaining lifetime isless than the rekeymargin plus a random percentage, between 0 andrekeyfuzz, of the rekeymargin..LPSimilarly, when an SA that was initiated by the peer has only a bit oflifetime left, \fBpluto\fP will try to initiate the creation of areplacement.To give preference to the initiator, this rekeying will only be initiatedwhen the SA's remaining lifetime is half of rekeymargin.If rekeying is done by the responder, the roles will be reversed: theresponder for the old SA will be the initiator for the replacement.The former initiator might also initiate rekeying, so there maybe redundant SAs created.To avoid these complications, make sure that rekeymargin is generous..LPOne risk of having the former responder initiate is that perhapsnone of its proposals is acceptable to the former initiator(they have not been used in a successful negotiation).To reduce the chances of this happening, and to prevent loss of security,the policy settings are taken from the old SA (this is the case even ifthe former initiator is initiating).These may be stricter than those of the connection..LP\fBpluto\fP will not rekey an SA if that SA is not the most recent of itstype (IPsec or ISAKMP) for its potential connection.This avoids creating redundant SAs..LPThe random component in the rekeying time (rekeyfuzz) is intended tomake certain pathological patterns of rekeying unstable.  If bothsides decide to rekey at the same time, twice as many SAs as necessaryare created.  This could become a stable pattern without therandomness..LPAnother more important case occurs when a security gateway has SAswith many other security gateways.  Each of these connections mightneed to be rekeyed at the same time.  This would cause a high peekrequirement for resources (network bandwidth, CPU time, entropy forrandom numbers).  The rekeyfuzz can be used to stagger the rekeyingtimes..LPOnce a new set of SAs has been negotiated, \fBpluto\fP will never sendtraffic on a superseded one.  Traffic will be accepted on an old SAuntil it expires..SS Selecting a Connection When Responding: Road Warrior Support.LPWhen \fBpluto\fP receives an initial Main Mode message, it needs todecide which connection this message is for.  It picks based solely onthe source and destination IP addresses of the message.  There mightbe several connections with suitable IP addresses, in which case oneof them is arbitrarily chosen.  (The ISAKMP SA proposal contained inthe message could be taken into account, but it is not.).LPThe ISAKMP SA is negotiated before the parties pass furtheridentifying information, so all ISAKMP SA characteristics specified inthe connection description should be the same for every connectionwith the same two host IP addresses.  At the moment, the onlycharacteristic that might differ is authentication method..LPUp to this point,all configuring has presumed that the IP addressesare known to all parties ahead of time.  This will not workwhen either end is mobile (or assigned a dynamic IP address for otherreasons).  We call this situation ``Road Warrior''.  It is fairly trickyand has some important limitations, most of which are features ofthe IKE protocol..LPOnly the initiator may be mobile:the initiator may have an IP number unknown to the responder.  Whenthe responder doesn't recognize the IP address on the first Main Modepacket, it looks for a connection with itself as one end and \fB%any\fPas the other.If it cannot find one, it refuses to negotiate.  If itdoes find one, it creates a temporary connection that is a duplicateexcept with the \fB%any\fP replaced by the source IP address from thepacket; if there was no identity specified for the peer, the new IPaddress will be used..LPWhen \fBpluto\fP is using one of these temporary connections andneeds to find the preshared secret or RSA private key in \fIipsec.secrets\fP,and and the connection specified no identity for the peer, \fB%any\fPis used as its identity.  After all, the real IP address was apparentlyunknown to the configuration, so it is unreasonable to require thatit be used in this table..LPPart way into the Phase 1 (Main Mode) negotiation using one of thesetemporary connection descriptions, \fBpluto\fP will be receive anIdentity Payload.  At this point, \fBpluto\fP checks for a moreappropriate connection, one with an identity for the peer that matchesthe payload but which would use the same keys so-far used forauthentication.  If it finds one, it will switch to using this betterconnection (or a temporary derived from this, if it has \fB%any\fPfor the peer's IP address).  It may even turn out that no connectionmatches the newly discovered identity, including the current connection;if so, \fBpluto\fP terminates negotiation..LPUnfortunately, if preshared secret authentication is being used, theIdentity Payload is encrypted using this secret, so the secret must beselected by the responder without knowing this payload.  Thislimits there to being at most one preshared secret for all Road Warriorsystems connecting to a host.  RSA Signature authentications does notrequire that the responder know how to select the initiator's public keyuntil after the initiator's Identity Payload is decoded (using theresponder's private key, so that must be preselected)..LPWhen \fBpluto\fP is responding to a Quick Mode negotiation via one of thesetemporary connection descriptions, it may well find that the subnetsspecified by the initiator don't match those in the temporaryconnection description.  If so, it will look for a connection withmatching subnets, its own host address, a peer address of \fB%any\fPand matching identities.If it finds one, a new temporary connection is derived from this oneand used for the Quick Mode negotiation of IPsec SAs.  If it does notfind one, \fBpluto\fP terminates negotiation..LPBe sure to specify an appropriate nexthop for the responderto send a message to the initiator: \fBpluto\fP has no way of guessingit (if forwarding isn't required, use an explicit \fB%direct\fP as the nexthopand the IP address of the initiator will be filled in; the obsoletenotation \fB0.0.0.0\fP is still accepted)..LP\fBpluto\fP has no special provision for the initiator side.  The current(possibly dynamic) IP address and nexthop must be used in definingconnections.  These must beproperly configured each time the initiator's IP address changes.\fBpluto\fP has no mechanism to do this automatically..LPAlthough we call this Road Warrior Support, it could also be used tosupport encrypted connections with anonymous initiators.  Theresponder's organization could announce the preshared secret that would be usedwith unrecognized initiators and let anyone connect.  Of course the initiator'sidentity would not be authenticated..LPIf any Road Warrior connections are supported, \fBpluto\fP cannotreject an exchange initiated by an unknown host until it hasdetermined that the secret is not shared or the signature is invalid.This must await thethird Main Mode message from the initiator.  If no Road Warriorconnection is supported, the first message from an unknown sourcewould be rejected.  This has implications for ease of debuggingconfigurations and for denial of service attacks..LPAlthough a Road Warrior connection must be initiated by the mobileside, the other side can and will rekey using the temporary connectionit has created.  If the Road Warrior wishes to be able to disconnect,it is probably wise to set \fB\-\-keyingtries\fP to 1 in theconnection on the non-mobile side to prevent it trying to rekey theconnection.  Unfortunately, there is no mechanism to unroute theconnection automatically..SS Debugging.LP\fBpluto\fP accepts several optional arguments, useful mostly for debugging.Except for \fB\-\-interface\fP, each should appear at most once..TP\fB\-\-interface\fP \fIinterfacename\fPspecifies that the named real public network interface should be considered.The interface name specified should not be \fBipsec\fP\fIN\fP.If the option doesn't appear, all interfaces are considered.To specify several interfaces, use the option once for each.One use of this option is to specify which interface should be usedwhen two or more share the same IP address..TP\fB\-\-ikeport\fP \fIport-number\fPchanges the UDP port that \fBpluto\fP will use(default, specified by IANA: 500).TP\fB\-\-ctlbase\fP \fIpath\fPbasename for control files.\fIpath\fP.ctl is the socket through which \fBwhack\fP communicates with\fBpluto\fP.\fIpath\fP.pid is the lockfile to prevent multiple \fBpluto\fP instances.The default is \fI/var/run/pluto/pluto\fP)..TP\fB\-\-secretsfile\fP \fIfile\fPspecifies the file for authentication secrets(default: \fI/etc/ipsec.secrets\fP).This name is subject to ``globbing'' as in \fIsh\fP(1),so every file with a matching name is processed.Quoting is generally needed to prevent the shell from doing the globbing..TP\fB\-\-adns\fP \fIpathname\fP

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
678五月天丁香亚洲综合网| 亚洲精选一二三| 亚洲精品一二三| 精品亚洲欧美一区| 在线观看亚洲成人| 亚洲国产精品黑人久久久| 日韩中文字幕91| 日本电影亚洲天堂一区| 国产女人aaa级久久久级| 日韩av一区二区三区| www.在线成人| 久久久不卡网国产精品二区| 午夜电影一区二区三区| 91小视频免费观看| 亚洲欧洲www| 国产福利一区二区三区| 日韩欧美黄色影院| 天天亚洲美女在线视频| 在线观看免费成人| 中文字幕一区二区三区精华液 | 国产精品久久网站| 国产一区久久久| 日韩久久免费av| 秋霞电影网一区二区| 在线观看亚洲一区| 夜夜嗨av一区二区三区四季av| youjizz国产精品| 亚洲欧美在线视频观看| 成人黄色一级视频| 国产精品不卡在线观看| 国产成人精品亚洲午夜麻豆| 国产三级精品在线| 国产a区久久久| 欧美激情一区在线| 丁香另类激情小说| 日韩一区欧美一区| 色噜噜久久综合| 亚洲一区二区三区四区在线观看 | 日韩欧美视频一区| 久久se这里有精品| 国产亚洲欧美一级| 9人人澡人人爽人人精品| 国产精品不卡一区| 色婷婷综合久久| 调教+趴+乳夹+国产+精品| 日韩一区二区在线看片| 奇米777欧美一区二区| 精品乱码亚洲一区二区不卡| 激情综合网天天干| 成人欧美一区二区三区1314| 色婷婷亚洲精品| 肉色丝袜一区二区| 精品国产91乱码一区二区三区| 国产乱码精品一区二区三区忘忧草 | 另类人妖一区二区av| 2019国产精品| 成人h版在线观看| 亚洲一区二区欧美激情| 日韩视频国产视频| 成人久久久精品乱码一区二区三区 | 欧美mv日韩mv国产网站| 福利一区二区在线观看| 亚洲少妇中出一区| 3d动漫精品啪啪一区二区竹菊| 麻豆freexxxx性91精品| 久久精品人人做人人爽人人 | 国产精品456露脸| 亚洲精品老司机| 欧美刺激脚交jootjob| a亚洲天堂av| 日本中文一区二区三区| 中文字幕欧美国产| 在线观看91av| k8久久久一区二区三区| 午夜免费欧美电影| 中文字幕乱码一区二区免费| 欧美日韩免费观看一区二区三区 | 精品国产不卡一区二区三区| 成人综合在线观看| 美女视频免费一区| 一区二区三区四区在线播放| 日韩欧美国产一区在线观看| 91电影在线观看| 国产a精品视频| 蜜臀va亚洲va欧美va天堂 | 在线综合视频播放| 99国产麻豆精品| 国产精品羞羞答答xxdd| 视频一区二区欧美| 亚洲午夜激情av| 中文字幕中文字幕一区| 欧美精品一区二区久久久| 欧美日韩一区小说| 色拍拍在线精品视频8848| 懂色av中文一区二区三区| 久久成人久久爱| 蜜桃视频一区二区| 亚洲大片一区二区三区| 亚洲日本中文字幕区| 国产精品卡一卡二| 欧美激情一区在线| 日本一区二区三区dvd视频在线| 91精品国产免费| 制服丝袜中文字幕亚洲| 欧美日韩精品三区| 欧美精品vⅰdeose4hd| 欧美三级日韩在线| 欧美日本一区二区三区四区| 色8久久精品久久久久久蜜| 色婷婷综合五月| 色狠狠综合天天综合综合| 91麻豆.com| 色女孩综合影院| 欧美在线三级电影| 欧美性xxxxxxxx| 欧美在线免费播放| 精品视频全国免费看| 欧美三级乱人伦电影| 欧美嫩在线观看| 日韩三级在线观看| 日韩精品一区二区三区视频| 精品国产一区二区三区av性色| 欧美一区二区三区在线看| 日韩欧美一二三| 久久久久久久久久久久久夜| 欧美极品另类videosde| 国产精品久久久久久久久搜平片 | 欧美激情中文字幕一区二区| 中日韩免费视频中文字幕| 麻豆高清免费国产一区| 国产资源精品在线观看| 成人一区二区三区视频| 在线免费观看日韩欧美| 欧美夫妻性生活| www一区二区| 国产精品第一页第二页第三页| 亚洲另类在线视频| 日韩成人伦理电影在线观看| 国产一区啦啦啦在线观看| www.欧美.com| 制服丝袜中文字幕亚洲| 久久免费的精品国产v∧| 1区2区3区精品视频| 亚洲不卡av一区二区三区| 精品一区二区三区视频在线观看| 成人av先锋影音| 717成人午夜免费福利电影| 精品免费一区二区三区| 国产精品夫妻自拍| 视频在线观看国产精品| 成人性生交大片免费| 欧美日韩精品一区二区在线播放| 亚洲精品一区二区三区精华液| 国产精品成人网| 久久99国内精品| 一本到不卡精品视频在线观看| 日韩精品专区在线影院重磅| 成人免费在线观看入口| 老鸭窝一区二区久久精品| 色香蕉久久蜜桃| 国产欧美日韩三区| 婷婷中文字幕一区三区| 99久久伊人精品| 久久尤物电影视频在线观看| 一级女性全黄久久生活片免费| 国产一区二区h| 欧美军同video69gay| 国产精品乱人伦中文| 蜜桃传媒麻豆第一区在线观看| 色综合一个色综合| 欧美岛国在线观看| 香蕉久久夜色精品国产使用方法| 成人在线一区二区三区| www国产精品av| 日韩黄色一级片| 欧美日韩免费电影| 亚洲日本乱码在线观看| 国产传媒欧美日韩成人| 日韩亚洲欧美成人一区| 午夜影视日本亚洲欧洲精品| 91丨porny丨户外露出| 国产日韩精品一区二区三区| 91老师片黄在线观看| 久久久99免费| 国产一区二区三区最好精华液| 欧美人与性动xxxx| 亚洲二区在线观看| 色综合天天狠狠| 国产精品高清亚洲| av电影一区二区| 亚洲丝袜自拍清纯另类| 成人一区二区三区中文字幕| 久久久久久久综合狠狠综合| 蜜桃在线一区二区三区| 日韩欧美一级在线播放| 免费成人你懂的| 日韩精品影音先锋| 麻豆一区二区三区| 日韩精品一区二区三区视频播放 | 婷婷中文字幕综合|