Posted in: Notes

2022新年愿望

2022新年愿望 很快就要和2021说再见了 想总结这一年却发现没什么可圈可点 除了堆积的愈来愈厚的乡情 就剩下感慨散的太快的光阴 展望下一年 许下新年的愿望 愿父母健康幸福 愿自己每天都能距目标更近一点

Posted in: Arista, mDNS

Arista Multicast DNS Gateway

Arista Multicast DNS Gateway (EOS-4.26 ++)

Description

A mDNS Gateway extends the link-local scope of mDNS messages to additional subnets
to provide service discovery and domain name resolution over an extended link-local
multicast domain. A mDNS gateway can also peer with additional mDNS gateways to
extend the logical link-local multicast domain to include directly connected subnets on a
mDNS gateway peer. To manage services in the extended link-local multicast domain, a
gateway also specifies service rule policies that can:

  1. filter on interested service types;
  2. control the discoverable subnets for a given client subnet; and,
  3. limit the discoverable services based on the geographical location of the client.

The mDNS gateway respects the link-local scope of mDNS messages and does not
propagate mDNS traffic between subnets when building extended link-local multicast
domain. Each mDNS gateway will snoop mDNS announcements and proxy mDNS queries based on the learned results. When a logical link-local multicast domain stretches
multiple gateways a mDNS query will be forwarded to a mDNS gateway peer to query
mDNS announcements learned on the peer.

Posted in: Huawei CE8850

HUAWEI CE8850-64CQ-EI 通过STelnet登录设备举例

通过STelnet登录设备举例

适用产品和版本

CE12800/CE6800/CE5800系列产品V100R001C00或更高版本。

CE16800系列产品V200R005C20或更高版本。

CE7800系列产品V100R003C00或更高版本。

CE8800系列产品V100R006C00或更高版本。

CE12800E系列产品V200R002C50或更高版本。

CE9800系列产品V200R020C00或更高版本。

如果需要了解软件版本与交换机具体型号的配套信息,请查看硬件查询工具

Posted in: Arista

Arista交换机型号选择

Arista交换机型号选择 Model Switch Series Commercial Reference Notes Fixed Configuration https://www.arista.com/assets/data/pdf/Datasheets/7020R-48_Datasheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7280R-DataSheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7280R3-Data-Sheet.pdf PoE Enabled w/PTP https://www.arista.com/assets/data/pdf/Datasheets/CCS-720XP-Datasheet.pdf Modular Chassis https://www.arista.com/assets/data/pdf/Datasheets/7500RDataSheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7500R3-Data-Sheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7800R3-Data-Sheet.pdf Management Only https://www.arista.com/assets/data/pdf/Datasheets/7010T-48_Datasheet.pdf Cloud Vision https://www.arista.com/assets/data/pdf/TechBulletins/CloudVision_AAG.pdf

Posted in: Daily English

Invictus

Daily English Invictus 永不屈服 by William Ernest Henley Out of the night that covers me, 透过覆盖我的夜色 Black as the pit from pole to pole, 我看见黑暗层层叠叠 I thank whatever gods may be, 感谢上帝赐予我 for my unconquerable soul. 不可征服的灵魂 In the fell clutch of circumstance, 就算被地狱紧紧拽住 I have not winced nor cried aloud. 我也从未退避哀求 Under the bludgeonings […]

Posted in: Vulnerabilities

Apache Log4j Security Vulnerabilities (CVE-2021-44228)

Apache Log4j Security Vulnerabilities (CVE-2021-44228)

Background

Apache Log4j Security Vulnerabilities (CVE-2021-44228) has been found.

Cyber attackers are making over a hundred attempts to exploit this critical security vulnerability in Java logging library Apache Log4j every minute.

This vulnerability allows attackers to install malware, steal user credentials, and more.

The Log4j flaw (also now known as "Log4Shell") is a zero-day vulnerability (CVE-2021-44228) that first came to light on December 9, with warnings that it can allow unauthenticated remote code execution and access to servers.

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.

https://www.zdnet.com/article/security-warning-new-zero-day-in-the-log4j-java-library-is-already-being-exploited/

Back to Top