freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

網(wǎng)絡(luò)集成課程設(shè)計-資料下載頁

2025-01-13 17:31本頁面
  

【正文】 Jan 10 2012 11:00:18 4 rw 0 Jan 08 2012 18:02:27 webdata 5 rw 0 Jan 08 2012 18:09:13 mail 6 rw 70 Nov 23 2012 18:14:02 small 7 rw 18 Nov 23 2012 18:29:44 smallhost 8 rw 9 Nov 23 2012 18:21:43 smallsmtp 9 rw 1599 Jan 13 2013 18:46:36 10 rw 43 Jan 13 2013 18:59:58 webfilter15621 KB total (8218 KB free)Fmore webfilter denydeny(2)網(wǎng)頁地址過濾實驗效果驗證DHCP自動獲取IP地址效果圖。圖 DHCP自動獲取地址網(wǎng)頁地址過濾之前,我們訪問百度網(wǎng)頁。圖 過濾前訪問百度網(wǎng)網(wǎng)頁地址過濾后,我們訪問百度網(wǎng)頁。圖 過濾后訪問百度網(wǎng)(3)郵件主題過濾[F] firewall packetfilter enable[F]firewall packetfilter default permit[F]firewall smtpfilter subject enable //啟用郵件主題過濾功能[F]aspfpolicy 1 [Faspfpolicy1]detect smtp [Faspfpolicy1] detect tcp[Faspfpolicy1]detect udp[Faspfpolicy1]dhcp server ippool test [Fdhcppooltest] network mask [Fdhcppooltest]gatewaylist [Fdhcppooltest]dnslist [Fdhcppooltest]acl number 3000[Facladv3000] rule 0 permit ip source [Facladv3000]rule 1 deny ip[F]int Ethernet0/0[FEthernet0/0] ip address [FEthernet0/0]dhcp server dnslist [FEthernet0/0]quit [F]int eth0/1[FEthernet0/1]ip add 24[FEthernet0/1] firewall aspf 1 outbound[FEthernet0/1]nat outbound 3000 [FEthernet0/1]firewall zone trust[F]firewall zone trust[Fzonetrust]add int eth0/0[Fzonetrust]firewall zone untrust[Fzoneuntrust]add int eth0/1[Fzoneuntrust]quit[F]ip routestatic [F]firewall smtpfilter subject add hello //添加郵件主題關(guān)鍵字 The configuration has been added successfully.[F]dis firewall smtpfilter subject itemall //顯示郵件主題過濾條目 Firewall smtpfilter subject items item(s) added manually : 1 item(s) loaded from file : 0 SN MatchTimes Keyword 1 0 hello[F]firewall smtpfilter subject savefile mailsubject..... The configuration has been saved successfully.[F]firewall smtpfilter subject loadfile flash:/mailsubject The keyword is found in filter when loading line:1. Item(s) loaded :0.(4)郵件主題過濾效果驗證新建賬戶圖 新建賬戶發(fā)送郵件,但是郵件主題不是“hello”。圖 發(fā)送主題不是“hello”的郵件發(fā)送郵件主題是“hello”的郵件。圖 發(fā)送郵件主題“hello”的阻止 實驗中疑問解答firewall smtpfilter subject loadfile flash:/mailsubject和firewall smtpfilter subject loadfile flash:/webfilter這兩句話加載不成功。原因:我們要在加載之前,要先保存,所以要先在目錄中有這兩個文件夾,那么文件才能夠加載到里面去。需要通過firewall smtpfilter subject savefile mailsubject或是firewall smtpfilter subject savefile webfilter命令保存關(guān)鍵字到flash中。在進(jìn)行實驗驗證的時候,我設(shè)置了網(wǎng)頁地址過濾,過濾的地址是百度,可是還是能夠上網(wǎng)。原因:因為在配置文檔中,我們沒有開啟urlfilter,代碼是firewall urlfilter host enable。郵件不成功發(fā)送接收。原因:沒有在賬戶服務(wù)器屬性中的設(shè)置賬戶和密碼,也就是登錄方式。還有就是在工具屬性服務(wù)器。題目四:選做題 實訓(xùn)任務(wù) 實驗要求請根據(jù)網(wǎng)絡(luò)結(jié)構(gòu)合理規(guī)劃IP地址,PCPCPCPCPC5分別位于不同網(wǎng)段,其中L2SW是二層交換機(jī)、L3SW是三層交換機(jī),RRR3是路由器。 要求PC1與PC2不能互通。網(wǎng)絡(luò)運行的OSPF協(xié)議,且區(qū)域劃分如圖所示,R2與R3間做虛鏈接。PC5所在網(wǎng)段是外網(wǎng),在R3上做NAT轉(zhuǎn)換,要求PCPCPCPC4能夠ping通PC5,PC5能夠訪問web 服務(wù)器。PC1與PC2不能訪問web服務(wù)器,PC3與PC4能訪問web服務(wù)器。 組網(wǎng)圖圖 實驗拓?fù)鋱D IP地址劃分表 41 IP地址規(guī)劃服務(wù)器端口IP地址R1E0/0E0/1S2/0R2S1/0E0/0S2/0R3S1/0E0/0E0/1SVLAN1VLAN2VLAN3PC1PC2PC3PC4PC5WEB服務(wù)器 實驗配置文檔 R1配置給各個端口配置IP地址[R1]int e0/0[R1Ethernet0/0]ip add 24[R1Ethernet0/0]int e0/1[R1Ethernet0/1]ip add 24[R1Ethernet0/1]%Jan 14 14:38:05:663 2013 R1 IFNET/4/UPDOWN: Line protocol on the interface Ethernet0/1 is UP [R1Ethernet0/1]int s2/0[R1Serial2/0]ip add 24[R1Serial2/0]quit給路由器本身配置IP地址[R1]router id OSPF配置area0區(qū)域[R1]ospf 1[R1ospf1]area 0[]network []network []network []network []quitACL配置,配置目的是為了讓PC1與PC2不能互通[R1]int e0/0[R1Ethernet0/0]acl number 3000[R1acladv3000]rule 0 deny ip source destination [R1acladv3000]quit[R1]int e0/1[R1Ethernet0/1]acl number 3001[R1acladv3001]rule 1 deny ip source destination [R1acladv3001]quit加入端口進(jìn)行運用[R1]firewall enable [R1]int e0/0[R1Ethernet0/0]firewall packetfilter 3000 inbound [R1Ethernet0/0]quit[R1]int e0/1[R1Ethernet0/1]firewall packetfilter 3001 inbound [R1Ethernet0/1]quit R2配置配置各個端口的IP地址[R2]int e0/0[R2Ethernet0/0]ip add 24[R2Ethernet0/0]ip add 24[R2Ethernet0/0]int s1/0[R2Serial1/0]ip add 24[R2Serial1/0]%Jan 14 14:23:36:391 2013 R2 IFNET/4/UPDOWN: Protocol PPP IPCP on the interface Serial1/0 is UP [R2Serial1/0]int s2/0[R2Serial2/0]ip add 24[R2]router id [R2]ospf 1[R2ospf1]area 0[]network []%Jan 14 14:50:03:660 2013 R2 RM/3/RMLOG:OSPFNBRCHANGE: Process 1, Neighbor (Serial1/0) from Loading to Full[]quit[R2ospf1]area 1[]network []network []network []quit[R2ospf1]area 0[]network []quit[R2ospf1]quitOSPF的虛鏈接配置[R2]ospf 1[R2ospf1]area 1[]vlinkpeer []quit[R2ospf1]quit進(jìn)行ACL配置,不允許PC1與PC2訪問PC5。[R2]firewall enable [R2]acl number 3003[R2acladv3003]rule 2 deny ip source destination [R2acladv3003]rule 3 deny ip source destination [R2acladv3003]quit[R2]int e0/0[R2Ethernet0/0]firewall packetfilter 3003 outbound R3配置給各個端口進(jìn)行IP配置[R3]int e0/0[R3Ethernet0/0]ip add 24[R3Ethernet0/0]int s1/0[R3Serial1/0]ip add 24[R3Serial1/0]%Jan 14 14:42:47:628 2013 R3 IFNET/4/UPDOWN: Protocol PPP IPCP on the interface Serial1/0 is UP [R3Serial1/0]int e0/1[R3Ethernet0/1]ip add 24[R3Ethernet0/1]%Jan 14 14:43:00:831 2013 R3 IFNET/4/UPDOWN: Line protocol on the interface Ethernet0/1 is UP [R3]route id [R3]ospf 1[R3ospf1]area 1[]network []network [R3ospf1]area 2[]network []quit[R3ospf1]quit[R3]ospf 1[R3ospf1]area 1[]vlinkpeer []quit[R3ospf1]quit地址池轉(zhuǎn)換配置[R3]nat addressgroup 1 [R3]acl number 2000[R3aclbasic2000]rule 1 permit source [R3]int e0/0[R3Ether
點擊復(fù)制文檔內(nèi)容
范文總結(jié)相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1