Posted in: Beijing2022

我的冬奥小记者之-崭新的一天

崭新的一天 “崭新”形容今天的心情是最合适不过的了。 昨天入住了北京冬奥的酒店,条件很好,处处彰显着祖国的强大。 之后如愿以偿的拿到了身份注册卡,嘘…信息需要保密 在酒店吃完晚饭后按照防疫要求做了核酸检测,之后美美的休息了一个晚上。 今天早早起来,发现昨天的风吹散了薄雾,太阳早早爬上了蓝天,照耀着大地,真是美好的一天呢。 吃完早餐后搭乘专用的通勤公交来到了位于国家会议中心二期的崭新的IBC中,走进IBC里面,感受着阳光的包裹,感慨着IBC的宽敞和明亮,心情格外晴朗。 来到工作区,暂时收拾下想要继续探索的心情,开始今天的冬奥支持工作。

Posted in: Beijing2022

我的冬奥小记者之-北京冬奥会,我们来啦!

北京冬奥会,我们来啦! 每届奥运都有草谷GV的身影,本次北京冬奥更是如此。 1月10日开始,GV工程师将奔赴现场,开启他们的奥运之旅,全力投入到冬奥会相关的保障支持工作中。 作为一家拥有超过60年历史的企业,草谷GV的服务深得全世界用户的信赖。我们宣誓会全力支持战斗在冬奥一线的媒体伙伴,助力冬奥在北京这座世界唯一的“双奥之城”成功举办。 冬奥,草谷,让我们“一起向未来”,“Together for a Shared Future!”

Posted in: Arista, mDNS

Arista Multicast DNS Gateway

Arista Multicast DNS Gateway (EOS-4.26 ++)

Description

A mDNS Gateway extends the link-local scope of mDNS messages to additional subnets
to provide service discovery and domain name resolution over an extended link-local
multicast domain. A mDNS gateway can also peer with additional mDNS gateways to
extend the logical link-local multicast domain to include directly connected subnets on a
mDNS gateway peer. To manage services in the extended link-local multicast domain, a
gateway also specifies service rule policies that can:

  1. filter on interested service types;
  2. control the discoverable subnets for a given client subnet; and,
  3. limit the discoverable services based on the geographical location of the client.

The mDNS gateway respects the link-local scope of mDNS messages and does not
propagate mDNS traffic between subnets when building extended link-local multicast
domain. Each mDNS gateway will snoop mDNS announcements and proxy mDNS queries based on the learned results. When a logical link-local multicast domain stretches
multiple gateways a mDNS query will be forwarded to a mDNS gateway peer to query
mDNS announcements learned on the peer.

Posted in: Huawei CE8850

HUAWEI CE8850-64CQ-EI 通过STelnet登录设备举例

通过STelnet登录设备举例

适用产品和版本

CE12800/CE6800/CE5800系列产品V100R001C00或更高版本。

CE16800系列产品V200R005C20或更高版本。

CE7800系列产品V100R003C00或更高版本。

CE8800系列产品V100R006C00或更高版本。

CE12800E系列产品V200R002C50或更高版本。

CE9800系列产品V200R020C00或更高版本。

如果需要了解软件版本与交换机具体型号的配套信息,请查看硬件查询工具

Posted in: Arista

Arista交换机型号选择

Arista交换机型号选择 Model Switch Series Commercial Reference Notes Fixed Configuration https://www.arista.com/assets/data/pdf/Datasheets/7020R-48_Datasheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7280R-DataSheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7280R3-Data-Sheet.pdf PoE Enabled w/PTP https://www.arista.com/assets/data/pdf/Datasheets/CCS-720XP-Datasheet.pdf Modular Chassis https://www.arista.com/assets/data/pdf/Datasheets/7500RDataSheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7500R3-Data-Sheet.pdfhttps://www.arista.com/assets/data/pdf/Datasheets/7800R3-Data-Sheet.pdf Management Only https://www.arista.com/assets/data/pdf/Datasheets/7010T-48_Datasheet.pdf Cloud Vision https://www.arista.com/assets/data/pdf/TechBulletins/CloudVision_AAG.pdf

Posted in: Daily English

Invictus

Daily English Invictus 永不屈服 by William Ernest Henley Out of the night that covers me, 透过覆盖我的夜色 Black as the pit from pole to pole, 我看见黑暗层层叠叠 I thank whatever gods may be, 感谢上帝赐予我 for my unconquerable soul. 不可征服的灵魂 In the fell clutch of circumstance, 就算被地狱紧紧拽住 I have not winced nor cried aloud. 我也从未退避哀求 Under the bludgeonings […]

Posted in: Vulnerabilities

Apache Log4j Security Vulnerabilities (CVE-2021-44228)

Apache Log4j Security Vulnerabilities (CVE-2021-44228)

Background

Apache Log4j Security Vulnerabilities (CVE-2021-44228) has been found.

Cyber attackers are making over a hundred attempts to exploit this critical security vulnerability in Java logging library Apache Log4j every minute.

This vulnerability allows attackers to install malware, steal user credentials, and more.

The Log4j flaw (also now known as "Log4Shell") is a zero-day vulnerability (CVE-2021-44228) that first came to light on December 9, with warnings that it can allow unauthenticated remote code execution and access to servers.

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.

https://www.zdnet.com/article/security-warning-new-zero-day-in-the-log4j-java-library-is-already-being-exploited/

Back to Top