
今日推荐:https://cloud.tencent.com/developer/article/2465281
文章标题:微服务架构:由浅入深带你了解底层注册中心
这篇文章详细写明了微服务的架构,方便上手实操,简单便捷,针对有需要的去试试吧!
继续第一期的题目进行整理题目,不定期更新
4.勒索蠕虫病毒席卷全球,爆发了堪称史上最大规模的网络攻击,通过对总部核心交换机RS所有业务VLAN下配置访问控制策略实现双向安全防护; 这题主要考点是对于网络防护的使用情况,防病毒入侵的可以具体看一下。
ip access-list extendedbd
pormit ip any-source any-destination
pormit tcp any-source any-destination d-port 135
pormit tcp any-source any-destination d-port 137
pormit tcp any-source any-destination d-port 139
pormit tcp any-source any-destination d-port 445
pormit udp any-source any-destination d-port 135
pormit udp any-source any-destination d-port 137
pormit udp any-source any-destination d-port 138
pormit udp any-source any-destination d-port 139
pormit udp any-source any-destination d-port 445
permit ip any-source any-destination
exit
ip access-list extended qu
permit ip 172.16.40.0 0.0.0.63 host-destination 10.100.18.2
permit ip any-source any-destination
exit5. RS配置IPv6地址,使用相关特性实现VLAN50的IPv6终端可自动从网关处获得IPv6有状态地址;
WS配置IPv6地址,开启路由公告功能,路由器公告的生存期为2小时,确保VLAN30的IPv6终端可以获得IPv6无状态地址。
WS与RS之间配置RIPng, 使PC1与PC3可以通过IPv6通信;
IPv6业务地址规划如下,其它IPv6地址自行规划:
业务 | IPV6地址 |
|---|---|
VLAN30 | 2001:30::254/64 |
VLAN50 | 2001:50::254/64 |
interface Vlan50
ipv6 address 2001:50::254/64
no ipv6 nd suppress-ra
ipv6 nd managed-config-flag
ipv6 router rip
ip address 172.16.50.62 255.255.255.192
ipv6 dhcp server vlan50
interface Vlan30
ipv6 address 2001:30::254/64
no ipv6 nd suppress-ra
ipv6 nd managed-config-flag
ipv6 router rip
ip address 172.16.50.62 255.255.255.192
ipv6 dhcp server vlan30
6. 尽可能加大RS与防火墙FW之间的带宽;
配置使总部VLAN40业务的用户访问IDC SERVER的数据流经过FW 10.1.0.254, IDC SERVER返回数据流经过FW 10.2.0.254,且对双向数据流开启所有安全防护,参数和行为为默认;
interface aggregate1.113
zone "trust"
ip address 10.1.0.254 255.255.255.252
manage ping
manage https
manage snmp
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 G36eRB/ShdMC47LcNT2ponSw3FEN
reverse-route prefer
exit
interface aggregate1.114
zone "trust"
ip address 10.2.0.254 255.255.255.252
bind pbr-policy "hui"
manage ping
manage https
manage snmp
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 Z1FpPM68Q+V89mL4l4YzQTJ7I8Yk
reverse-route prefer
exit7.FW、RS、WS之间配置OSPF area 0 开启基于链路的MD5认证,密钥自定义,传播访问INTERNET默认路由;
interface aggregate1.113
zone "trust"
ip address 10.1.0.254 255.255.255.252
manage ping
manage https
manage snmp
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 G36eRB/ShdMC47LcNT2ponSw3FEN
reverse-route prefer
exit由于近期的时间还有比赛通知的下发,每天的学习进度有限整理的题目也是尽快分篇每日发布一些,可以订阅收藏哦!

原创声明:本文系作者授权腾讯云开发者社区发表,未经许可,不得转载。
如有侵权,请联系 cloudcommunity@tencent.com 删除。
原创声明:本文系作者授权腾讯云开发者社区发表,未经许可,不得转载。
如有侵权,请联系 cloudcommunity@tencent.com 删除。