ÉèΪÊ×Ò³Êղر¾Õ¾language¡ú¡ú ÓïÑÔÇл»

ºèðÀÂÛ̳

 ÕÒ»ØÃÜÂë
 ÂÛ̳ע²á

QQ怬

ÏÈ×¢²áÔÙ°ó¶¨QQ

²é¿´: 2876|»Ø¸´: 44
ÊÕÆð×ó²à

[±ÊÊÔÕ½±¨] CCIE Security 400-251 written passed (11/29)

[¸´ÖÆÁ´½Ó]
·¢±íÓÚ 2019-11-29 23:16:05 | ÏÔʾȫ²¿Â¥²ã |ÔĶÁģʽ
±¾Ìû×îºóÓÉ alomar ÓÚ 2019-11-29 23:17 ±à¼­ 4 z" B9 p+ V" p6 I+ j
, Z$ [8 Q# b9 x$ u0 f$ ~
¸üÐÂÁË124QµÄ²¿·Ö´ð°¸£¬µ«ß€²»ÊÇÍêÈ«Õý´_ ~: ]* d8 _! }1 |8 C* ?, D
* u. Q# J) V2 z. G+ |/ l1 Y
IMG_E0115.JPG

400-251 124Q.pdf

4.96 MB, ÏÂÔØ´ÎÊý: 203, ÏÂÔØ»ý·Ö: ºèðÀ±Ò -1 ¸ö

ÊÛ¼Û: 10 ¸öºèðÀ±Ò  [¼Ç¼]

ÆÀ·Ö

²ÎÓëÈËÊý 1ºèðÀ±Ò +100 ÊÕÆð ÀíÓÉ
goodluck + 100 ºÜ¸øÁ¦!

²é¿´È«²¿ÆÀ·Ö

·¢±íÓÚ 2019-11-30 08:58:07 | ÏÔʾȫ²¿Â¥²ã
¹ýÏßÂʸßô£¬¿ª±³¡£
ɳ·¢ 2019-11-30 08:58:07 »Ø¸´ ÊÕÆð»Ø¸´
 成长值: 37555
·¢±íÓÚ 2019-11-30 09:49:55 | ÏÔʾȫ²¿Â¥²ã
¹§Ï²´óÀУ¡ÕâÌ×Ìâ¿â¸²¸ÇÂÊÔõôÑù£¿
µØ°å 2019-11-30 09:49:55 »Ø¸´ ÊÕÆð»Ø¸´
 Â¥Ö÷| ·¢±íÓÚ 2019-11-30 10:57:41 | ÏÔʾȫ²¿Â¥²ã
100% È«¸²Éw ~
5# 2019-11-30 10:57:41 »Ø¸´ ÊÕÆð»Ø¸´
Í·Ïñ±»ÆÁ±Î
·¢±íÓÚ 2019-11-30 11:37:57 | ÏÔʾȫ²¿Â¥²ã
Ìáʾ: ×÷Õß±»½ûÖ¹»òɾ³ý ÄÚÈÝ×Ô¶¯ÆÁ±Î
6# 2019-11-30 11:37:57 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-11-30 11:49:14 | ÏÔʾȫ²¿Â¥²ã
лл¥Ö÷µÄÎÞ˽·ÖÏí£¬ºÃºÃѧϰ£¬ÌìÌìÏòÉÏ£¡
7# 2019-11-30 11:49:14 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-11-30 20:15:17 | ÏÔʾȫ²¿Â¥²ã
27Ìâ´ð°¸²»¶Ô. ÎÒµ±Ê±Ñ¡µÄC.
0 w( [* K4 D' N- `' phttps://www.cisco.com/c/en/us/td ... 50xcg/swmacsec.html
7 `  g5 |$ v# l/ HUnderstanding Media Access Control Security and MACsec Key Agreement
9 j2 d( b1 I5 X, P  Z9 R# F0 [MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-of-band methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys. MKA and MACsec are implemented after successful authentication using the 802.1x Extensible Authentication Protocol (EAP) framework. Only host facing links (links between network access devices and endpoint devices such as a PC or IP phone) can be secured using MACsec.* r" ^5 p! t$ u  K' }  z

3 V6 ~5 Y% r" M& F8 AÓÐÐÄ˼µÄ¿ÉÒԲο¼ÏÂÃæµÄÄÚÈÝ×Ô¼º·ÖÎöÏÂ:
5 U# M0 J& c; I6 u6 r! qWhen the switch receives frames from the client, it decrypts them and calculates the correct ICV by using session keys provided by MKA.) \& A0 u! U1 R* b# f

/ H/ ]# Q7 ~9 Ehttps://www.cisco.com/c/en/us/td ... 50xcg/swmacsec.html8 B" J, {( b" [& z- U2 D6 I* ]& J

  X8 }6 D4 z6 k7 r6 x5 C8 j6 Z! w4 G+ @& k* }( d+ v
MACsec is the IEEE 802.1AE standard for authenticating and encrypting packets between two MACsec-capable devices. The Catalyst 4500 series switch supports 802.1AE encryption with MACsec Key Agreement (MKA) on downlink ports for encryption between the switch and host devices.' C7 m( \1 f! S, }( e2 k" |# b! f

7 X, M7 K& V8 W2 Mhttps://www.cisco.com/c/en/us/td ... onfig/swmacsec.html8 U! Q% Z0 h9 r$ ^
10# 2019-11-30 20:15:17 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-12-1 11:18:23 | ÏÔʾȫ²¿Â¥²ã
лл¥Ö÷µÄÎÞ˽·ÖÏí£¬ºÃºÃѧϰ£¬ÌìÌìÏòÉÏ£¡
11# 2019-12-1 11:18:23 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-12-2 12:16:15 | ÏÔʾȫ²¿Â¥²ã
ÎûÎûÎûÎûÎûÎûÎûÎûÎûÎûÎûÎûÎûÎûÎû
12# 2019-12-2 12:16:15 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-12-4 15:08:26 | ÏÔʾȫ²¿Â¥²ã
Congratulations
14# 2019-12-4 15:08:26 »Ø¸´ ÊÕÆð»Ø¸´
·¢±íÓÚ 2019-12-4 15:08:41 | ÏÔʾȫ²¿Â¥²ã
Congratulations
15# 2019-12-4 15:08:41 »Ø¸´ ÊÕÆð»Ø¸´
ÄúÐèÒªµÇ¼ºó²Å¿ÉÒÔ»ØÌû µÇ¼ | ÂÛ̳ע²á

±¾°æ»ý·Ö¹æÔò

QQ|Archiver|ÊÖ»ú°æ|СºÚÎÝ|sitemap|ºèðÀÂÛ̳ ( ¾©ICP±¸14027439ºÅ )  

GMT+8, 2024-5-2 04:17 , Processed in 0.130464 second(s), 15 queries , Redis On.  

  Powered by Discuz!

  © 2001-2024 HH010.COM

¿ìËٻظ´ ·µ»Ø¶¥²¿ ·µ»ØÁбí