2010年8月31日星期二
宝德PR2510D非阵列安装ubuntu server
1、清除阵列配置信息
Ctrl+E,进入阵列卡bios设置。
initianlization—>Space—>F10, Yes
configuration—>clear configuration
重启
F2进入系统BIOS设置。
F9恢复出厂设置
或者
将config SAS as SW Raid禁用,即可
2、装ubuntu server 或其他系统就可以找到硬盘。
标签: PR2510D, Ubuntu Server
2010年8月30日星期一
Ubuntu 11.04开发代号确定为Natty Narwhal zz
标签: Ubuntu 11.04
Ubuntu 10.04.1 LTS 正式发布 zz
微软发布Windows Live Essentials 2011 Beta 2 zz
标签: Windows Live Essentials 2011 Beta 2
2010年8月29日星期日
Firefox 4将领先其它浏览器一代 zz
标签: Advance, Firefox 4.0
Ruby 1.9.2发布 zz
标签: Ruby 1.9.2
Openfetion v1.8 发布 zz
标签: Openfetion v1.8
Ubuntu放弃支持ia64和sparc架构 zz
标签: Ia64, Sparc, Ubuntu10.10
Linux kernel高危安全漏洞悄悄修复 zz
标签: linux kernel, Vulnerability Recoverery
基于Java的Flash播放器比Flash快30倍 zz
CyanogenMod 6.0发布 zz
标签: android, CyanogenMod 6.0
微软称Google Android可以使用.NET zz
标签: .NET, google android
PS3改机芯片证实能工作 zz
五角大楼担心中国的网络战 zz
Red Hat Enterprise Linux延长生命周期支持 zz
硬件黑客公布PSJailbreak zz
标签: PS3, PSJailbreak
Steam调查发现63%的玩家用Firefox zz
Linux发行版流行趋势图 zz
第一阵营的是五大发行版:Debian、SUSE、Fedora、Mandriva和Ubuntu,Ubuntu是其中唯一一个过去几年异军突起的发行版;第二阵营既包括了Slackware、Gentoo、Arch和CentOS这些有较长历史的成熟发行版,也包括了最近出现的PCLinuxOS、Puppy、Sabayon和Linux Mint等新星。另一个值得注意的现象是Android的入侵,它有望成为第一种被消费者广泛使用的基于Linux的操作系统。
标签: Linux Distribution, Trend
六款优秀的Linux客户服务问题回报自由软件 zz
标签: 6 Linux Client Service Problem
ATI Radeon HD 5000系列开源2D、3D驱动发布zz
标签: ATI Radeon HD 5000, OpenSource Driver
用在线代码生成器简化CSS 3编写zz
background:-moz-radial-gradient(60% 50% 40deg, #866400, #FF4E28 71%)
.为了简化CSS 3代码的编写,一些在线工具可以帮助开发者自动完成最困难的部分。这些在线代码生成器包括了CSS 3.0 Maker, CSS 3 Generator, Style Master CSS Editor和CSS 3 Please等。标签: CSS3, online coding
OpenSolaris管理委员会自行解散ZZ
标签: OpenSolaris, Oracle
OpenSSH 5.6发布zz
研究人员建议使用12位密码 zz
标签: 12 bit key, Security
Nmap发布Web地图zz
诺基亚西门子因向伊朗提供监控设备遭起诉zz
标签: Iran, Nokia Siemens
Windows 95发布15周年zz
标签: 15 anniversary, Windows95
微软透露超薄Xbox 360所用系统级芯片zz
标签: Slim Xbox 360, SoC
Fedora 14 Alpha发布zz
AMD公布Bulldozer架构细节 zz
当Intel持续创新,陆续推出Nehalem 和Sandy Bridge之际,AMD的产品一直落在竞争对手后面,全新的Bulldozer对弥补差距至关重要。Bulldozer除了集成南桥、内存控制器,更大的共享L3缓存外,每个核心还支持双线程,根据负荷动态分配资源,支持256位SIMD操作。AMD在传统的多核和多线程同步之间找到了“第三条道路”——在芯片多处理(CMP)设计中,同时运行的线程运行在不同核心上,而同步多线程(SMT)能让同时运行的两个或更多线程共享相同核心——Bulldozer则是站在CMP和SMT两种方法的中间。
为什么Intel收购McAfee?zz
极光行动(Operation Aurora)是最近发生的可能源自中国的一场大规模网络攻击,遭受攻击的公司包括了Google、Adobe、Intel、Rackspace、雅虎、赛门铁克、诺斯洛普·格鲁门等。极光行动曝光后,Intel高层开始将安全放在了头号位置,这一说法可以从Intel CTO Justin Rattner最近的回答得到印证。在Intel研发日的问答环节,有人询问他这些天在什么上投入了最多时间,Rattner毫不犹豫的回答是“安全”。安全是一个系统工程,硬件安全只是其中的一小部分,Intel可以提供芯片内置的随机数生成器和加密加速模块,但在网络等其它领域他们无能为力。收购McAfee可以结合软件安全和硬件安全,强化防御类似极光行动等复杂攻击的能力。这是一项长期性的战略意义的收购。
Python 2.6.6发布zz
Bzipped source tar ball (2.6.6)
Windows x86 MSI Installer (2.6.6)
Windows X86-64 MSI Installer (2.6.6)
标签: Python 2.6.6
Google在Gmail中测试语音通话zz
标签: gmail, google, google voice
Ubuntu 10.10多点触摸功能演示zz
标签: MultiTouch, Ubuntu 10.10
2010年最佳开源软件zz
最佳开源开发工具:Go语言,JRuby,Zend Framework,JQuery,jQTouch,Apache Hadoop,R语言,Git等。
最佳开源平台和中间件:Google Android,Nginx,VirtualBox,KVM,Facebook的Cassandra等。
最佳开源网络软件:Hyperic HQ,FreeNAS等等。
标签: 2010 Opensource
软件路由器创速度记录zz
H264专利将对普通用户永久免费zz
五款优秀的Linux屏幕捕捉自由软件工具zz
标签: Linux, SnapShot Software
25%的病毒是通过USB传播zz
PandaLabs调查了全世界20个国家的10470多家公司,48%的中小企业(拥有电脑不超过1000台)承认过去一年被恶意软件感染。其中27%证实感染源头是连接到电脑的USB存储设备。PandaLabs的技术主管Luis Corrons指出,现在能通过USB与电脑连接的设备层出不穷,如手机、数字照相机、MP3和MP4等等,它们多数都带有储存卡,因此手机在你不知道的情况下携带病毒是一种行之有效的传播方式。
标签: 25%, Virus Propagate
Glibc终于是自由软件了ZZ
Sun为Unix创造了一个RPC实现,被称为Sun RPC。源代码使用了一个比较自由的许可证:允许任意拷贝或修改,但无权许可或分发给其它人,除非是作为用户开发的产品的一部分。Sun RPC随后被开发者广泛使用,它是NFS文件系统的基础。世事变迁:从1980年代到1990年代,自由软件运动确立了软件自由的四大原则,GPL自由软件许可证于1986年出现,Debian确定他们的核心理念是创建完全由自由软件组成的GNU/Linux发行版。Debian仔细检查了数百万行代码,他们在2002年发现旧的Sun RPC代码还存在于核心的Linux文件glibc和portmap中。但对Sun来说,寻找这些非自由的可疑代码的原始出处相当棘手,因为写代码的人已经离开了公司,但如果要改变许可证必须要确定代码的原始来源,于是此事被搁置了起来。直到8月18日,令人感到讽刺的是,收购了Sun的甲骨文公司宣布了新的许可证,用3-clause BSD许可证重新授权。
现在Glibc、NFS和portmap都是纯粹的自由软件了。
Linux原生ZFS文件系统模块将于下月发布zz
标签: Linux Native ZFS
五角大楼披露2008年网络攻击为“史上最严重”zz
这起事件发生在中东,此前一直被列为机密。Lynn称,USB存储器上的恶意程序在未被察觉的情况下在国防部保密和非保密系统内传播,终形成了一个类似数字据点的东西,数据从这里被传送到外国控制的服务器上。他说,国防部抵御这次攻击的行动名称为Operation Buckshot Yankee,这标志着美国互联网防御策略的转折点。文章警告,美国的敌人即使不建造隐形战斗机、航空母舰及其他价值不菲的武器系统,也可以威胁美国军队。《连线》引用参与抵御此次攻击的军方人士的话称,该恶意程序被称作“gent.btz”,是SillyFDC蠕虫的一个变种,杀毒软件供应商赛门铁克将SillyFDC归类为低风险病毒。因为疏忽大意一种常见的病毒就能如此广泛的传播,显示五角大楼的网络并没有努力抵御攻击。
标签: 2008 Attack, Petagon
Google公开实时搜索网页zz
实时搜索是一项困难的挑战:将不断涌入的大量实时内容,以关联的方式整理成可搜索的结果,比一般的网页抓取困难许多。Google还必须付钱给Twitter,才能进入其“firehose”,取得所有tweet以供搜寻。微软和Yahoo也在试验实时搜索。Google新网页上线的前几个小时,搜索结果的主要内容来源还是Twitter,但当中仍有少数Facebook、Google Buzz、MySpace和Friendfeed等站的公开信息。
标签: google, RealTime Search
Facebook Chat将在IE9 beta发布日停止支持IE6 zz
标签: Facebook Chat, IE9 Beta
2010年8月28日星期六
使用Firefox登陆中国农业银行zz
标签: ABC, firefox, Greasemonkey
很多黑客会不小心将代码发给微软
黑客在微软操作系统中测试恶意程序,每当让系统崩溃后,Windows会询问是否愿意将错误细节——包括恶意程序代码——发送给微软,有趣的是很多人选择同意发送。Heckman说,你想象不到微软得到了多少内容。Heckman在Microsoft Tech.Ed 2010会议上详细介绍了黑客们常用的攻击手段,包括跨站脚本和SQL注入。他指出黑客们一开始总会拿微软官网练手,Microsoft.com平均每秒会受到7000次到9000次攻击。
2010年8月21日星期六
中国下月全面推行手机实名制 zz
工信部的要求,从9月1日起,凡购买预付费手机卡的用户,必须提供真实的身份证件,由运营商存入系统留档。对于报亭这样的社会渠道,工信部的要求是“卖哪家公司的卡,哪家公司要管到底”。“也就是说,还允许他们销售电话号卡,但要求他们详细登记用户的个人信息。每天晚上,运营商还要与报亭联系,收回这些信 息存档,并且在这些号卡激活后,再回访客户核实信息。”对于那些早已购卡的老预付费客户,运营商将要完成浩大的补录信息和信息核实工作。这项工作主要通过 两个渠道完成:借老客户来营业厅办理其他业务的机会,留下他们的身份证件信息;运营商通过发短信的方式,要求他们在一定时间段内回营业厅协助办理这项工 作。考虑到工作量,新政的实施将有两年多的过渡期,到2012年将全部完成手机实名登记。中国手机用户已经超过7亿,其中七八成都是不需要实名登记的预付 费用户。
2010年8月19日星期四
Juniper SSG 520 通过 Boot Loader升级固件
SSG 520:
boot loader版本:Saipanloader V1.0.7
firmware screenOS版本:5.4.0
下载的新版本固件:ssg500.6.3.0r4.0
PC机:安装 Cisco TFTP Server,将ssg500.6.3.0r4.0放置到该目录下。PC机ip地址是 192.168.170.210
二、步骤
1、将PC机串口连接SSG 520 Console口,将PC机网口连接SSG520 ethernet0/0,PC机ip地址为192.168.170.210。启动TFTP Server。
2、开启终端工具(如windows hyperterminal),启动SSG 520。终端工具中显示
ScreenOS Saipanloader V1.0.7
Built Mar 19 2009/15:54:12
watchdog_probe, 1132 bus/dev/fn = 0/248 ich = 2640
boot_drive = 80
start1 = 0768, start2 = 3840
Hit 'X' and 'A' to upgrade bootloadermounting FAT16 partition
此时hit 'X' and 'A'
file size = 112
size = 112, sizeof(nvram_rec) = 112
Hit any key to load new firmware
Serial Number []: READ ONLY
BOM Version Number []: READ ONLY
Self MAC Address [0000-0000-0000]: READ ONLYip = 192.168.170.91 svr = 192.168.17
0.210
self_ip_buf = 192.168.170.91, tftp_ip_buf = 192.168.170.210
Firmware File Name [ssg500.6.3.0r4.0]:
Self IP Address [192.168.170.91]:
TFTP IP Address [192.168.170.210]:
IP MASK [255.255.255.0]:
Gateway IP Address [192.168.170.210]:
Saipan motherboard proto 3 or later detected
Probing...[Ethernet0/0 and Ethernet0/1]
Initiating hardware and waiting for link up ...
self_ip = 192.168.170.91, tftp_server_ip = 192.168.170.210
ip = 192.168.170.91 mask = 255.255.255.0 gw = 192.168.170.210 svr = 192.168.170.
210
network_ready = 1
ssg500.6.3.0r4.0
buf_read = 10991, fp->maxposition = 11545327
offset = 0, maxposition = 11545327
11545327 bytes downloaded from tftp server
hdr->magic_number = 81ba16ee, hdr->platform_type = 1700, hdr->cpu_type = 11
Ignore image authentication!
Save to on-board flash disk? (y/[n]/m) Yes,选择Yes
Saving default system image to on-board flash disk...
Program flash (11545327 bytes) f_start = 14536 f_end = 20173
Done
Run downloaded system image? ([y]/n) Yes,选择Yes
loading elf format....
<0x4000000:0x48f5:0x0>
move image from 1001020 -> 4000000, size = 18677
<0x4005000:0xafc000:0x50d8>
move image from 1006020 -> 4005000, size = 11538648
real_entry_addr = 4000000, entry_addr = 4000000
Uncompressing Kernel...
Now booting the kernel
the system has been up for 0 second(s)
the system has been up for 0 second(s)
CPU:GenuineIntel
Version Information:
Extended Family ID = 0
Extended Model ID = 0
Family ID = f
Model = 4
Stepping ID = 9
Processor Type = 0
Brand String = 0
Additional Information:
Brand Index = 0
CLFLUSH Line Size = 64
Initial APIC ID = 0
Feature Information:
FPU VME DE PSE TSC MSR PAE MCE CX8 APIC SEP MTRR PGE MCA CMOV
PAT PSE-36 CLFSH DS ACPI MMX FXSR SSE SSE2 SS
HTT TM PBE
Extended Feature Information:
SSE3 MONITOR/MWAIT DS-CPL TM2 CNXT-ID
TLB/Cache Information:
1st-level data cache: 16 KByte, 8-way set associative, 64 byte line size
Data TLB: 4 KByte and 4 MByte pages, 64 entries
Instruction TLB: 4 KByte and 2-MByte or 4-MByte pages, 128 entries
Instruction TLB: 4 KByte Pages, 4-way set associative, 32 entries
2nd-level cache: 256-KB, 4-way set associative, sectored cache, 64-byte line siz
e
Trace cache: 12 K-ooooop, 8-way set associative
No 2nd-level cache or, if processor contains a valid 2nd-level cache, no 3rd-lev
el cache
3: eax = 0, ebx = 0, ecx = 0, edx = 0
4: eax = 121, ebx = 1c0003f, ecx = 1f, edx = 0
eax = 40, ebx = 40, ecx = 0, edx = 0
count = 80000008
Brand String: Intel(R) Celeron(R) CPU 2.53GHz
L1 I Cache: 0K (0 bytes/line), D cache 0K (0 bytes/line)
L2 Cache: 256K (64 bytes/line)
total DRAM size is 1048576 KB
init 0(+100000)
heap 100000(+2bf00000)
iocard 2c000000(+1400000)
packet 2d400000(+800000)
CTRL 2dc00000(+400000)
TASK 2e000000(+12000000)
heap_start = 24ff010, heap_size = 29b00ff0
RCBA = fed1c001
FD = f8ef1
MAP = 1
MAP = 1
bootmap_size = 8000
zone_table[ZONE_TASK].free_pages = 71670, zone_table[ZONE_TASK].num_pages = 7372
8
_fbss = 1cf5000, _end = 24ff000
data_start = 11e2000, data_end = 1cd4000
Juniper Networks, Inc
SSG520/SSG550 System Software
Copyright, 1997-2008
Version 6.3.0r4.0
set_ecb_dcr: not implemented
scan pci 0 devices....
Device found on PCI bus 0:dev_num is 0,vendor id is 0x25888086
Device found on PCI bus 0:dev_num is 1,vendor id is 0x25898086
Device found on PCI bus 0:dev_num is 29,vendor id is 0x26588086
Device found on PCI bus 0:dev_num is 30,vendor id is 0x244e8086
Device found on PCI bus 0:dev_num is 31,vendor id is 0x26408086
scan pci 1 devices....
Device found on PCI bus 1:dev_num is 0,vendor id is 0x03298086
scan pci 2 devices....
Device found on PCI bus 2:dev_num is 2,vendor id is 0x90001148
Device found on PCI bus 2:dev_num is 3,vendor id is 0x90001148
cav_bar_init: called. Dump BARs PCI conf regs --
cav_bar_init: called. orig reg setting: PCI 10 = 0000e801, 18 = 0000e401
Load Manufacture Information ... init manufacture info Done
cfcard ready.
Install module init vectors
Changed to l3 mode
IO_CARD_BUF_START: 0x2c000000
ssg Searching GbE devices...
On-board GbE device found, VID = 0x1148, DID = 0x9000 Bus 2, Slot 2
On-board GbE device found, VID = 0x1148, DID = 0x9000 Bus 2, Slot 3
Total on-board GbE devices found 2
Total adapter GbE devices found 0
Install modules (011e2000,01cd4000) ...
PPP IP-POOL initiated, 256 pools
Initializing DI 1.1.0-ns
System config (743 bytes) loaded
Done.
Load System Configuration .....................
Unsupported command - set zone "VLAN" block
................................
Unsupported command - set dl-buf size 4718592
...........Done
system init done..
Load NVRAM Information ... (5.4.0)Done
login: ethernet0/0 interface change physical state to Up
login:
启动后为ScreenOS 6.3.0 r4
标签: Boot Loader, Firmware upgrade, Juniper SSG 520
Juniper SSG 520升级Boot Loader
SSG 520:
boot loader版本:SaipanLoader Version 1.0.2
新下载bootloader版本:1.0.7,Loadssg500v107.d
PC机:安装 Cisco TFTP Server,将Loadssg500v107.d 放置到该目录下。PC机ip地址是 192.168.170.210
二、步骤
1、将PC机串口连接SSG 520 Console口,将PC机网口连接SSG 520 ethernet0/0,PC机ip地址为192.168.170.210。启动TFTP Server。
2、开启终端工具(如windows hyperterminal),启动SSG 5。终端工具中显示
ScreenOS Saipanloader V1.0.2
Built Jan 19 2006/17:57:03
watchdog_probe, 1046 bus/dev/fn = 0/248 ich = 2640
boot_drive = 80
start1 = 0768, start2 = 3840
Hit 'X' and 'A' to upgrade bootloader此时Boot Loader版本为1.0.2,Hit 'X' and 'A',
3、
Loader File Name:Loadssg500v107.d
Self IP Address :192.168.170.91(设备bootloader ip地址)
TFTP IP Address :192.168.170.210
Saipan motherboard proto 3 or later detected
Probing...[Ethernet0/0 and Ethernet0/1]
Initiating hardware and waiting for link up ...
self_ip = 192.168.170.91, tftp_server_ip = 192.168.170.210
ip = 192.168.170.91 mask = 255.0.0.0 gw = 0.0.0.0 svr = 192.168.170.210
network_ready = 1
Loadssg500v107.d
buf_read = 22775, fp->maxposition = 121079
offset = 0, maxposition = 121079
121079 bytes downloaded from tftp server
old img size = 120104, new img size = 121032, load = 121079, sig = 47
Ignore image authentication!
mounting FAT12 partition
file /boot2 size was 120151, new size is 121079
f_start = 122 f_end = 181
getting sector information
boot1 size = 512
boot2 size = 512
boot2 . . . .
. . undetermined RESET
设备重启
4、终端中显示
ScreenOS Saipanloader V1.0.7
Built Mar 19 2009/15:54:12
Built Mar 19 2009/15:54:12
可以看到,boot loader已升级成功。
标签: Boot Loader Upgrade, Juniper SSG 520
Juniper SSG 5通过Boot Loader升级固件
SSG 5:
boot loader版本:Boot Loader Version 1.3.3
firmware screenOS版本:6.1.0
下载的新版本固件:ssg5ssg20.6.3.0r4.0
PC机:安装Solarwinds TFTP Server,其默认根目录默认为c:\TFTP-Root,已经将ssg5ssg20.6.3.0r4.0放置到该目录下。PC机ip地址是 192.168.170.210
二、步骤
1、将PC机串口连接SSG 5Console口,将PC机网口连接SSG5 ethernet0/3,PC机ip地址为192.168.170.210。启动TFTP Server。
2、开启终端工具(如windows hyperterminal),启动SSG 5。终端工具中显示
Juniper Networks SSG5 Boot Loader Version 1.3.3 (Checksum: D8BC25A8)
Copyright (c) 1997-2006 Juniper Networks, Inc.
Total physical memory: 256MB
Test - Pass
Initialization - Done
Hit any key to run loader
Hit any key to run loader
此时hit any key,
Serial Number [0162042009001887]: READ ONLY
HW Version Number [0710]: READ ONLY
Self MAC Address [0023-9c38-99c0]: READ ONLY
Boot File Name [ssg5ssg20.6.3.0r4.0]:ssg5ssg20.6.3.0r4.0
Self IP Address [192.168.170.91]:192.168.170.91
TFTP IP Address [192.168.170.210]:192.168.170.210
顺利的话
a!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!at
a!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!at
a!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!at
a!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!at
a!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!ata!at
a!ata!ata!ata!ata!ata!ata!ata
Loaded Successfully! (size = 13,280,811 bytes)
Image authenticated!
3、Save to on-board flash disk? (y/[n]/m) Yes!
此步选择yes,才能每次都能启动新固件,不同于升级boot loader,虽然升级入口都一样(Hit any key)
然后,
Saving system image to on-board flash disk...
Done! (size = 13,280,811 bytes)
4、Run downloaded system image? ([y]/n) Yes!
Start loading...
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
.................................................................
......................
Done.
Juniper Networks, Inc
SSG5/SSG20 System Software
Copyright, 1997-2008
Version 6.3.0r4.0
Cksum:d99f6452
Load Manufacture Information ... Done
Initialize FBTL 0........ Done
Load NVRAM Information ... (6.1.0)Done
Install module init vectors
The device is storing the firmware into reserved flash sectors.
Please do not power off the device during this operation. Doing so could result
in loss of firmware.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++
The device successfully completed the operation.
Changed to l3 mode
Install modules (01254800,01fb4000) ...
PPP IP-POOL initiated, 256 pools
Initializing DI 1.1.0-ns
System config (1331 bytes) loaded
Done.
Load System Configuration ...............................
Unsupported command - set zone "VLAN" block
..................................modem is not detected
....................................Disabled licensekey auto update
...........Done
system init done..
login: ethernet0/3 interface change physical state to Up
bgroup0 interface change physical state to Up
System change state to Active(1)
升级成功,此时进入ScreenOS 6.3.0r4
标签: Boot Loader, Firmware upgrade, Juniper SSG 5
Juniper SSG 5升级boot loader
SSG 5:
boot loader版本:Boot Loader Version 1.3.2
下载的新版本boot loader:Loadssg5ssg20v133.d
PC机:安装Solarwinds TFTP Server,其默认根目录默认为c:\TFTP-Root,已经将Loadssg5ssg20v133.d放置到该目录下。PC机ip地址是192.168.170.210
二、步骤
1、将PC机串口连接SSG 5Console口,将PC机网口连接SSG5 ethernet0/3,PC机ip地址为192.168.170.210。启动TFTP Server。
2、开启终端工具(如windows hyperterminal),启动SSG 5。终端工具中显示
Juniper Networks SSG5 Boot Loader Version 1.3.2 (Checksum: A1EAB858)
Copyright (c) 1997-2006 Juniper Networks, Inc.
Total physical memory: 256MB
Test - Pass
Initialization - Done
Hit any key to run loader
Hit any key to run loader
可以看出此时boot loader版本为1.3.2,此时hit any key,
Serial Number [0162042009001887]: READ ONLY
HW Version Number [0710]: READ ONLY
Self MAC Address [0023-9c38-99c0]: READ ONLY
Boot File Name [Loadssg5ssg20v133.d]:Loadssg5ssg20v133.d
Self IP Address [192.168.170.91]:192.168.170.91
TFTP IP Address [192.168.170.210]:192.168.170.210
顺利的话
Loading file "Loadssg5ssg20v133.d"...
rtatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatat
atatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatatata
Loaded Successfully! (size = 408,395 bytes)
Image authenticated!
3、Save to on-board flash disk? (y/[n]/m) No!
此时要选no,因为升级boot loader是一次性的行为,不需要存入on-board flash。
4、Run downloaded system image? ([y]/n) Yes!
******************************************************************
* *
* SSG5/SSG20 BOOT LOADER UPDATE UTILITY *
* ============================================== *
* (c)1997-2006 Juniper Networks, Inc. *
* All Rights Reserved *
* *
* ---------------------------------------------- *
* Boot Loader Version: 1.3.3 *
* Date : 05/26/2006 *
* *
* !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! *
* ! ! *
* ! Please don't power off during update. ! *
* ! Otherwise, the system can not boot again. ! *
* ! ! *
* !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! *
* *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *
******************************************************************
Check on-board Boot Loader... Update needed!
Are you sure you want to update Boot Loader? (y/n)
选择y。
5、Read product information of on-board boot flash device:
Manufacturer ID = 1f
Device ID = 13
Additional Device ID = 10
Boot flash device is AT49LV040B
Erase on-board boot flash device.......... Done
Update Boot Loader..............................................................
................................................................................
................................................................................
................................................................................
................................................................................
................................................................................
................................................................................
................................................................................
................................................................................
................................................. Done
Verify Boot Loader... Done
Boot Loader has been updated successfully!
Please hit any key to reboot the system...
Juniper Networks SSG5 Boot Loader Version 1.3.3 (Checksum: D8BC25A8)
Copyright (c) 1997-2006 Juniper Networks, Inc.
Total physical memory: 256MB
Test - Pass
Initialization - Done
Hit any key to run loader
Hit any key to run loader
可以看到Boot Loader的版本已经升级为1.3.3。
标签: Boot Loader, Juniper SSG 5, Upgrade
2010年8月18日星期三
SIMM & DIMM
SIMM(Single Inline Memory Module,单内联内存模块)
内存条通过金手指与主板连接,内存条正反两面都带有金手指。金手指可以在两面提供不同的信
号,也可以提供相同的信号。SIMM就是一种两侧金手指都提供相同信号的内存结构,它多用于早
期的FPM和EDD DRAM,最初一次只能传输8bif数据,后来逐渐发展出16bit、32bit的SIMM模组,
其中8bit和16bitSIMM使用30pin接口,32bit的则使用72pin接口。在内存发展进入SDRAM时代
后,SIMM逐渐被DIMM技术取代。 DIMM
DIMM与SIMM相当类似,不同的只是DIMM的金手指两端不像SIMM那样是互通的,它们各自独立
传输信号,因此可以满足更多数据信号的传送需要。同样采用DIMM,SDRAM 的接口与DDR内存
的接口也略有不同,SDRAM DIMM为168Pin DIMM结构,金手指每面为84Pin,金手指上有两个
卡口,用来避免插入插槽时,错误将内存反向插入而导致烧毁;DDR DIMM则采用184Pin DIMM
结构,金手指每面有92Pin,金手指上只有一个卡口。卡口数量的不同,是二者最为明显的区别。
DDR2 DIMM为240pin DIMM结构,金手指每面有120Pin,与DDR DIMM一样金手指上也只有
一个卡口,但是卡口的位置与DDR DIMM稍微有一些不同,因此DDR内存是插不进DDR2 DIMM
的,同理DDR2内存也是插不进DDR DIMM的,因此在一些同时具有DDR DIMM和DDR2 DIMM
的主板上,不会出现将内存插错插槽的问题。
2010年8月13日星期五
LAN to LAN VPN between two Juniper firewalls in Transparent mode
Firewall at Site A and Site B are in Transparent mode and connected to the Internet.
Internal network on the Firewall at Site A is 1.1.1.0 255.255.255.0. The Internet router is at 1.1.1.1, and the VLAN1 IP of the firewall is 1.1.1.50
Internal network on the Firewall at Site B is 1.1.2.0 255.255.255.0. The internet router is at 1.1.2.1, and the VLAN1 IP of the firewall is 1.1.2.50
Assuming both P1 and P2 are using "standard" security level, the Preshare key for P1 is "netscreen", and Replay Protection is disabled.
当vpn通道在端节点采用一对处于透明模式的netscreen防火墙,安全网关必须指明对等节点VLAN1接口的ip地址。处于透明模式的netscreen防火墙需要到达远程ipsec网关的静态路由。
要求1.1.1.0/24和1.1.2.0/24可以通过vpn隧道互访。
设备:
site A: Juniper SSG 5
site B: Juniper SSG 5
Internet: Cisco 3750模拟
具体配置
site A Juniper SSG 5
1、接口配置
set interface vlan1 ip 1.1.1.50/24
set interface vlan1 ip manageable
set interface vlan1 broadcast arp (webUI可以勾选trace route,但CLI无法表现)
set interface "ethernet0/0" zone "V1-Untrust"
set interface "ethernet0/1" zone "V1-DMZ"
set interface "ethernet0/6" zone "V1-Trust"
2、zone区段设置
设置V1-Untrust可以管理,V1-Trust默认可以管理,只是去掉无用的snmp和ssl。
set zone V1-Untrust manage ping
set zone V1-Untrust manage ssh
set zone V1-Untrust manage telnet
set zone V1-Untrust manage web
3、默认出互联网路由设置
set route 0.0.0.0/0 interface vlan1 gateway 1.1.1.1
4、策略设置准备
set address "V1-Trust" "lan-B" 1.1.2.0 255.255.255.0
set address "V1-Untrust" "lan-A" 1.1.1.0 255.255.255.0
set ike gateway "toB" address 1.1.2.50 Main outgoing-zone "V1-Untrust" preshare "netscreen" sec-level standard
set vpn "toB" gateway "toB" no-replay tunnel idletime 0 sec-level standard
5、 策略设置
set policy id 2 from "V1-Trust" to "V1-Untrust" "lan-A" "lan-B" "ANY" tunnel vpn "toB" id 0x1 pair-policy 3
set policy id 3 from "V1-Untrust" to "V1-Trust" "lan-B" "lan-A" "ANY" tunnel vpn
site B Juniper SSG 5
1、接口配置
set interface vlan1 ip 1.1.2.50/24
set interface vlan1 ip manageable
set interface vlan1 broadcast arp (webUI可以勾选trace route,但CLI无法表现)
set interface "ethernet0/0" zone "V1-Untrust"
set interface "ethernet0/1" zone "V1-DMZ"
set interface "ethernet0/6" zone "V1-Trust"
2、zone区段设置
设置V1-Untrust可以管理,V1-Trust默认可以管理,去掉snmp和ssl。
set zone V1-Untrust manage ping
set zone V1-Untrust manage ssh
set zone V1-Untrust manage telnet
set zone V1-Untrust manage web
3、默认出互联网路由设置
set route 0.0.0.0/0 interface vlan1 gateway 1.1.2.1
4、策略设置准备
set address "V1-Trust" "lan-B" 1.1.2.0 255.255.255.0
set address "V1-Untrust" "lan-A" 1.1.1.0 255.255.255.0
set ike gateway "toA" address 1.1.1.50 Main outgoing-zone "V1-Untrust" preshare "netscreen" sec-level standard
set vpn "toA" gateway "toA" no-replay tunnel idletime 0 sec-level standard
5、策略设置
set policy id 2 from "V1-Trust" to "V1-Untrust" "lan-B" "lan-A" "ANY" tunnel vpn "toA" id 0x1 pair-policy 3
set policy id 3 from "V1-Untrust" to "V1-Trust" "lan-A" "lan-B" "ANY" tunnel vpn "toA" id 0x1 pair-policy 2
Internet Cisco 3750配置:
vlan11: 1.1.1.1/24
vlan12: 1.1.2.1/24
gi1/0/1: 加入vlan11
gi1/0/2: 加入vlan12
客户端设置:
客户a:
ip:1.1.1.3
gateway: 1.1.1.1
1.1.1.3直接到1.1.1.1是ping不通的,因为没规则。
客户b:
ip: 1.1.2.3
gateway: 1.1.2.1
1.1.2.3直接到1.1.2.1是ping不通的,因为没规则。
标签: Double Tranparent mode, Lan to Lan VPN, SSG 5
2010年8月12日星期四
什么是HalfCD
HalfCD2是在HalfCD的基础之上,进一步增加了兼容性和扩展性,支持便携式多媒体设备,支持在线播放。
标签: HalfCD
重要消息
2、华为基于android的平板电脑s7亮相。
标签: info
基于Juniper SSG 5的局域网到局域网vpn实验
设备:
Firewall A: Juniper SSG 5
Firewall B: Juniper SSG 5
Internet: Cisco 3750,用3750实现互联网拓扑
配置细节:
Firewall A:路由模式
1、端口配置。
ethernet0/0:
zone:untrust
ip: 2.2.2.2/24,manageable
manage options: webui、ssh、telnet、ping
cli下:
set interface "ethernet0/0" zone "Untrust"
set interface ethernet0/0 ip 2.2.2.2/24
set interface ethernet0/0 route (端口路由模式)
set interface ethernet0/0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage web
ethernet0/2:将其从bgroup中解除绑定,在ssg 5中,ethernet0/2-0/6默认属于端口组bgroup,作为整体加入zone trust。
zone: trust
ip: 10.10.10.1/24, manageable
manage options: webui、ssh、telnet、ping
cli下:
set interface "ethernet0/2" zone "Trust"
set interface ethernet0/2 ip 10.10.10.1/24
set interface ethernet0/2 route (端口路由模式,trust zone的端口默认为nat接口)
set interface ethernet0/2 ip manageable
set interface ethernet0/2 manage ping
set interface ethernet0/2 manage ssh
set interface ethernet0/2 manage telnet
set interface ethernet0/2 manage web
2、设置到Internet的默认路由
set route 0.0.0.0/0 interface ethernet0/0 gateway 2.2.2.1
3、设置地址
set address "Trust" "FirewallA_Local" 10.10.10.2 255.255.255.255
set address "Untrust" "FirewallB_Remote" 1.1.1.3 255.255.255.255
4、设置vpn
Phase 1:
VPNs->AutoKey Advanced->Gateway->New
Gateway Name: p1-VPN
Security Level: Standard
Remote Gateway Type->Static IP Address: 1.1.1.2
Preshared Key: netscreen
Outgoing Interface: ethernet0/0
Phase 2:
VPNs->AutoKey IKE->New
VPN Name: p2-VPN
Security Level: Standard
Predefined: p1-VPN
cli下:
set ike gateway "p1-VPN" address 1.1.1.2 Main outgoing-interface "ethernet0/0" preshare "netscreen" sec-level standard
set vpn "p2-VPN" gateway "p1-VPN" no-replay tunnel idletime 0 sec-level standard
5、设置policy
Policies->From Trust to Untrust->New
Source Address Book Entry: FirewallA_Local
Destination Address Book Entry: FirewallB_Remote
Service: Any
Action: Tunnel
Tunnel VPN: p2-VPN
Modify matching bidirectional policy: Checked
Logging: Checked
cli下:
set policy id 2 from "Trust" to "Untrust" "FirewallA_Local" "FirewallB_Remote" "ANY" tunnel vpn "p2-VPN" id 0x1 pair-policy 3 log
set policy id 3 from "Untrust" to "Trust" "FirewallB_Remote" "FirewallA_Local" "ANY" tunnel vpn "p2-VPN" id 0x1 pair-policy 2 log
Firewall B:透明模式
1、将Firewall B设为透明模式,可通过get sys来确认。
2、端口配置。
vlan1:用于管理.
ip: 1.1.1.2/24,manageable
manage options: webui、ssh、telnet、ping
broadcast: arp,check trace route
cli下:
set interface vlan1 ip 1.1.1.2/24
set interface vlan1 ip manageable
ethernet0/0:
zone:v1-untrust
cli:
set interface "ethernet0/0" zone "V1-Untrust"
ethernet0/1:
zone: v1-dmz
cli:
set interface "ethernet0/1" zone "V1-DMZ"
ethernet0/2:
zone: v1-trust
cli:
set interface "ethernet0/2" zone "V1-Trust"
3、设置 到Internet的默认路由
set route 0.0.0.0/0 interface vlan1 gateway 1.1.1.1
4、设置地址
set address "V1-Trust" "FirewallB_Local" 1.1.1.3 255.255.255.255
set address "V1-Untrust" "FirewallA_Remote" 10.10.10.2 255.255.255.255
5、 设置vpn
Phase 1:
VPNs->AutoKey Advanced->Gateway->New
Gateway Name: p1-VPN
Security Level: Standard
Remote Gateway Type->Static IP Address: 2.2.2.2
Preshared Key: netscreen
outgoing-zone: "V1-Untrust"
Phase 2:
VPNs->AutoKey IKE->New
VPN Name: p2-VPN
Security Level: Standard
Predefined: p1-VPN
cli下:
set ike gateway "p1-VPN" address 2.2.2.2 Main outgoing-zone "V1-Untrust" preshare "netscreen" sec-level standard
set vpn "p2-VPN" gateway "p1-VPN" no-replay tunnel idletime 0 sec-level standard
6、设置policy
Policies->From V1-Trust to V1-Untrust->New
Source Address Book Entry: FirewallB_Local
Destination Address Book Entry: FirewallA_Remote
Service: Any
Action: Tunnel
Tunnel VPN: p2-VPN
Modify matching bidirectional policy: Checked
Logging: Checked
cli下:
set policy id 2 from "V1-Trust" to "V1-Untrust" "FirewallB_Local" "FirewallA_Remote" "ANY" tunnel vpn "p2-VPN" id 0x1 pair-policy 3 log
set policy id 3 from "V1-Untrust" to "V1-Trust" "FirewallA_Remote" "FirewallB_Local" "ANY" tunnel vpn "p2-VPN" id 0x1 pair-policy 2 log
不需要在Firewall B上设置从v1-trust any到v1-untrust any的允许any service的policy。
3750设置:
vlan11: 1.1.1.1/24
vlan12: 2.2.2.1/24
gi1/0/1: 加入vlan11
gi1/0/2: 加入vlan12
路由:ip route 10.10.10.0 255.255.255.0 2.2.2.2
客户端设置:
客户a:
ip:10.10.10.2
gateway: 10.10.10.1
客户b:
ip: 1.1.1.3
gateway: 1.1.1.1
这里从1.1.1.3到1.1.1.1是ping不通的,但是1.1.1.3必须以1.1.1.1为网关,才能实现双方的互通。
标签: Juniper SSG 5, Lan 2 Lan VPN
配置Juniper SSG 5的NAT模式
1、bgroup属于trust zone,ip地址10.1.1.254/24,端口模式为nat(trust zone的端口默认即为nat模式),manageable,不设另外manage ip,service options作为模板支持web ui,telnet,ssh和ping。
2、eth0/0属于untrust zone,ip地址为220.220.1.1/24,端口模式为route,manageble,不设另外manage ip,service options作为模板支持web ui,telnet,ssh和ping。
3、在端口eth0/0中设置mip。
mapped ip: 220.220.1.100
host ip: 10.1.1.100
netmask: 255.255.255.255
vrouter: trust-vr
4、在端口eth0/0设置vip
先添加virtual ip address:220.220.1.80
分别new vip service:
virtual ip: 220.220.1.80
virtual port: 80
map to service: 80
map to ip: 10.1.1.10
server auto detection: checked
virtual ip: 220.220.1.80
virtual port: 8080
map to service: 80
map to ip: 10.1.1.20
server auto detection: checked
virtual ip: 220.220.1.80
virtual port: 8800
map to service: 80
map to ip: 10.1.1.30
server auto detection: checked
可以看出mip和vip的区别,mip是一对一的ip映射,vip可以进行端口映射,ip地址的映射可以是一对多。
5、添加costom services
set service "TCP-8080" protocol tcp src-port 0-65535 dst-port 8080-8080
set service "TCP-8800" protocol tcp src-port 0-65535 dst-port 8800-8800
6、添加policy
set policy from trust to untrust any any any permit
set policy from untrust to trust "any" "MIP(220.220.1.100)" "POP3" permit log
set policy from untrust to trust "any" "VIP(220.220.1.80)" "HTTP" permit log
set policy from untrust to trust "any" "VIP(220.220.1.80)" "TCP-8080" permit log
set policy from untrust to trust "any" "VIP(220.220.1.80)" "TCP-8800" permit log
OK!
标签: Juniper SSG 5, NAT
2010年8月11日星期三
配置Juniper Netscreen-5GT为透明模式
2、先配置vlan1,用于管理。
ip address/netmask:1.1.1.210/24,勾选manageable
broadcast模式:arp,勾选trace route
Service Options:
勾选web ui、telnet、ssh、ping、vlan trunk
3、将trust端口加入v1-trust,ip地址为0.0.0.0/0,manage ip为空。
此时不能通过原来192.168.1.1管理设备,将管理主机ip配置为1.1.1.10,可以通过1.1.1.210即vlan1的ip地址管理设备。
4、将untrust端口加入v1-untrust,ip地址为0.0.0.0/0,manage ip为空。
此时通过命令get sys可查看设备工作模式,我们会看到
Box in trust-untrust mode
System in transparent mode.
确定设备工作在透明模式下。
5、将另外一台主机插入untrust口,配置ip为1.1.1.11。此时从1.1.1.10ping1.1.1.11是ping不通的,还需要规则的支持。
6、将默认policy删除,添加一条v1-trust到v1-untrust的规则。
src address: any
dest address: any
service: any
action: permit
从1.1.1.10到1.1.1.11可以ping通。
如果需要从1.1.1.11访问1.1.1.10,则反向添加v1-untrust到v1-trust的规则。
7、如果需要从v1-untrust管理设备,在zone里选择v1-untrust,在service options中选择相应管理选项,即可。
在此种端口模式下,trust和untrust都被指定为物理端口的名称,其中trust物理端口对应面板1、2、3、4口。
标签: Juniper Netscreen-5GT, Transparent mode
Juniper Netscreen-5GT端口模式
dual untrust模式:
混合模式:
在混合模式中:
ethernet1:面板1端口
ethernet2: 面板2、3端口
ethernet3:面板4端口
ethernet4: 面板untrust端口
标签: Netscreen-5GT, Port Mode
订阅 博文 [Atom]