日本免费全黄少妇一区二区三区-高清无码一区二区三区四区-欧美中文字幕日韩在线观看-国产福利诱惑在线网站-国产中文字幕一区在线-亚洲欧美精品日韩一区-久久国产精品国产精品国产-国产精久久久久久一区二区三区-欧美亚洲国产精品久久久久

VMware實(shí)現(xiàn)一臺(tái)電腦中的網(wǎng)絡(luò)( 四 )


You can get a public key"s fingerprint by running
% ssh-keygen -F publickey.pub
on the keyfile.
Are you sure you want to continue connecting (yes/no)?

5) ipv6-in-ipv4 tunnel測(cè)試

由于ipv4在網(wǎng)絡(luò)中已經(jīng)實(shí)現(xiàn)了多年,而且Internet的發(fā)展更加促使ipv4的發(fā)展,目前ipv6在網(wǎng)絡(luò)中的實(shí)際情況是ipv6象一個(gè)孤島被ipv4的海洋包圍,各個(gè)ipv6網(wǎng)絡(luò)的連接還需要通過ipv4網(wǎng)絡(luò),實(shí)際中比較常見的有ipv6-in-ipv4隧道等 。這里利用本虛擬環(huán)境進(jìn)行點(diǎn)對(duì)點(diǎn)的IPv6-in-IPv4 tunnel的實(shí)驗(yàn)(R1-R2) 。

在R1機(jī)器上面:

ip -6 addr add 3ffe:3200::1/24 dev eth0#給eth0設(shè)定一個(gè)本地ipv6地址,以CERNET的測(cè)試ipv6地址為例
ip tunnel add 6to4 mode sit remote 192.168.8.12 local 192.168.8.11 #加入一個(gè)6to4通道
ip link set dev 6to4 up#激活6to4通道
ip -6 addr add 3ffe:3200::1/24 dev 6to4#給通道加入本地ipv6地址
ip -6 r add 3ffe:3200::2/24 dev 6to4#加入使用通道設(shè)備的ipv6路由,由于使用的點(diǎn)對(duì)點(diǎn)的測(cè)試,目的網(wǎng)絡(luò)是對(duì)端的ipv6地址

在R2機(jī)器上面:

ip -6 addr add 3ffe:3200::2/24 dev eth0
ip tunnel add 6to4 mode sit remote 192.168.8.11 local 192.168.8.12
ip link set dev 6to4 up
ip -6 addr add 3ffe:3200::2/24 dev 6to4
ip -6 r add 3ffe:3200::1/24 dev 6to4

也可以加入R3,R4,R5的ipv6 tunnel,以供更加復(fù)雜的測(cè)試 。


在R1和R2設(shè)備上面,使用ping6命令查看對(duì)端的ipv6地址可以到達(dá);

在R1和R2設(shè)備上面,使用ssh -6 ipv6地址通過ipv6 tunnel登錄點(diǎn)對(duì)點(diǎn)連接的其他ipv6設(shè)備;

R1:~# ssh -6 3ffe:3200::2
Host key not found from database.
Key fingerprint:
xobit-pihuz-gypek-lokad-leliz-hupim-pavek-pyvem-canam-nefaf-laxax
You can get a public key"s fingerprint by running
% ssh-keygen -F publickey.pub
on the keyfile.
Are you sure you want to continue connecting (yes/no)? yes
Host key saved to /root/.ssh2/hostkeys/key_22_3ffe:3200::1.pub
host key for 3ffe:3200::1, accepted by root Wed Mar 31 2004 19:12:510800
root"s password:
Authentication successful.
R2:~# w
08:16:21 up3:02,3 users,load average: 0.00, 0.01, 0.00
USERTTYFROMLOGIN@IDLEJCPUPCPUWHAT
rootpts/73ffe:3200::1108:160.00s0.13s0.04sw
R2:~#

Ok,我們已經(jīng)通過ipv6-in-ipv4的tunnel看到我們使用ipv6地址登錄到另外的設(shè)備上面了!

此過程在R2上面的tcpdump結(jié)果:

08:23:35.833428 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: S 2462930696:2462930696(0) win 5760
08:23:35.835364 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: S 1730732585:1730732585(0) ack 2462930697 win 5632 (encap)
08:23:35.860756 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: . ack 1 win 5760
08:23:35.919035 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: P 1:50(49) ack 1 win 5632 (encap)
08:23:35.925164 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: . ack 50 win 5760
08:23:35.925193 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: P 1:50(49) ack 50 win 5760
08:23:35.926647 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: . ack 50 win 5632 (encap)
08:23:35.936087 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: P 50:538(488) ack 50 win 5632 (encap)
08:23:35.954300 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: P 50:546(496) ack 538 win 6432
08:23:35.994265 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: . ack 546 win 6432 (encap)
08:23:35.995267 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: P 546:706(160) ack 538 win 6432
08:23:35.995479 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: . ack 706 win 6432 (encap)
08:23:36.117795 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: P 538:1578(1040) ack 706 win 6432 (encap)
08:23:36.127435 3ffe:3200::2.1047 > 3ffe:3200::1.ssh: . ack 1578 win 8320
08:23:36.127761 192.168.8.12 > 192.168.8.11: 3ffe:3200::1.ssh > 3ffe:3200::2.1047: P 1578:1610(32) ack 706 win 6432 (encap)

推薦閱讀