天亮了说晚安's Blog

欢迎您的光临! http://www.tllswa.com

本文转自:https://zhidao.baidu.com/question/502345734731802684.html 苹果笔记本电脑键盘的使用方法: 1.Mac键盘的大部分按键与Windows 键盘功能是一致的,比如字母、数字、空格、箭头,caps lock锁定大写,return回车,delete删除,tab切换等等。 2.Windows 键盘一般是fn+F1-12来调节声音、亮度等。而Mac键盘直接按F1-12来调节声音、亮度等。 3.Mac键盘有两个特别的快捷按键:点击F3就可以平铺展开各活动的窗口,点击F4显示所有应用。 4.Mac键盘的command键相当于Windows 键盘的ctrl键,所以,Mac键盘下command+c可以进行复制,command+v可以进行粘贴,command+f可以进行搜索,command+左箭头可以回到行头,command+S可以保存当前工作内容等等。 5.Mac键盘的control键通常用于应用的切换,比如control+空格切换输入法,control+箭头切换窗口,control+tab切换标签,control+command+空格调出表情与符号等等。 6.打印屏幕可以使用快捷键Shift+Command+3 拍摄整个屏幕的图片;Shift+Command+4 拍摄选择区域内屏幕的图片。 苹果笔记本的快捷键使用大全: 1.cmd+C:拷贝,cmd+V:粘贴,Command-D:复制所选项,cmd+Ba......Read More

本文转自: http://blog.emulatedlab.com/archives/1 为何选择 EVE-NG开篇? 笔者选择 EVE-NG 开篇,是因为 EVE-NG 太好用却不被人熟知,有必要在国内宣传一下。当然,今后的内容不会只以它做内容,范围太小。它,只是一个全能工具。 相信大家在平时学习和工作中,总避免不了实验测试,离不开实验环境,这就给大家推荐一款最好用的模拟器,强烈推荐~~~ 在众多模拟器中,唯独 EVE-NG 更适合大众用户使用: EVE-NG:亦是 Unetlab 最新版,功能强大,完全免费 VIRL:cisco 开发的,只有 cisco 授权的用户才可以使用,收费 GNS3:过去最好的模拟器,免费 Packet Tracert:cisco 开发的模拟器软件,功能简单,只适合入门,目前也有 Android 运行的版本。 IOU 与 Dynamips 早已过时,现在模拟器的趋势是融合这两个模拟器。 Other Emulators,就不再一一列举了。 相信看完这篇文章,您一定会觉得 EVE-NG 就是您的选择。 EVE-NG介绍 EVE-NG(全称 Emulated Virtual Environment- Next Generation),继 Unetlab 1.0 后的 Unetlab 的 2.0 新版本,改了名字,原名是 Unified Networking Lab 统一网络实验室。笔者觉得名字改的非常合理,这款......Read More

本文转自:https://www.petenetlive.com/KB/Article/0000039 Problem You want to set up a Cisco ASA to authenticate users (VPN access for example). Solution Kerberos can only be used as an authentication protocol on the ASA, so its fine for allowing VPN connections but not for assigning policies etc. To work both the ASA and the domain need to be showing accurate time. Step 1: Set the ASA to get time from an External NTP Server 1. Log onto the ASA > Go to “Enable Mode” > Issue the following command; User Access Verification Password: Type help or '?' for a list of available commands. Petes-ASA> enable Password: ******** Petes-ASA# configure terminal Petes-ASA(config)# ntp server source outside Note that’s a public time server in the UK (Manchester University) that I use. you may want to use another. 2. To check the ASA has synchronised issue the a ‘show ntp status‘ command, If you s......Read More

本文转自:https://www.petenetlive.com/KB/Article/0001104 Problem I got sent to Holland this week to look at a firewall deployment, and while I was sat in the Airport, I was going over the job I had to do, when I realised the solution I had suggested had a problem see below; My brief was to provide remote AnyConnect VPN into the network so the client could get their network setup, and manage things remotely. However as I drew the network out in my head I realised that the situation above was what was going to happen. How was I going to fix that? Well firstly I thought ‘Just put on the management firewall, and move .2 and .3 to the main firewalls’. Well thats fine, but it does not leave me room for expansion, or if the client needs to add remote access to a production network. (Which will be needed in the future). Then I thought ‘Can I put a static route on the main firewalls to route to the management firewall’. Which is a......Read More

本文转自:https://www.petenetlive.com/KB/Article/0000069 Problem Below is a walk through for setting up a client to gateway VPN Tunnel using a Cisco ASA appliance.This was done via the ASDM console. The video was shot with ASA version 8.4(2) and ASDM 6.4(5) and the setup process is a lot less painful than it used to be. The original article was written with ASA version 8.0(4) and ASDM 6.1(3), which was a little more difficult so I will leave that procedure below just in case 🙂 ASDM cannot be used on the normal port on the outside interface when using SSL VPN SSL VPN AnyConnect from within an RDP session is not supported (and fails – even with a /console switch). SSL (HTTPS ot TCPport 443) needs to be free (i.e. NOT port forwarded to a web server / exchange server etc). Solution For Older Versions of the ASA/ASDM 1. Open up the&nbs......Read More

本文转自:https://www.petenetlive.com/KB/Article/0000628 Problem Note: With Anyconnect 4 Cisco now use Plus and Apex AnyConnect licensing. When Cisco released the 8.2 version of the ASA code, they changed their licensing model for AnyConnect Licenses. There are two licensing models, Premium and Essentials. Solution Cisco ASA AnyConnect Premium Licenses. You get two of these free with your firewall*, with a ‘Premium License’ you can use the AnyConnect client software for remote VPN Access, and you can access Clientless SSL facilities via the web portal. *As pointed out by @nhomsany “The two default premium licenses available are NOT cross-platform, (i.e. only Mac or Windows). Additionally you can use this license’ model with the Advanced Endpoint Assessment License’, this is the license’ you require for Cisco Secure Desktop. You can also use this license’......Read More

本文转自:https://www.petenetlive.com/KB/Article/0001272 Problem I was setting up a Cisco ASA this week and needed to enable the ability for users to reset their domain passwords when they are about to expire. To actually test that, I needed a test user that had their password either about to expire, or actually expired. As I dint want to wait 42 days, or setup a password policy just for one user, I needed to find a ‘quick and dirty’ fix for one user. Solution You need to open Active Directory Users and Computers, and you need to have ‘Advanced options’ enabled. Locate your user and open their properties > Attribute Editor > Attributes > pwdLastSet. If you want to set it to expired, then set its value to Zero. It should change to <never>, which is not strictly true, it actually changes to 12:00AM January 1st 1601. Note: If you set its value to -1 and apply the change it resets the attribute to the current day and time (you ma......Read More

本文转自:https://www.petenetlive.com/KB/Article/0001273 Problem If you have remote users who connect via VPN, and a policy that forces them to change their password periodically, this can result in them getting locked out without the ability to change their password (externally). If your Cisco ASA is using LDAP to authenticate your users, then you can use your remote AnyConnect VPN solution to let them reset their passwords remotely. Solution Standard LDAP runs over TCP port 389, to allow the ASA to reset the password for the users, it needs to be connected via LDAPS ((TCP Port 636). Your AD server needs to be able to authenticate via LDAPS, by default it will not. I’ve already covered how to set that up in another post see the following article. Windows Server 2012 – Enable LDAPS So, assuming your AD server(s) that the Cisco ASA is authenticating against is already setup, you need to ensure that your AAA Settings for LDAP is set to use port 636. Ena......Read More

本文转自:https://www.petenetlive.com/KB/Article/0000049 Problem You would like to enable remote access for your clients using the Cisco VPN Client software. Solution Before you start – you need to ask yourself “Do I already have any IPSECVPN’s configured on this firewall?” Because if its not already been done, you need to enable ISAKMP on the outside interface. To accertain whether yours is on, or off, issue a “show run crypto isakmp” command and check the results, if you do NOT see “crypto isakmp enable outside” then you need to issue that command. PetesASA# show run crypto isakmp crypto isakmp enable outside << Mines already enabled. crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 PetesASA# 1. Firstly we need to set up Kerberos AAA, if you wanted to use the ASDM to do this CLICK HERE however, to do the same via command line see the commands belo......Read More

本文转自:https://www.petenetlive.com/KB/Article/0000688 Problem Last week I was configuring some 2008 R2 RADIUS authentication, for authenticating remote VPN clients to a Cisco ASA Firewall. I will say that Kerberos Authentication is a LOT easier to configure, so you might want to check that first. Solution Step 1 Configure the ASA for AAA RADIUS Authentication 1. Connect to your ASDM, > Configuration > Remote Access VPN. > AAALocal Users > AAA Server Groups. 2. In the Server group section > Add. 3. Give the group a name and accept the defaults > OK. 4. Now (with the group selected) > In the bottom (Server) section > Add. 5. Specify the IP address, and a shared secret that the ASA will use with the 2008 R2 Server performing RADIUS > OK. 6. Apply. Configure AAA RADIUS from command lin......Read More