请帮忙翻译
英语: Tiered networksMAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment.Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats that can also log file analysis.日语:ひとつの阶のネットの组织を分けます MACアドレスと论理のネットワークアドレス(例えばTCP/IPとIPX/SPX)の间のが主に区别するのが论理のネットワークアドレスが多いネットを段阶の构造によって组织するのです。ネットワークアドレスの论理の组织形式は企业のすでにある论理の组织形式と适応することができて、组织によって构造を管理することを得て各部门のLANを建设します。あるいは企业の地理(学)によって分布して行って、すべての支店机构はすべて1つのぽつんと立っているLANを持ちます。通常の情况の下で、この2种类の情况は混じって使うことができ(ありえ)ます。ルータは异なっているLANにつながることに用いて、たとえばのイーサネットとトークンリング・ネットワークなどのLANの标准的なトポロジーの制限を突破して1つの更に大规模のネットを作り上げます。Internetは1つの最も良い例で、彼の多くて分散したネットは构成して、集中统一の管理がなくて、しかし彼は论理を使ってひとつの阶の住所の空间を分けて组织を行います 。ルータはこれらの数千のネットにつながって、そして最优秀ルートの选択をして、1台のホストコンピュータの上の情报の手渡しを异なったネットの上の别の1台の1台のホストコンピュータに着いて、すべてのはこれらはすべて経常的な変更と経常的な更新のルートの情报に基づきます。ルートはソーティングして関连している情报によってどのようにデータを包んでInternetの上の不一致のネットを送り届けることを决定します。ルートは表してネット上のこれらのルータを追迹して、そして最终の目的のネットのパスのが数を跳びますまで(へ)含みます。ルータはデータが目的地のすべてのルートの情报まで(へ)包むことを知っている必要はありません。もし目的のネットはルータの上でつながったことその他に1つのLANだならば、それではルータも隣り合っている目的のネットを知っている必要はないことができます。このような情况の下で、ルータは“デフォルトゲートウエイ”を使ってデータの包みを発送します。Internetの上で、1つのデータは通常多数のルータを通り抜けて目的地に到着することを包んで、ルータの上のルートはただデータだけを保留して包んで目的地の“おりて跳びますと”の情报に到着することを表します。パスの上のすべてのルータはすべて目的地のに到着して下跳ぶこととを知っていて、あるいはルートが表す中にデフォルトゲートウエイを使います。ルータは限られてTCP/IP合意を使うだけではなくて、しかしInternetの上で、ほとんど所有するルータはすべてIPルートを使っています。たくさんの会社と企业级の的のルータはルートのその他の合意を配置することができて、例えばIPX/SPXとAppleTalk。しかし、SOHOルータ、たとえたとえばもあれらはケーブルを使ってDSLモデムの接続ネットワークの経络のルータとただTCP/IP合意だけを使いますとしても。安全性を提供しますルータの仕事の原理はネットワークプロトコルのデータの包みの中の头部の情报を検査するので、そしてルートの选択をします。とても明らかで、ルータの上でネットのために1つの“検査して点検します”を创立することができます。つまりルータの配置の规则を使って、そしてネットに基づいて包みの头部の情报を数えますネットの流量を许しますかます禁止することを决定します。例えば、ルータを使ってファイアウォールの第1本の防御线として、特定のポートの上のTCPあるいはUDP通信を起用しますかます闭锁することができて、禁止でネットを通じて(通って)特定のアプリケーションを访问します。例えば、ルータの上でTelnetの流量(ポートの23)がふさがって、ある人がTelnet登录のネットの中のコンピュータを使うことを阻止することができて、特定のネットワークアドレスがルータを通じて(通って)私有のネット(あるいはこれに反して)を访问することをも阻止することができて、これらはすべてファイアウォールの中で一部の机能です。ファイアウォールは简単なルートの机能を含むだけではなくて、また状态の検査・测定する技术を含んでと代行などの机能を使用します。规模の绝えず広げるInternetは初めの学术の环境は现在の状态まで(へ)発展して、すでに言う値打ちがあったいかなる安全性がなくて、この过程の中で、ルータは最初に“ファイアウォール”の设备を创建することに用いるのです。 ルータは通常日志にツールを提供して、日志のデータの判断のネットを使ってすでにしみ込むかどうかことができます。今の多数のハッカーの攻撃の手段はとても复雑ですけれども、しかもIPアドレスを伪造することができて、しかし新米はよくInternetの上からただダウンロードして无料のハッカーのツールを使うだけ、ルータの上の日志のファイルを検査しますを通じて(通って)Unix nuxホストコンピュータの上のsyslogまで(へ)过程を见守って、ルータ时にの安全を受ける胁しは、日志のファイルをも分析することができます。
Tiered networks MAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment. Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats, can also Analysis log file.
Lamination network organization The MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use.The router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves the gateway.The router is not only restricted in uses the TCP/IP agreement, but on Internet, nearly all routers is using the IP route. Many companies and the enterprise routers may dispose route other agreements, for example IPX/SPX and AppleTalk. But, SOHO router, also, even if such as these use electric cable and the DSL modem turning on network's router only uses the TCP/IP agreement.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the routing. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions.Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. The router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.
The lamination network organizes the MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use. the router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves thegateway.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the outlet by the choice. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions. Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. the router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.
