 Cilium v1.10 DocumentationUsing kube-router to run BGP Using BIRD to run BGP IPVLAN based Networking (beta) Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 DocumentationUsing kube-router to run BGP Using BIRD to run BGP IPVLAN based Networking (beta) Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationin AlibabaCloud ENI Mode (beta) Using kube-router to run BGP Using BIRD to run BGP Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationin AlibabaCloud ENI Mode (beta) Using kube-router to run BGP Using BIRD to run BGP Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.9 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata the network devices set up by aws-cni to enforce network policies, perform load-balancing, and encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such 7 Policy (see GitHub issue #12454 [https://github.com/cilium/cilium/issues/12454]) Transparent Encryption (stable/beta) (see Github issue #15596 [https://github.com/cilium/cilium/issues/15596]) Important0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata the network devices set up by aws-cni to enforce network policies, perform load-balancing, and encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such 7 Policy (see GitHub issue #12454 [https://github.com/cilium/cilium/issues/12454]) Transparent Encryption (stable/beta) (see Github issue #15596 [https://github.com/cilium/cilium/issues/15596]) Important0 码力 | 1263 页 | 18.62 MB | 1 年前3
 This Debian Reference (version 2.109) . . . . . 173 9.9 Data encryption tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 9.9.1 Removable disk encryption with dm-crypt/LUKS . . forensic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 9.25 List of data encryption utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . the following. • Login name • Encrypted password (The initial ”$1$” indicates use of the MD5 encryption. The ”*” indicates no login.) • Date of the last password change, expressed as the number of days0 码力 | 266 页 | 1.25 MB | 1 年前3 This Debian Reference (version 2.109) . . . . . 173 9.9 Data encryption tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 9.9.1 Removable disk encryption with dm-crypt/LUKS . . forensic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 9.25 List of data encryption utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . the following. • Login name • Encrypted password (The initial ”$1$” indicates use of the MD5 encryption. The ”*” indicates no login.) • Date of the last password change, expressed as the number of days0 码力 | 266 页 | 1.25 MB | 1 年前3
 ubuntu server guideservice-kerberos Kerberos server 3 service-kerberos-principals Service principals 3 kerberos-encryption-types Kerberos encryption types 3 service-kerberos-secondary-kdc Secondary KDC 3 service-kerberos-workstation-auth SSL/TLS Backup and restore Kerberos Introduction Kerberos server Service principals Kerberos encryption types Secondary KDC Basic workstation authentication Kerberos with OpenLDAP backend Network user Power9Box -U ubuntu server guideservice-kerberos Kerberos server 3 service-kerberos-principals Service principals 3 kerberos-encryption-types Kerberos encryption types 3 service-kerberos-secondary-kdc Secondary KDC 3 service-kerberos-workstation-auth SSL/TLS Backup and restore Kerberos Introduction Kerberos server Service principals Kerberos encryption types Secondary KDC Basic workstation authentication Kerberos with OpenLDAP backend Network user Power9Box -U- -P - sol info Set in progress : set-complete Enabled : true Force Encryption : false Force Authentication : false Privilege Level : OPERATOR Character Accumulate Level (ms) 0 码力 | 486 页 | 3.33 MB | 1 年前3
 Debian GNU/Linux 安裝手冊 January 8, 2024Logical Volume Management (LVM) • Software RAID Supported are RAID levels 0, 1, 4, 5, 6 and 10. • Encryption • Multipath (experimental) See our Wiki for information. Support for multipath is currently only write. The performance impact depends on your CPU speed, cho- sen cipher and a key length. To use encryption, you have to create a new partition by selecting some free space in the main partitioning menu need to select physical volume for encryption at the Use as: option. The menu will then change to include several cryptographic options for the partition. The encryption method supported by debian-installer0 码力 | 120 页 | 643.51 KB | 1 年前3 Debian GNU/Linux 安裝手冊 January 8, 2024Logical Volume Management (LVM) • Software RAID Supported are RAID levels 0, 1, 4, 5, 6 and 10. • Encryption • Multipath (experimental) See our Wiki for information. Support for multipath is currently only write. The performance impact depends on your CPU speed, cho- sen cipher and a key length. To use encryption, you have to create a new partition by selecting some free space in the main partitioning menu need to select physical volume for encryption at the Use as: option. The menu will then change to include several cryptographic options for the partition. The encryption method supported by debian-installer0 码力 | 120 页 | 643.51 KB | 1 年前3
 Cilium v1.6 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (beta) Host-Reachable Services (beta) Kubernetes NodePort (beta) Kubernetes without kube-proxy enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft provide L3/L4/L7 network visibility & policy enforcement and other advanced features like transparent encryption. AWS-CNI Azure CNI Calico Generic Veth Chaining Portmap (HostPort) Weave Net AWS-CNI This guide0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (beta) Host-Reachable Services (beta) Kubernetes NodePort (beta) Kubernetes without kube-proxy enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft provide L3/L4/L7 network visibility & policy enforcement and other advanced features like transparent encryption. AWS-CNI Azure CNI Calico Generic Veth Chaining Portmap (HostPort) Weave Net AWS-CNI This guide0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.8 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes without kube-proxy Kata Containers with Cilium enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft the network devices set up by aws-cni to enforce network policies, perform load-balancing, and encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes without kube-proxy Kata Containers with Cilium enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft the network devices set up by aws-cni to enforce network policies, perform load-balancing, and encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.7 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes without kube-proxy Kata Containers with Cilium enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft provide L3/L4/L7 network visibility & policy enforcement and other advanced features like transparent encryption. AWS-CNI Azure CNI Calico Generic Veth Chaining Portmap (HostPort) Weave Net AWS-CNI This guide0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 DocumentationCluster Mesh Cilium integration with Flannel (beta) IPVLAN based Networking (beta) Transparent Encryption (stable/beta) Host-Reachable Services Kubernetes without kube-proxy Kata Containers with Cilium enforcement, Kubernetes services implementation, as well as other advanced features like transparent encryption and clustermesh. Prerequisites Ensure that you have the Azure Cloud CLI [https://docs.microsoft provide L3/L4/L7 network visibility & policy enforcement and other advanced features like transparent encryption. AWS-CNI Azure CNI Calico Generic Veth Chaining Portmap (HostPort) Weave Net AWS-CNI This guide0 码力 | 885 页 | 12.41 MB | 1 年前3
 openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)optimization features have been added to resolve Java startup, garbage collection (GC), latency, encryption and decryption, and communication. Project Introduction Feature 1: AppCDS In the initial phase Engine (KAE) is an encryption and decryption module that supports the RSA, SM3, SM4, DH, MD5, and AES algorithms, and provides high-performance symmetric and asymmetric encryption/decryption algorithms in synchronous or asynchronous mode. BiSheng JDK adopts the Provider mechanism to support KAE encryption and decryption of Kunpeng servers, helping to improve the security and related services on Kunpeng0 码力 | 116 页 | 3.16 MB | 1 年前3 openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)optimization features have been added to resolve Java startup, garbage collection (GC), latency, encryption and decryption, and communication. Project Introduction Feature 1: AppCDS In the initial phase Engine (KAE) is an encryption and decryption module that supports the RSA, SM3, SM4, DH, MD5, and AES algorithms, and provides high-performance symmetric and asymmetric encryption/decryption algorithms in synchronous or asynchronous mode. BiSheng JDK adopts the Provider mechanism to support KAE encryption and decryption of Kunpeng servers, helping to improve the security and related services on Kunpeng0 码力 | 116 页 | 3.16 MB | 1 年前3
共 38 条
- 1
- 2
- 3
- 4














