苹果手机的ipsec

首先查看苹果手机上的L2tp配置是需要ipsec的,所以需要配置服务器支持ipsec的l2tp

第一步:安装xl2tpd和strongswan软件

[root@myzdl ~]# yum install epel-release -y
[root@myzdl ~]# yum install strongswan xl2tpd -y

配置xl2tp的主配置文件

[root@myzdl ~]# vim /etc/xl2tpd/xl2tpd.conf [lns default]
ip range = 192.168.252.100-192.168.252.200
local ip = 192.168.252.254
name = LinuxVPNserver
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes

配置安全控制文件

[root@myzdl ~]# vim /etc/ppp/options.xl2tpd ipcp-accept-local
ipcp-accept-remote
ms-dns  114.114.114.114
noccp
auth
require-mschap-v2
idle 1800
mtu 1410
mru 1410
nodefaultroute
debug
proxyarp
connect-delay 5000

配置账号密码文件

[root@myzdl ~]# cat /etc/ppp/chap-secrets
# Secrets for authentication using CHAP
# client    server  secret          IP addressesuser1         *       a123456                 192.168.252.101user2         *       a123456                 192.168.252.102user3         *       a123456                 *

第二步:配置ipsec

配置ipsec主配置文件

config setupconn IPsec-L2tp-pskleft=172.16.0.4leftprotoport=17/1701right=%anyrightprotoport=17/%anytype=transportauthby=secretpfs=yeskeyingtries=3keylife=1hdpddelay=30dpdtimeout=120dpdaction=clearrekey=noikelifetime=8hauto=add

配置psk

[root@myzdl ~]# vim /etc/strongswan/ipsec.secrets# ipsec.secrets - strongSwan IPsec secrets file
172.16.0.4   %any  :  PSK "a123456"

启动服务

[root@myzdl ~]# systemctl start strongswan xl2tpd

用手机连接后成功的日志

Aug  3 23:46:05 myzdl charon: 07[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl charon: 07[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
Aug  3 23:46:05 myzdl charon: 07[IKE] received NAT-T (RFC 3947) vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received FRAGMENTATION vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] received DPD vendor ID
Aug  3 23:46:05 myzdl charon: 07[IKE] 112.97.212.98 is initiating a Main Mode IKE_SA
Aug  3 23:46:05 myzdl charon: 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Aug  3 23:46:05 myzdl charon: 07[ENC] generating ID_PROT response 0 [ SA V V V V ]
Aug  3 23:46:05 myzdl charon: 07[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl charon: 08[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl charon: 08[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 08[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl charon: 09[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl charon: 09[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 09[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl charon: 10[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl charon: 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Aug  3 23:46:05 myzdl charon: 10[IKE] local host is behind NAT, sending keep alives
Aug  3 23:46:05 myzdl charon: 10[IKE] remote host is behind NAT
Aug  3 23:46:05 myzdl charon: 10[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Aug  3 23:46:05 myzdl charon: 10[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl charon: 11[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl charon: 11[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 11[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl charon: 12[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl charon: 12[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 12[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl charon: 13[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (108 bytes)
Aug  3 23:46:05 myzdl strongswan: 00[DMN] Starting IKE charon daemon (strongSwan 5.7.2, Linux 3.10.0-1127.13.1.el7.x86_64, x86_64)
Aug  3 23:46:05 myzdl strongswan: 00[CFG] PKCS11 module '<name>' lacks library path
Aug  3 23:46:05 myzdl strongswan: 00[LIB] openssl FIPS mode(2) - enabled
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading ca certificates from '/etc/strongswan/ipsec.d/cacerts'
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading aa certificates from '/etc/strongswan/ipsec.d/aacerts'
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading ocsp signer certificates from '/etc/strongswan/ipsec.d/ocspcerts'
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading attribute certificates from '/etc/strongswan/ipsec.d/acerts'
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading crls from '/etc/strongswan/ipsec.d/crls'
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loading secrets from '/etc/strongswan/ipsec.secrets'
Aug  3 23:46:05 myzdl strongswan: 00[CFG]   loaded IKE secret for 172.16.0.4   %any
Aug  3 23:46:05 myzdl strongswan: 00[CFG] opening triplet file /etc/strongswan/ipsec.d/triplets.dat failed: No such file or directory
Aug  3 23:46:05 myzdl strongswan: 00[CFG] loaded 0 RADIUS server configurations
Aug  3 23:46:05 myzdl strongswan: 00[CFG] HA config misses local/remote address
Aug  3 23:46:05 myzdl strongswan: 00[CFG] no script for ext-auth script defined, disabled
Aug  3 23:46:05 myzdl strongswan: 00[LIB] loaded plugins: charon pkcs11 tpm aesni aes des rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm gcm curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp eap-aka-3gpp2 eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp led duplicheck unity counters
Aug  3 23:46:05 myzdl strongswan: 00[JOB] spawning 16 worker threads
Aug  3 23:46:05 myzdl strongswan: 05[CFG] received stroke: add connection 'IPsec-L2tp-psk'
Aug  3 23:46:05 myzdl strongswan: 05[CFG] added configuration 'IPsec-L2tp-psk'
Aug  3 23:46:05 myzdl strongswan: 07[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl strongswan: 07[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received NAT-T (RFC 3947) vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
Aug  3 23:46:05 myzdl charon: 13[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received FRAGMENTATION vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] received DPD vendor ID
Aug  3 23:46:05 myzdl strongswan: 07[IKE] 112.97.212.98 is initiating a Main Mode IKE_SA
Aug  3 23:46:05 myzdl strongswan: 07[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Aug  3 23:46:05 myzdl strongswan: 07[ENC] generating ID_PROT response 0 [ SA V V V V ]
Aug  3 23:46:05 myzdl strongswan: 07[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl strongswan: 08[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl strongswan: 08[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl strongswan: 08[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl strongswan: 09[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (788 bytes)
Aug  3 23:46:05 myzdl strongswan: 09[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl strongswan: 09[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (160 bytes)
Aug  3 23:46:05 myzdl strongswan: 10[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl strongswan: 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Aug  3 23:46:05 myzdl strongswan: 10[IKE] local host is behind NAT, sending keep alives
Aug  3 23:46:05 myzdl strongswan: 10[IKE] remote host is behind NAT
Aug  3 23:46:05 myzdl strongswan: 10[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
Aug  3 23:46:05 myzdl strongswan: 10[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl strongswan: 11[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl strongswan: 11[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl strongswan: 11[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl strongswan: 12[NET] received packet: from 112.97.212.98[55174] to 172.16.0.4[500] (380 bytes)
Aug  3 23:46:05 myzdl strongswan: 12[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl strongswan: 12[NET] sending packet: from 172.16.0.4[500] to 112.97.212.98[55174] (396 bytes)
Aug  3 23:46:05 myzdl strongswan: 13[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (108 bytes)
Aug  3 23:46:05 myzdl charon: 13[CFG] looking for pre-shared key peer configs matching 172.16.0.4...112.97.212.98[10.27.33.86]
Aug  3 23:46:05 myzdl charon: 13[CFG] selected peer config "IPsec-L2tp-psk"
Aug  3 23:46:05 myzdl charon: 13[IKE] IKE_SA IPsec-L2tp-psk[1] established between 172.16.0.4[172.16.0.4]...112.97.212.98[10.27.33.86]
Aug  3 23:46:05 myzdl charon: 13[ENC] generating ID_PROT response 0 [ ID HASH ]
Aug  3 23:46:05 myzdl charon: 13[NET] sending packet: from 172.16.0.4[4500] to 112.97.212.98[49225] (92 bytes)
Aug  3 23:46:05 myzdl charon: 13[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (108 bytes)
Aug  3 23:46:05 myzdl charon: 13[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 13[NET] sending packet: from 172.16.0.4[4500] to 112.97.212.98[49225] (92 bytes)
Aug  3 23:46:05 myzdl charon: 13[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (108 bytes)
Aug  3 23:46:05 myzdl charon: 13[IKE] received retransmit of request with ID 0, retransmitting response
Aug  3 23:46:05 myzdl charon: 13[NET] sending packet: from 172.16.0.4[4500] to 112.97.212.98[49225] (92 bytes)
Aug  3 23:46:05 myzdl charon: 05[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (332 bytes)
Aug  3 23:46:05 myzdl charon: 05[ENC] parsed QUICK_MODE request 381573843 [ HASH SA No ID ID NAT-OA NAT-OA ]
Aug  3 23:46:05 myzdl charon: 05[CFG] selected proposal: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
Aug  3 23:46:05 myzdl charon: 05[IKE] received 3600s lifetime, configured 0s
Aug  3 23:46:05 myzdl charon: 05[ENC] generating QUICK_MODE response 381573843 [ HASH SA No ID ID NAT-OA NAT-OA ]
Aug  3 23:46:05 myzdl charon: 05[NET] sending packet: from 172.16.0.4[4500] to 112.97.212.98[49225] (204 bytes)
Aug  3 23:46:05 myzdl charon: 06[NET] received packet: from 112.97.212.98[49225] to 172.16.0.4[4500] (76 bytes)
Aug  3 23:46:05 myzdl charon: 06[ENC] parsed QUICK_MODE request 381573843 [ HASH ]
Aug  3 23:46:05 myzdl charon: 06[IKE] CHILD_SA IPsec-L2tp-psk{1} established with SPIs c0bb394d_i 0d391cbc_o and TS 172.16.0.4/32[udp/l2tp] === 112.97.212.98/32[udp/53505]
Aug  3 23:46:05 myzdl xl2tpd: xl2tpd[12268]: Connection established to 112.97.212.98, 53505.  Local: 38639, Remote: 18 (ref=0/0).  LNS session is 'default'
Aug  3 23:46:05 myzdl xl2tpd: xl2tpd[12268]: Call established with 112.97.212.98, Local: 39793, Remote: 3015, Serial: 1
Aug  3 23:46:05 myzdl pppd[12311]: Plugin pppol2tp.so loaded.
Aug  3 23:46:05 myzdl pppd[12311]: pppd 2.4.5 started by root, uid 0
Aug  3 23:46:05 myzdl pppd[12311]: Using interface ppp0
Aug  3 23:46:05 myzdl pppd[12311]: Connect: ppp0 <-->
Aug  3 23:46:05 myzdl pppd[12311]: Overriding mtu 1500 to 1410
Aug  3 23:46:05 myzdl pppd[12311]: Overriding mru 1500 to mtu value 1410
Aug  3 23:46:05 myzdl NetworkManager[655]: <info>  [1596469565.8663] manager: (ppp0): new Ppp device (/org/freedesktop/NetworkManager/Devices/386)
Aug  3 23:46:08 myzdl pppd[12311]: Overriding mtu 1500 to 1410
Aug  3 23:46:09 myzdl pppd[12311]: Unsupported protocol 'IPv6 Control Protocol' (0x8057) received
Aug  3 23:46:09 myzdl pppd[12311]: Cannot determine ethernet address for proxy ARP
Aug  3 23:46:09 myzdl pppd[12311]: local  IP address 192.168.252.254
Aug  3 23:46:09 myzdl pppd[12311]: remote IP address 192.168.252.101
Aug  3 23:46:09 myzdl NetworkManager[655]: <info>  [1596469569.0362] device (ppp0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external')
Aug  3 23:46:09 myzdl NetworkManager[655]: <info>  [1596469569.0373] device (ppp0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'external')
Aug  3 23:46:09 myzdl charon: 09[KNL] 192.168.252.254 appeared on ppp0
Aug  3 23:46:09 myzdl charon: 11[KNL] 192.168.252.254 disappeared from ppp0
Aug  3 23:46:09 myzdl charon: 13[KNL] 192.168.252.254 appeared on ppp0
Aug  3 23:46:09 myzdl charon: 15[KNL] interface ppp0 activated

安卓苹果通用配置二:

config setupconn IPsec-L2tp-psk
#     aggressive=yesleft=172.16.88.12leftprotoport=17/1701rightid=%anyright=%anyrightprotoport=17/%anytype=transportauthby=psk
#     authby=secret
#     ikelifetime=3600sike=3des-md5-modp1024!ikelifetime=8hauto=add
# ipsec.secrets - strongSwan IPsec secrets file
172.16.88.12    %any  :  PSK "a123456"

苹果手机的ipsec相关推荐

  1. Linux下视频流媒体服务器搭建详解理论

    目标用于搭建内网流媒体服务器支持视频的点播. 背景 用于支持培训网站中视频点拨功能,在培训网站总体方案中需要加入流媒体服务器,用于存储和传输视频资源. 相关概念 流媒体 流媒体(Streaming M ...

  2. 强叔拍案惊奇 出差员工使用手机通过L2TP over IPSec接入总部

    强叔最近开始在"侃墙"系列连载VPN了,许多小伙伴们看后大呼不过瘾,希望强叔能加快更新速度.但强叔也不是三头六臂,也需要一笔一笔来写啊.为了满足小伙伴们对VPN的浓厚学习兴趣,强叔 ...

  3. DCN-2655 gre隧道 vpn 嵌入IPSec配置:

    DCN-2655 gre隧道 vpn 嵌入IPSec配置: RT1配置: Ip route 183.203.10.128 255.255.255.252 183.203.10.2 Interface ...

  4. catia今天突然打不开了_苹果手机锁屏密码突然不正确了?不要慌!也先不要着急刷机!!!尝试一下以下方式!...

    不少朋友反映IOS13更新后会出现一直以来输入的锁屏密码正确,然后突然有一天锁屏样式改变,原本的密码不能用了.然后多次重复输入最终锁机不得不去刷机的情况,可惜手机里的照片或者资料因为没有来得及保存备份 ...

  5. 【怒怼老乔】居然苹果手机IOS系统还不支持css3的transparent属性值,我去~~~~

    先上代码 background: linear-gradient(white, transparent); 这个代码在苹果手机里面的效果居然是这么"灰不溜秋" background ...

  6. 【怒怼老乔】苹果手机ios系统居然特喵的不支持日期yyyy-MM-dd HH:mm:ss.ms,只支持 yyyy/MM/dd HH:mm:ss

    苹果手机ios系统居然特喵的 不支持日期yyyy-MM-dd HH:mm:ss.ms, 只支持yyyy/MM/dd HH:mm:ss 我只能用 .replace(/\-/g,'\/'); 来替换掉了, ...

  7. iphone清理缓存小技巧_苹果手机清理垃圾小技巧!小内存也不发愁

    阅读本文前,请您先点击上面的"蓝色字体",再点击"关注",这样您就可以继续免费收到文章了.每天都会有分享,都是免费订阅,请您放心关注.注图文来源网络,侵删 时至 ...

  8. 两个苹果手机怎么传通讯录_苹果手机通讯录丢失怎么恢复?货真价实的通讯录恢复技巧...

    苹果手机如果只是误删了某个好友的联系方式,完全可以通过其他共同好友要到联系方式,重新添加回手机.如果没有共同好友,或者将手机通讯录所有联系人丢失或误删,该怎么办呢?今天小编就教大家几种找回误删通讯录联 ...

  9. IPsec ××× 配置實例

    試驗top: ipsec ***的配置包括一下幾個步驟: 1.配置ike的協商 2.配置ipsec的協商 3.配置端口的應用 4ike的調試和排錯 按照步驟 建立ike 的協商策略和參數 R1< ...

最新文章

  1. tomcat监控-psi-probe使用
  2. Linux服务器网络故障诊断
  3. UA MATH571B 试验设计 总结 判断试验类型的例题
  4. 扩展方法必须在非泛型静态类中定义
  5. android开源2016_出版商的选择:2016年顶级开源书籍
  6. DataGrid多层表头设计
  7. 在Window10下基于Anaconda安装Tensorflow以及Keras并基于Spyder进行验证
  8. 微信公众平台回复音乐
  9. Linux系统(七)组管理和用户管理
  10. 使用子查询可提升 COUNT DISTINCT 速度 50 倍
  11. 刷题记录 kuangbin带你飞专题四:最短路练习
  12. 莱斯康混响插件合集 – Lexicon PCM LXP MPX Native Reverb WiN
  13. 如何绘制一幅优雅的列线图
  14. 首都师范 博弈论 5 4 2 Shapley值应用案例
  15. dell服务器u盘启动找不到硬盘,dell台式机u盘装系统启动找不到硬盘怎么办?dell找不到硬盘原因...
  16. JavaSE(十一)加密与安全
  17. 劳埃镜 matlab,光学习题及答案
  18. Android过渡框架之共享元素过渡
  19. html未响应是什么原因,ie浏览器未响应如何解决
  20. 用Matlab的FDAtool生成IIR滤波器参数

热门文章

  1. Lipschitz函数相关
  2. java qq验证_JAVA正则表达式校验qq号码的方法
  3. ictclas包 java_Java通过JNI调用ICTCLAS中文分词包的方法
  4. JAVA-关于计算器的简单图形界面设计例子(不实现功能)
  5. matplotlib画圆
  6. superset集成echarts--添加Line折线图
  7. python——脚本实现检测目标ip是否存在ftp笑脸漏洞(ftp后门漏洞)
  8. win7下iTools Android模拟器安装与配置
  9. 强制显示U盘隐藏文件
  10. 怎样写好Flutter代码