How to identify virtual interfaces on a device


Virtual interfaces (VPORT) can be used to connect to Open Virtual Switch (OVS) provided by the virtualization environment. The name of a virtual interface is in the GigabitEthernet0/0/x format. In the output information displayed after the display interface brief command is run if the x value in the name of an interface reaches the maximum value, the interface is a VPORT interface and has the following description: description VirtualPort.

Other related questions:
How are LDP Hello messages identified
The destination address of Hello messages in a local session is and the source address is the IP address of the LDP-enabled interface. The destination address of Hello messages in a remote session is the LSR ID of the peer end and the source address is the LSR ID of the local end. Hello packets are UDP packets and are sent through LDP-dedicated port 646. Hello messages are forwarded based on IP routing.

How to identify and prevent attacks
You can detect common attacks as follows: 1. Clear statistics on the packets sent to the CPU. 2. Wait for one minute and check the number of packets sent to the CPU and discarded protocol packets, such as ICMP, TTL, Expired, SSH, and FTP. If there are a lot of packets sent to the CPU or discarded, an attack, such as ICMP attack, TTL Expired attack, SSH attack, or FTP attack, may occur. 3. Find out the attack source through IP source trail or attack source tracing. After locating the attack source, run the cpu-defend policy command to configure the blacklist to prevent the packets from this source entering the control plane. Alternatively, you can configure the penalty action in auto-defend to discard attack packets. Additionally, the device can restrict the rate of ICMP packets from the source, or use traffic policy to discard SSH and FTP attack packets.

Whether the virtualization software supports USB device encryption
For some VM applications, you need to insert a USB encryption device into the server that can be identified by the VM. FusionCompute supports the configuration of USB devices for VMs but the prerequisite is that these USB devices exist on the hardware server. There are two modes for USB devices: 1. USB device simulation 2. USB device pass-through Special USB devices (like encryption devices) are directly mapped to a VM, identified by the OS and applications, and configured by commands at the underlying layer. USB encryption devices are responsible for identifying other USB devices. They require dedicated drivers to work on a VM. After a VM is migrated to another host, any connected USB devices cannot be used.

Methods used to log in to virtual desktops over mobile devices
You can log in to virtual desktops using mobile devices as follows: 1. Android devices: Search for the FusionAccess client in the Android application market, then download and install it. 2. iOS devices: Search for FusionAccess in the App Store, download the iOS FusionAccess client, and install it.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top