免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 4008 | 回复: 6

请教! 通过4G拨号后在拨VPN, 分配的本地IP异常 [复制链接]

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-01-30 06:20:00
发表于 2016-01-27 11:37 |显示全部楼层
设备是linux系统, 如果通过有线连接(公司网络+ADSL)公网, VPN拨号就能正常访问,这时的VPN IP为:
    ppp0   inet addr:10.10.XXX.XXX  P-t-P:10.10.0.1

如果是使用4G拨号上的公网, 在进行VPN拨号, 这是VPN分配的IP就是奇怪的221.179.XXX.XXX 网段的. 这时就不能正常访问VPN后的服务器
    ppp0   inet addr:10.243.1.76  P-t-P:10.64.64.64        //4G 拨号分配
    ppp1   inet addr:221.179.XXX.XXX  P-t-P:10.10.0.1      //VPN 拨号分配
       
还请高手们给分析指点下.

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-01-30 06:20:00
发表于 2016-01-27 11:40 |显示全部楼层
拨号日志,
这个为啥不能直接发这里呢,

messages.ip.zip

2.31 KB, 下载次数: 1

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-01-30 06:20:00
发表于 2016-01-27 11:44 |显示全部楼层
在发一下:
Feb 23 13:56:54  daemon.info pppd[890]: pppd options in effect:
Feb 23 13:56:54  daemon.info pppd[890]: debug                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: nodetach                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: connect-delay 5000                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: dump                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: /dev/ttyUSB2                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: 115200                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: connect /sbin/chat -s -v -f ./wcdma-connect-chat                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: -am                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: mru 1280                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: novj                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: novjccomp                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: ipcp-accept-local                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: ipcp-accept-remote                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: noipdefault                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: ipcp-max-configure 60                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: ipcp-max-failure 60                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: defaultroute                # (from command line)
Feb 23 13:56:54  daemon.info pppd[890]: usepeerdns                # (from command line)
Feb 23 13:56:54  daemon.notice pppd[890]: pppd 2.4.4 started by root, uid 0
Feb 23 13:56:55  local2.info chat[892]: timeout set to 15 seconds
Feb 23 13:56:55  local2.info chat[892]: abort on (\nBUSY\r)
Feb 23 13:56:55  local2.info chat[892]: abort on (\nNO ANSWER\r)
Feb 23 13:56:55  local2.info chat[892]: abort on (\nNO DIALTONE\r)
Feb 23 13:56:55  local2.info chat[892]: abort on (\nERROR\r)
Feb 23 13:56:55  local2.info chat[892]: send (AT^M)
Feb 23 13:56:55  local2.info chat[892]: expect (OK)
Feb 23 13:56:55  local2.info chat[892]: AT^M^M
Feb 23 13:56:55  local2.info chat[892]: OK
Feb 23 13:56:55  local2.info chat[892]:  -- got it
Feb 23 13:56:55  local2.info chat[892]: send (ATH0^M)
Feb 23 13:56:55  local2.info chat[892]: timeout set to 120 seconds
Feb 23 13:56:55  local2.info chat[892]: send (AT^M)
Feb 23 13:56:55  local2.info chat[892]: expect (OK)
Feb 23 13:56:55  local2.info chat[892]: ^M
Feb 23 13:56:55  local2.info chat[892]: ATH0^M^M
Feb 23 13:56:55  local2.info chat[892]: OK
Feb 23 13:56:55  local2.info chat[892]:  -- got it
Feb 23 13:56:55  local2.info chat[892]: send (ATZ^M)
Feb 23 13:56:55  local2.info chat[892]: expect (OK)
Feb 23 13:56:55  local2.info chat[892]: ^M
Feb 23 13:56:55  local2.info chat[892]: AT^M^M
Feb 23 13:56:55  local2.info chat[892]: OK
Feb 23 13:56:55  local2.info chat[892]:  -- got it
Feb 23 13:56:55  local2.info chat[892]: send (ATE0V1^M)
Feb 23 13:56:55  local2.info chat[892]: expect (OK)
Feb 23 13:56:55  local2.info chat[892]: ^M
Feb 23 13:56:55  local2.info chat[892]: ATZ^M^M
Feb 23 13:56:55  local2.info chat[892]: OK
Feb 23 13:56:55  local2.info chat[892]:  -- got it
Feb 23 13:56:55  local2.info chat[892]: send (ATS0=0^M)
Feb 23 13:56:55  local2.info chat[892]: expect (OK)
Feb 23 13:56:55  local2.info chat[892]: ^M
Feb 23 13:56:55  local2.info chat[892]: ATE0V1^M^M
Feb 23 13:56:55  local2.info chat[892]: OK
Feb 23 13:56:55  local2.info chat[892]:  -- got it
Feb 23 13:56:55  local2.info chat[892]: send (AT+CGDCONT=1,"IP","cmnet",,0,0^M)
Feb 23 13:56:56  local2.info chat[892]: expect (OK)
Feb 23 13:56:56  local2.info chat[892]: ^M
Feb 23 13:56:56  local2.info chat[892]: ^M
Feb 23 13:56:56  local2.info chat[892]: OK
Feb 23 13:56:56  local2.info chat[892]:  -- got it
Feb 23 13:56:56  local2.info chat[892]: send (ATDT*98*1#^M)
Feb 23 13:56:56  local2.info chat[892]: expect (CONNECT)
Feb 23 13:56:56  local2.info chat[892]: ^M
Feb 23 13:56:56  local2.info chat[892]: ^M
Feb 23 13:56:56  local2.info chat[892]: OK^M
Feb 23 13:56:56  local2.info chat[892]: ^M
Feb 23 13:56:56  local2.info chat[892]: CONNECT
Feb 23 13:56:56  local2.info chat[892]:  -- got it
Feb 23 13:56:56  local2.info chat[892]: send (^M)
Feb 23 13:56:56  daemon.info pppd[890]: Serial connection established.
Feb 23 13:56:56  daemon.debug pppd[890]: using channel 1
Feb 23 13:56:56  daemon.info pppd[890]: Using interface ppp0
Feb 23 13:56:56  daemon.notice pppd[890]: Connect: ppp0 <--> /dev/ttyUSB2
Feb 23 13:57:01  daemon.debug pppd[890]: sent [LCP ConfReq id=0x1 <mru 1280> <magic 0x78028941> <pcomp> <accomp>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [LCP ConfReq id=0x0 <asyncmap 0x0> <auth chap MD5> <magic 0x3005f0c6> <pcomp> <accomp>]
Feb 23 13:57:01  daemon.debug pppd[890]: No auth is possible
Feb 23 13:57:01  daemon.debug pppd[890]: sent [LCP ConfRej id=0x0 <asyncmap 0x0> <auth chap MD5>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [LCP ConfAck id=0x1 <mru 1280> <magic 0x78028941> <pcomp> <accomp>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [LCP ConfReq id=0x1 <magic 0x3005f0c6> <pcomp> <accomp>]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [LCP ConfAck id=0x1 <magic 0x3005f0c6> <pcomp> <accomp>]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [LCP DiscReq id=0x2 magic=0x3005f0c6]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [LCP ProtRej id=0x3 80 fd 01 01 00 0f 1a 04 78 00 18 04 78 00 15 03 2f]
Feb 23 13:57:01  daemon.debug pppd[890]: Protocol-Reject for 'Compression Control Protocol' (0x80fd) received
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [IPCP ConfReq id=0x0]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [IPCP ConfNak id=0x0 <addr 0.0.0.0>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [IPCP ConfNak id=0x1 <addr 10.244.39.100> <ms-dns1 221.130.33.52> <ms-dns3 221.130.33.60>]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [IPCP ConfReq id=0x2 <addr 10.244.39.100> <ms-dns1 221.130.33.52> <ms-dns3 221.130.33.60>]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [IPCP ConfReq id=0x1]
Feb 23 13:57:01  daemon.debug pppd[890]: sent [IPCP ConfAck id=0x1]
Feb 23 13:57:01  daemon.debug pppd[890]: rcvd [IPCP ConfAck id=0x2 <addr 10.244.39.100> <ms-dns1 221.130.33.52> <ms-dns3 221.130.33.60>]
Feb 23 13:57:01  daemon.warn pppd[890]: Could not determine remote IP address: defaulting to 10.64.64.64
Feb 23 13:57:01  daemon.notice pppd[890]: local  IP address 10.244.39.100
Feb 23 13:57:01  daemon.notice pppd[890]: remote IP address 10.64.64.64
Feb 23 13:57:01  daemon.notice pppd[890]: primary   DNS address 221.130.33.52
Feb 23 13:57:01  daemon.notice pppd[890]: secondary DNS address 221.130.33.60
Feb 23 13:57:37  daemon.crit xl2tpd[903]: setsockopt recvref[22]: Protocol not available
Feb 23 13:57:37  daemon.info xl2tpd[903]: This binary does not support kernel L2TP.
Feb 23 13:57:37  daemon.info xl2tpd[904]: xl2tpd version xl2tpd-1.3.0 started on  PID:904
Feb 23 13:57:37  daemon.info xl2tpd[904]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Feb 23 13:57:37  daemon.info xl2tpd[904]: Forked by Scott Balmos and David Stipp, (C) 2001
Feb 23 13:57:37  daemon.info xl2tpd[904]: Inherited by Jeff McAdams, (C) 2002
Feb 23 13:57:37  daemon.info xl2tpd[904]: Forked again by Xelerance (xxxx) (C) 2006
Feb 23 13:57:37  daemon.info xl2tpd[904]: Listening on IP address 0.0.0.0, port 1701
Feb 23 13:58:07  daemon.debug xl2tpd[904]: get_call: allocating new tunnel for host 101.XXX.XXX.XXX, port 1701.
Feb 23 13:58:07  daemon.notice xl2tpd[904]: Connecting to host 101.XXX.XXX.XXX, port 1701
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is (null)(0).  Tunnel is 0, call is 0.
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: sending SCCRQ
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 73, tunnel = 39841, call = 0 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is Start-Control-Connection-Reply(2).  Tunnel is 32980, call is 0.
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: sending SCCCN
Feb 23 13:58:07  daemon.notice xl2tpd[904]: Connection established to 101.XXX.XXX.XXX, 1701.  Local: 39841, Remote: 32980 (ref=0/0).
Feb 23 13:58:07  daemon.notice xl2tpd[904]: Calling on tunnel 39841
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is (null)(0).  Tunnel is 32980, call is 0.
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: sending ICRQ
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 28, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is Incoming-Call-Reply(11).  Tunnel is 32980, call is 29204.
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: Sending ICCN
Feb 23 13:58:07  daemon.notice xl2tpd[904]: Call established with 101.XXX.XXX.XXX, Local: 17331, Remote: 29204, Serial: 1 (ref=0/0)
Feb 23 13:58:07  daemon.debug xl2tpd[904]: start_pppd: I'm running:
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "/usr/sbin/pppd"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "passive"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "nodetach"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: ":"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "file"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "/program/test/vpn/cfg/fsu.options.xl2tpd"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "ipparam"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "101.XXX.XXX.XXX"
Feb 23 13:58:07  daemon.debug xl2tpd[904]: "/dev/pts/2"
Feb 23 13:58:07  daemon.info pppd[907]: Plugin passprompt.so loaded.
Feb 23 13:58:07  daemon.notice pppd[907]: pppd 2.4.4 started by root, uid 0
Feb 23 13:58:07  daemon.debug pppd[907]: using channel 2
Feb 23 13:58:07  daemon.info pppd[907]: Using interface ppp1
Feb 23 13:58:07  daemon.notice pppd[907]: Connect: ppp1 <--> /dev/pts/2
Feb 23 13:58:07  daemon.debug pppd[907]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xe18039ec> <pcomp> <accomp>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 33, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 36, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is Set-Link-Info(16).  Tunnel is 32980, call is 29204.
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [LCP ConfReq id=0x0 <asyncmap 0xa0000> <auth chap MD5> <magic 0xf3cd95e6>]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [LCP ConfAck id=0x0 <asyncmap 0xa0000> <auth chap MD5> <magic 0xf3cd95e6>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 32, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <magic 0xe18039ec> <pcomp> <accomp>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 35, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 36, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug xl2tpd[904]: control_finish: message type is Set-Link-Info(16).  Tunnel is 32980, call is 29204.
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [CHAP Challenge id=0x1 <f41884c267bfff4405bb99f6fa5d38f7>, name = "****"]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [CHAP Response id=0x1 <4f87d4d9305a5283a195970a43894ffe>, name = "******"]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 41, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [CHAP Success id=0x1 "Welcome to use this device."]
Feb 23 13:58:07  daemon.info pppd[907]: CHAP authentication succeeded: Welcome to use this device.
Feb 23 13:58:07  daemon.notice pppd[907]: CHAP authentication succeeded
Feb 23 13:58:07  daemon.debug pppd[907]: sent [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [IPCP ConfReq id=0x1 <addr 221.179.XXX.XXX>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 20, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [IPCP ConfReq id=0x0 <addr 10.10.0.1>]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [IPCP ConfAck id=0x0 <addr 10.10.0.1>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 18, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [LCP ProtRej id=0x1 80 fd]
Feb 23 13:58:07  daemon.debug pppd[907]: Protocol-Reject for 'Compression Control Protocol' (0x80fd) received
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 20, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [IPCP ConfRej id=0x1 <addr 221.179.XXX.XXX>]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [IPCP ConfReq id=0x2 <addrs 221.179.XXX.XXX 0.0.0.0>]
Feb 23 13:58:07  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 24, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:07  daemon.debug pppd[907]: rcvd [IPCP ConfNak id=0x2 <addrs 221.179.XXX.XXX 10.10.0.1>]
Feb 23 13:58:07  daemon.debug pppd[907]: sent [IPCP ConfReq id=0x3 <addrs 221.179.XXX.XXX 10.10.0.1>]
Feb 23 13:58:08  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 24, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:08  daemon.debug pppd[907]: rcvd [IPCP ConfAck id=0x3 <addrs 221.179.XXX.XXX 10.10.0.1>]
Feb 23 13:58:08  daemon.notice pppd[907]: local  IP address 221.179.XXX.XXX
Feb 23 13:58:08  daemon.notice pppd[907]: remote IP address 10.10.0.1
Feb 23 13:58:08  daemon.debug xl2tpd[904]: network_thread: select timeout
Feb 23 13:58:08  daemon.debug xl2tpd[904]: network_thread: select timeout
Feb 23 13:58:08  daemon.debug xl2tpd[904]: network_thread: select timeout
Feb 23 13:58:08  daemon.debug xl2tpd[904]: network_thread: select timeout
Feb 23 13:58:17  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 20, tunnel = 39841, call = 17331 ref=0 refhim=0
Feb 23 13:58:27  daemon.debug xl2tpd[904]: network_thread: recv packet from 101.XXX.XXX.XXX, size = 20, tunnel = 39841, call = 17331 ref=0 refhim=0

论坛徽章:
12
数据库技术版块每日发帖之星
日期:2015-07-08 22:20:00IT运维版块每日发帖之星
日期:2016-05-01 06:20:00IT运维版块每周发帖之星
日期:2016-03-07 16:27:44IT运维版块每月发帖之星
日期:2016-03-07 16:25:25IT运维版块每日发帖之星
日期:2016-02-21 06:20:00IT运维版块每日发帖之星
日期:2016-02-20 06:20:00数据库技术版块每日发帖之星
日期:2016-02-06 06:20:00IT运维版块每日发帖之星
日期:2016-01-30 06:20:00IT运维版块每日发帖之星
日期:2016-01-03 06:20:00IT运维版块每日发帖之星
日期:2015-11-29 06:20:00IT运维版块每日发帖之星
日期:2015-08-10 06:20:00数据库技术版块每日发帖之星
日期:2016-06-16 06:20:00
发表于 2016-01-27 13:05 |显示全部楼层
电信运营商的策略问题 这个只能在vpn服务器上信任该设备或者ip!

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-01-30 06:20:00
发表于 2016-01-27 13:31 |显示全部楼层
回复 4# rtm009

谢谢, 可是VPN服务器不是我们的,没办法改配置, 还有其它办法吗

   

论坛徽章:
12
数据库技术版块每日发帖之星
日期:2015-07-08 22:20:00IT运维版块每日发帖之星
日期:2016-05-01 06:20:00IT运维版块每周发帖之星
日期:2016-03-07 16:27:44IT运维版块每月发帖之星
日期:2016-03-07 16:25:25IT运维版块每日发帖之星
日期:2016-02-21 06:20:00IT运维版块每日发帖之星
日期:2016-02-20 06:20:00数据库技术版块每日发帖之星
日期:2016-02-06 06:20:00IT运维版块每日发帖之星
日期:2016-01-30 06:20:00IT运维版块每日发帖之星
日期:2016-01-03 06:20:00IT运维版块每日发帖之星
日期:2015-11-29 06:20:00IT运维版块每日发帖之星
日期:2015-08-10 06:20:00数据库技术版块每日发帖之星
日期:2016-06-16 06:20:00
发表于 2016-01-27 13:55 |显示全部楼层
回复 5# GalaxyKnight


    这个不是技术问题 或者说靠技术解决代价很高 没辙!把情况上报给有关领导吧!不是你靠个人能解决的!

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-01-30 06:20:00
发表于 2016-01-27 14:20 |显示全部楼层
回复 6# rtm009


    好的, 谢谢
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

SACC2019中国系统架构师大会

【数字转型 架构演进】SACC2019中国系统架构师大会,8.5折限时优惠重磅来袭!
2019年10月31日~11月2日第11届中国系统架构师大会(SACC2019)将在北京隆重召开。四大主线并行的演讲模式,1个主会场、20个技术专场、超千人参与的会议规模,100+来自互联网、金融、制造业、电商等领域的嘉宾阵容,将为广大参会者提供一场最具价值的技术交流盛会。

限时8.5折扣期:2019年9月30日前


----------------------------------------

大会官网>>
  

北京盛拓优讯信息技术有限公司. 版权所有 16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122
中国互联网协会会员  联系我们:huangweiwei@it168.com
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP