UCS IPv6管理配置示例

资讯 2024-07-10 阅读:44 评论:0
簡介 必要條件 需求 採用元件 背景資訊...
美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

本文檔介紹如何使用IPv6地址配置思科統一計算系統(UCS)管理終端。

This file describes how to use IPv6 to configure Cisco's System of Accounting (UCS) to manage endpoints.

思科建議您瞭解以下主題:

Cisco suggests that you should be aware of the following themes:

  • Cisco UCS Manager(UCSM)
  • 思科整合式管理控制器(CIMC)
  • 熟悉IPv6

本文中的資訊係根據以下軟體和硬體版本:

The information in this paper is based on the following software and hard version:

  • Cisco UCS B系列
  • Cisco UCSM版本2.2(3a)
  • Cisco UCS M3系列刀鋒伺服器

本文中的資訊是根據特定實驗室環境內的裝置所建立。文中使用到的所有裝置皆從已清除(預設)的組態來啟動。如果您的網路正在作用,請確保您已瞭解任何指令可能造成的影響。

The information in this paper is based on a device in a given laboratory environment. All devices used in the text are activated by a cleared (predicted) configuration. If your network is working, make sure you are aware of the implications of any instructions.

UCS上的IPv6管理支援是在UCS版本2.2中引入的。6100和6200系列交換矩陣互聯(FI)的IPv6地址除了其IPv4地址之外,都可以用作管理埠。除此之外,M3伺服器的CIMC地址可以具有IPv6地址。當您選擇帶內訪問方法時,此選項可用。

The IPv6 management support on UCS was introduced in UCS version 2.2. The IPv6 address of the 6100 and 6200 array exchange matrix can be used as a port of administration, except for its IPv4. In addition, the CIMC address of the M3 server can have an IPv6. This option is available when you choose to carry an in-person interview method.

外部客戶端可以使用IPv6來訪問UCS服務,例如:

External clients can use IPv6 to visit UCS services such as:

  • HTTP/HTTPS
  • 安全殼層 (SSH)
  • Telnet
  • 簡易網路管理通訊協定(SNMP)
  • 思科互動管理員(CIM)
  • Web服務管理(WS-Management)
  • 快閃記憶體策略伺服器

使用UCS作為客戶端,可以使用IPv6來訪問各種型別的服務,例如:

Using UCS as a client, IPv6 can be used to interview various types of services, such as:

  • 網路服務 — 網域名稱系統(DNS)、SNMP和網路時間通訊協定(NTP)
  • 驗證服務 — 輕量型目錄存取通訊協定(LDAP)、TACACS和RADIUS
  • 檔案傳輸服務 — SSH、FTP、SSH檔案傳輸通訊協定(SFTP)和TFTP
  • 其他服務 — Syslog、Callhome、網路檔案系統(NFS)客戶端和vCenter代理

本節介紹如何使用IPv6地址配置Cisco UCSM終端

This section presents how to configure Cisco UCSM endpoints using IPv6 addresses

附註:使用命令查詢工具(僅供已註冊客戶使用)可獲取本節中使用的命令的更多資訊。

在初始設定期間,您可以使用IPv4或IPv6地址配置管理介面。如果配置了IPv6地址,則必須在初始設定後通過UCSM CLI或GUI手動新增管理介面的IPv4地址。

You can configure the management interface using IPv4 or IPv6. If you configure the IPv6 address, you must manually add an IPv4 address to the management interface via UCSM CLI or GUI after the initial configuration.

此示例說明了在初始設定期間為管理埠配置IPv6地址所完成的步驟:

This example illustrates the steps that have been accomplished during the initial set-up to configure the IPv6 address for the managing port:

  Enter the configuration method. (console/gui) ? console
  Enter the setup mode; setup newly or restore from backup. (setup/restore) ? setup
  You have chosen to setup a new Fabric interconnect. Continue? (y/n): y
  Enforce strong password? (y/n) [y]: n
  Enter the password for "admin":
  Confirm the password for "admin":
  Is this Fabric interconnect part of a cluster(select 'no' for standalone)?
(yes/no) [n]: n
  Fabric interconnect will be in stand alone mode
  Enter the system name:  ucs-ipv6
  Physical Switch Mgmt0 IP address : 2014::10:76:78:107
  Physical Switch Mgmt0 IPv6 prefix : 64
  IPv6 address of the default gateway : 2014::10:76:78:1

IPv6地址可以新增到僅具有IPv4地址的設定中,並且當前IPv6地址也可以更改。UCSM GUI和CLI均提供這些選項。

IPv6 addresses can be added to settings with only IPv4 addresses, and the current IPv6 addresses can be changed. Both UCSM GUI and CLI provide these options.

此示例顯示從UCSM GUI完成的步驟:

This example shows the steps completed from UCSM GUI:

此示例顯示從UCSM CLI完成的步驟:

This example shows the steps completed from UCSM CLI:

FI-A# scope fabric-interconnect a
FI-A /fabric-interconnect # scope ipv6-config
FI-A /fabric-interconnect/ipv6-config # set out-of-band ipv6 2014::10:76:78:107
FI-A /fabric-interconnect/ipv6-config* # set out-of-band ipv6-gw 2014::10:76:78:1
FI-A /fabric-interconnect/ipv6-config* # set out-of-band ipv6-prefix 64

FI-A* # scope fabric-interconnect b
FI-A /fabric-interconnect* # scope ipv6-config
FI-A /fabric-interconnect/ipv6-config* # set out-of-band ipv6 2014::10:76:78:108
FI-A /fabric-interconnect/ipv6-config* # set out-of-band ipv6-gw 2014::10:76:78:1
FI-A /fabric-interconnect/ipv6-config* # set out-of-band ipv6-prefix 64

FI-A* # scope system
FI-A /system* # set virtual-ip ipv6 2014::10:76:78:106

FI-A* # commit-buffer

附註:輸入commit-buffer命令後,配置才會生效。思科建議您在輸入此命令之前進行所有必要的更改。

您可以使用分配的IPv6地址訪問UCSM GUI和CLI:

You can visit UCSM GUI and CLI using the allocated IPv6 address:

附註:大多數瀏覽器要求將IPv6地址輸入方括弧,例如[2014::10:76:78:106]

本節介紹CIMC的帶內管理。

This section introduces the CIMC tape management.

在UCS版本2.2之前,CIMC訪問通過UCS FI的帶外管理埠。在UCS 2.2版之前,CIMC可以有兩個不同的IP地址:

The CIMC can have two different IP addresses before the UCS version 2.2:

  • 從Equipment(裝置)頁籤分配的IPv4地址 — 此地址會粘連到伺服器硬體本身,不會更改,無論服務配置檔案關聯如何。

  • 從Servers頁籤分配的IPv4地址 — 此地址將貼上到服務配置檔案並隨服務配置檔案移動。

UCS版本2.2還啟用了M3伺服器的CIMC帶內訪問。IPv4和IPv6地址均可用於帶內訪問,因此CIMC與UCS版本2.2最多可以有六個不同的地址:

UCS version 2.2 also activates an M3 server's CIMC tape interview. IPv4 and IPv6 addresses can be used for internal interviews, so CIMC and UCS version 2.2 can have up to six different addresses:

  帶外 帶內
裝置 IPv4 IPv4、IPv6
伺服器 IPv4 IPv4、IPv6

提示:有關帶內訪問和配置的詳細資訊,請參閱UCS-B系列刀片上的CIMC帶內訪問配置示例 Cisco文檔。

此示例說明通過UCSM GUI的Equipment頁籤為CIMC配置帶內IPv6地址所完成的步驟:

This is an example of the steps that have been accomplished through the UCSM GUI Equipment tab to configure the IPv6 address in the CIMC belt:

  1. 導覽至LAN > VLAN Groups,然後使用將用於帶內管理的VLAN清單建立VLAN組:



  2. 導覽至LAN > Global Policies > Inband Profile,然後選擇VLAN組以將其與Inband Profile關聯:



  3. 從Equipment頁籤導航到伺服器,按一下Inventory > CIMC > Change Inband Management IP,將組中的VLAN與CIMC相關聯,並分配IPv6地址:



  4. 從Network下拉選單中選擇VLAN,按一下Inband IPv6,然後分配IPv6地址。下一張圖顯示了靜態分配方法。

    附註:地址可以是靜態地址,也可以來自IPv6池,您可以在LAN > Pools > IP Pools下建立該池。


從Servers頁籤分配IPv6地址時,會使用相同的過程。下一個示例顯示了通過UCSM CLI從Equipment頁籤為CIMC配置帶內IPv6地址所完成的步驟:

The same process is used when assigning IPv6 addresses from the Servers tab. The next example shows the steps that have been accomplished via the UCSM CLI from the Equipment tab to configure IPv6 addresses from the CIMC tab:

附註:在本示例中,帶內VLAN是VL10,並且使用靜態方法分配IPv6地址。

FI-A# scope server 1/1
FI-A /chassis/server # scope cimc
FI-A /chassis/server/cimc # create mgmt-iface in-band
FI-A /chassis/server/cimc/mgmt-iface* # create mgmt-vlan
FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan* # set network-name VL10
FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan* # create ext-static-ip6
FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-static-ip6* # set addr
2014::10:76:78:141

FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-static-ip6* # set prefix 64
FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-static-ip6* # set default-gw
2014::10:76:78:1

FI-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-static-ip6* # commit-buffer

CIMC地址用於諸如鍵盤、影片和滑鼠(KVM)、vMedia、智慧平台管理介面(IPMI)和Serial over LAN(SoL)等服務。 這些服務可用於帶內和帶外地址。

The CIMC addresses are used for services such as keyboards, videos and mouse (KVM), vMedia, the Smart Platform Management Interface (IPMI) and Serial over Lan (SoL).

啟動KVM控制檯時,按一下KVM控制檯選項旁邊的>>符號以檢視可用於訪問KVM控制檯的各個地址:

When starting the KVM control table, press >> sign next to the KVM control option to view the addresses available for access to the KVM control table:

KVM啟動程式提供相同的選項:

The KVM startup program offers the same options:

分配給服務配置檔案的地址優先於通過「裝置」頁籤分配給伺服器硬體的地址。

The address assigned to the service configuration file has priority over the address assigned to the server hardware through the device page tag.

IPv6地址是為KVM控制檯啟動選擇的預設地址,因此當您按一下KVM控制檯時,它使用此地址。如果該IPv6地址不可訪問,KVM啟動將失敗。如前所述,要選擇其他地址,請按一下KVM控制台選項旁邊的>>符號。    

The IPv6 address is the default address selected to start the KVM control booth, so it is used when you press the KVM control table. If the IPv6 address is not accessible, the KVM startup will fail. To select another address, please click on > > sign next to the KVM control table option. & nbsp; & nbsp; & nbsp;

UCS版本2.2還引入了直接KVM訪問。但是,此功能僅適用於帶外管理。此處不能使用IPv6地址,因為帶外僅使用IPv4地址。   

UCS version 2.2 also introduces direct KVM interviews. However, this function is suitable only for out-of-side management. IPv6 addresses cannot be used here because only IPv4 addresses are available. & nbsp; & nbsp; & nbsp; & nbsp;

本節介紹如何驗證您的組態是否正常運作。

This section describes how to verify that your composition is working properly.

此示例說明如何從UCSM GUI驗證FI的IPv6地址分配:

This is an example of how the IPv6 address from which UCSM GUI authenticates FI is assigned:

此示例說明如何從UCSM CLI驗證FI的IPv6地址分配:

This is an example of how the IPv6 address of UCSM CLI authenticates FI is assigned:

FI-A(local-mgmt)# show mgmt-ip-debug ifconfig

eth0      Link encap:Ethernet  HWaddr 54:7F:EE:65:81:A1
          inet addr:10.76.78.107  Bcast:10.76.78.255  Mask:255.255.255.0
          inet6 addr: 2014::10:76:78:106/64 Scope:Global
          inet6 addr: 2014::10:76:78:107/64 Scope:Global
          inet6 addr: fe80::567f:eeff:fe65:81a1/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:24775380 errors:0 dropped:0 overruns:0 frame:0
          TX packets:14343153 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
    
FI-B(local-mgmt)# show mgmt-ip-debug ifconfig

eth0      Link encap:Ethernet  HWaddr 54:7F:EE:6F:71:81
          inet addr:10.76.78.108  Bcast:10.76.78.255  Mask:255.255.255.0
          inet6 addr: 2014::10:76:78:108/64 Scope:Global
          inet6 addr: fe80::567f:eeff:fe6f:7181/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:18646548 errors:0 dropped:0 overruns:0 frame:0
          TX packets:238825 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:3206162748 (2.9 GiB)  TX bytes:56366913 (53.7 MiB)

此示例展示如何從UCSM CLI執行基本網路連線測試:

This example shows how to run a basic network connection test from UCSM CLI:

FI-A(local-mgmt)# ping6 2014::10:76:78:216
PING 2014::10:76:78:216(2014::10:76:78:216) from 2014::10:76:78:106 eth0:
56 data bytes
64 bytes from 2014::10:76:78:216: icmp_seq=1 ttl=64 time=1.92 ms
64 bytes from 2014::10:76:78:216: icmp_seq=2 ttl=64 time=0.262 ms
64 bytes from 2014::10:76:78:216: icmp_seq=3 ttl=64 time=0.260 ms
64 bytes from 2014::10:76:78:216: icmp_seq=4 ttl=64 time=0.222 ms
64 bytes from 2014::10:76:78:216: icmp_seq=5 ttl=64 time=0.196 ms
64 bytes from 2014::10:76:78:216: icmp_seq=6 ttl=64 time=0.231 ms

FI-A(local-mgmt)# traceroute6 2014::10:76:78:216
traceroute to 2014::10:76:78:216 (2014::10:76:78:216) from
2014::10:76:78:106, 30 hops max, 16 byte packets
 1  2014::10:76:78:216 (2014::10:76:78:216)  0.244 ms *  0.253 ms

此示例說明如何驗證從UCSM GUI分配給CIMC的IPv6地址:

This is an example of how to verify IPv6 addresses assigned to the CIMC from UCSM GUI:

此示例說明如何驗證從UCSM CLI分配給CIMC的IPv6地址:

This is an example of how to verify IPv6 addresses assigned to CIMC from UCSM CLI:

FI-A# scope server 1/1
FI-A /chassis/server # scope cimc
FI-A /chassis/server/cimc # show mgmt-iface in-band detail expand

External Management Interface:
    Mode: In Band
    Ip V4 State: None
    Ip V6 State: Static
    Is Derived from Inband Profile: No

    External Management Virtual LAN:
        Network Name: VL10
        Id: 10

        External Management Static IPv6:
            IP Address: 2014::10:76:78:146
            Default Gateway: 2014::10:76:78:1
            Prefix: 64
            Primary DNS IP: ::
            Secondary DNS IP: ::

下一個示例顯示如何跟蹤刀鋒伺服器的CIMC帶內連線的路徑。CIMC帶內介面應對映到對應的IOM上的最後一個主機介面(HIF)埠。IO模組(IOM)是根據伺服器的管理例項選擇的。

The next example shows how to track the CIMC connection to the blade server. The CIMC interface corresponds to the last HIF port on the corresponding IOM. The IO module is selected according to the server's administration case.

在UCSM GUI中,導航至Equipment > Server > General > Connection Details:

In UCSM GUI, the pilot sails to Equipment & gt; Server & gt; General & gt; Conaction Developments:

您也可以通過UCSM CLI進行驗證:

You can also verify via UCSM CLI:

附註:在本示例中,管理例項為FI A

FI-A# scope server 1/1
FI-A /chassis/server # show detail

Server:
    Slot: 1
    <snip>
    Conn Path: A,B
    Conn Status: A,B
    Managing Instance: A

如圖所示,Eth1/1/33被固定到上行鏈路埠Eth1/19,該埠用於帶內連線。

As shown in the graph, Eth1/1/33 is fixed to the upper chain port Eth1/19, which is used for the inner link.

FI-A(nxos)# show fex 1 detail

  Fex Port        State  Fabric Port
         Eth1/1/1    Up     Eth1/17
         Eth1/1/2    Up     Eth1/17
         Eth1/1/3    Up     Eth1/17
         Eth1/1/4    Up     Eth1/17
         Eth1/1/5  Down        None
         Eth1/1/6  Down        None
         Eth1/1/7  Down        None
         Eth1/1/8  Down        None
         Eth1/1/9    Up     Eth1/19
        Eth1/1/10  Down        None
        Eth1/1/11  Down        None
        Eth1/1/12  Down        None
        Eth1/1/13    Up     Eth1/20
        Eth1/1/14  Down        None
        Eth1/1/15  Down        None
        Eth1/1/16  Down        None
        Eth1/1/17    Up     Eth1/17
        Eth1/1/18  Down        None
        Eth1/1/19  Down        None
        Eth1/1/20  Down        None
        Eth1/1/21    Up     Eth1/18
        Eth1/1/22    Up     Eth1/18
        Eth1/1/23    Up     Eth1/18
        Eth1/1/24    Up     Eth1/18
        Eth1/1/25  Down        None
        Eth1/1/26  Down        None
        Eth1/1/27  Down        None
        Eth1/1/28  Down        None
        Eth1/1/29  Down     Eth1/20
        Eth1/1/30  Down     Eth1/20
        Eth1/1/31  Down     Eth1/20
        Eth1/1/32  Down     Eth1/20
        Eth1/1/33    Up     Eth1/19

現在,運行配置會新增帶內VLAN,在本例中為VLAN 10

Now, running configurations will add VLAN to the case for VLAN10.

FI-A(nxos)# show run int eth1/1/33

interface Ethernet1/1/33
  no pinning server sticky
  switchport mode trunk
  switchport trunk native vlan 4044
  switchport trunk allowed vlan 10,4044    
  no shutdown

FI-A(nxos)# show mac address-table vlan 10
Legend:
        * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
        age - seconds since last seen,+ - primary entry using vPC Peer-Link
   VLAN     MAC Address      Type      age     Secure NTFY   Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 10       e02f.6d9a.9e71    dynamic   0          F    F  Eth1/1/33

此示例說明如何跟蹤機架式伺服器的CIMC帶內連線路徑。CIMC介面應對映到韋瑟網路介面,該介面對映到伺服器所連線的交換矩陣擴展器(FEX)埠。如果伺服器在高可用性(HA)設定中連線到兩個不同的FEX模組,則必須檢查管理例項以確定路徑。

This is an example of how to track the CIMC connection path within the CIMC band of the server. The CIMC interface is shown to the Weather network interface, which is shown to the FEX port where the server connects. If the server connects to two different FEX modules in the high availability (HA) settings, the management case must be checked to determine the path.

在UCSM GUI中,導航至Equipment > Rack-mounts > Server > General > Connection Details:

In UCSM GUI, the pilot sails to Equipment & gt; Rick-mounts & gt; Server & gt; General & gt; Connection Details:

您也可以通過UCSM CLI進行驗證:

You can also verify via UCSM CLI:

FI-A# scope server 1
FI-A /server # show detail

Server:
    Conn Path: A,B
    Conn Status: A,B
    Managing Instance: B

如圖所示,FEX上的Eth2/1/4連線到機架式伺服器。

As shown in the graph , Eth2/1/4 on FEX connects to the rack server.

FI-B(nxos)# show fex 2 detail
  Fex Port        State  Fabric Port
         Eth2/1/1  Down        None
         Eth2/1/2  Down        None
         Eth2/1/3  Down        None
         Eth2/1/4    Up      Po1154
         Eth2/1/5  Down        None
         Eth2/1/6  Down        None
         Eth2/1/7  Down        None
         Eth2/1/8  Down        None
         Eth2/1/9  Down        None
        Eth2/1/10  Down        None
        Eth2/1/11  Down        None
        Eth2/1/12  Down        None
        Eth2/1/13  Down        None
        Eth2/1/14  Down        None
        Eth2/1/15  Down        None
        Eth2/1/16  Down        None
        Eth2/1/17  Down        None
        Eth2/1/18  Down        None
        Eth2/1/19  Down        None
        Eth2/1/20  Down        None
        Eth2/1/21  Down        None
        Eth2/1/22  Down        None
        Eth2/1/23  Down        None
        Eth2/1/24  Down        None
        Eth2/1/25  Down        None
        Eth2/1/26  Down        None
        Eth2/1/27  Down        None
        Eth2/1/28  Down        None
        Eth2/1/29  Down        None
        Eth2/1/30  Down        None
        Eth2/1/31  Down        None
        Eth2/1/32  Down        None

這些Vethernet介面對映到Eth2/1/4:

These Vethenets face-to-face at Eth2/1/4 :

附註:在本例中,CIMC介面是Veth32769

FI-B(nxos)# show vifs interface ethernet 2/1/4

Interface      MAX-VIFS VIFS
-------------- -------- ------------------------------------
Eth2/1/4       60       Veth689, Veth32769,

FI-B(nxos)# show run int veth32769

interface Vethernet32769
  inherit port-profile ucsm_internal_rackserver_portprofile
  no pinning server sticky
  bind interface Ethernet2/1/4 channel 65535

如圖所示,Veth32769被固定至上行鏈路埠Eth1/17

As can be seen, Veth32769 is fixed to the upper chain port Eth1/17.

FI-B(nxos)# show pinning border-interfaces

--------------------+---------+-----------------------------
Border Interface     Status    SIFs
--------------------+---------+-----------------------------
Eth1/17              Active    sup-eth2 Veth32769

目前尚無適用於此組態的具體疑難排解資訊。

There are no specific questions that can be used in this configuration.

本節介紹一些常見問題解答和解答。

This section presents some of the frequently asked questions and answers.

不支援。僅支援全域性單播地址。

Not supported. Only global single addresses are supported.

否。FI管理埠僅支援靜態地址分配。

No. FI only supports static address allocation.

否。目前網際網路小型電腦系統介面(iSCSI)啟動器不支援IPv6。

No. The Internet small computer interface (iSCSI) currently does not support IPv6.

如果FI的管理埠或者CIMC具有IPv6地址或帶內配置,則降級失敗並出現錯誤消息。

If the administration port of FI or the CIMC has an IPv6 address or an internal configuration, the downgrade fails and the error message appears.

如果UCSM當前使用版本2.2或更高版本,則FI降級成功完成。FI上的IPv6配置應繼續工作。

If UCSM uses version 2.2 or more before, the FI downgrade is successfully completed. The IPv6 configuration on FI should continue to work.

如果UCSM使用版本2.2或更高版本,則允許對CIMC進行帶內或IPv6配置。但是,無法識別此問題,並且CIMC繼續使用帶外IPv4地址。

If UCSM uses version 2.2 or higher, it is allowed to configure the CIMC either in tape or IPv6. However, the problem cannot be identified and the CIMC continues to use the extra IPv4.

如果CIMC具有帶內或IPv6配置,則降級失敗並出現錯誤消息。

If the CIMC has an internal or IPv6 configuration, the downgrading failed and the error message occurred.

會。保留的字首值為0和128。只能使用1到127。

Yes. The starting values are 0 and 128. Only 1 to 127 can be used.

會。VLAN 1、2和3不能與保留VLAN的常規清單一起使用(3968到4047)。

Yes. VLAN 1, 2 and 3 cannot be used in conjunction with the regular list of VLANs (3968 to 4047).

美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址
文字格式和图片示例

注册有任何问题请添加 微信:MVIP619 拉你进入群

弹窗与图片大小一致 文章转载注明

分享:

扫一扫在手机阅读、分享本文

发表评论
平台列表
美化布局示例

欧易(OKX)

  全球官网 大陆官网

币安(Binance)

  官网

火币(HTX)

  官网

Gate.io

  官网

Bitget

  官网

deepcoin

  官网
热门文章
  • 0.00015693个比特币等于多少人民币/美金

    0.00015693个比特币等于多少人民币/美金
    0.000 15693比特币等于多少人民币?根据比特币对人民币的最新汇率,0.000 15693比特币等于10.6 1678529美元/76.86554996人民币。比特币(BTC)【比特币价格翻倍】美元(USDT)人民币(CNY)0.000/克洛克-0/5693【数字货币矿机】10.6 167852976.8655254996比特币对人民币的最新汇率为:489,807.72 CNY(1比特币= 489,807.72人民币)(1美元=7.24人民币)(0.00015693 U...
  • 0.00003374个比特币等于多少人民币/美金

    0.00003374个比特币等于多少人民币/美金
    0.00003374比特币等于多少人民币?根据比特币对人民币的最新汇率,0.00003374比特币等于2.2826 1222美元/16.5261124728人民币。比特币(BTC)美元(USDT)人民币(CNY)0.00003374克洛克-0/22216.5261124728比特币对人民币的最新汇率为:489807.72 CNY(1比特币=489807.72人民币)(1美元=7.24人民币)(0.00003374USDT=0.0002442776 CNY)。汇率更新于2024...
  • 2000年美国GDP占世界的304%,中国GDP仅占35%,现在呢?

    2000年美国GDP占世界的304%,中国GDP仅占35%,现在呢?
    GDP作为全球公认的实力基准,就像是一个大国实力的代言人,它是布雷顿森林体系下全球团结的声音。它不仅仅是数字的累积,更是大国综合实力的人格化,默默诉说着每个国家的辉煌与荣耀。虽然GDP不是衡量一个国家综合实力的唯一标准,但无疑是最关键的指标之一。作为一面镜子,它反映了国家的经济实力和发展水平,是国家综合实力的重要体现,不容忽视。2000年,中国GDP迈过/克洛克-0/万亿美元的重要门槛,达到/克洛克-0/。2/克洛克-0/万亿美元(折合人民币7。7万亿元)。然而,在全球经济的...
  • A股利好!证监会连开三场座谈会!五部门发文 事关元宇宙…周末影响一周市场的十大消息(新股+点评)

    A股利好!证监会连开三场座谈会!五部门发文 事关元宇宙…周末影响一周市场的十大消息(新股+点评)
    1   证监会连开三场座谈会!将研究出台更多务实、管用的政策举措 The SEC will hold three talks! More practical and practical policy initiatives will be developed.   近日,中国证监会就活跃资本市场、提振投资者信心召开三场座谈会,分别听取专家学者和投资者意...
  • 1929经济大萧条或许即将重演?

    1929经济大萧条或许即将重演?
    人类似乎陷入了一个历史悖论,即我们总是重复同样的错误,无法真正从过去的错误中吸取教训。近年来,我们对世界各地接连不断的挑战和危机深感不安。20 19年突如其来的疫情,乌克兰的战火硝烟,欧洲的天然气供应危机以及全球少数国家的饥荒,所有这些问题都像洪水一样,一个接一个地涌来。如果你今天感到心情沉重,不要失去希望,因为明天可能会带来更严峻的挑战。首先,让我们深入讨论名为1929大萧条的时期。这场大萧条实际上是指从1929到1933的一场影响深远的经济危机。这场危机首先起源于美国,然...
标签列表