1、我们公司一台电脑软件一开启就要扫描本网络的设备,
2、5120交找机提示:%8月1日08:18:35:101 2000 S5120S-52P-EI-14 ARP/6/ARP_SRC_MAC_FOUND_攻击:在接口GE1/0/3上检测到来自MAC fcaa-14aa-1415的攻击。
3、这台电脑就断网了,能不能关掉某个端口的ARP_SRC_MAC_FOUND_攻击防护?
# version 5.20, Release 1513P62 # sysname S5120S-52P-EI-14 # irf mac-address persistent timer irf auto-update enable undo irf link-delay # domain default enable system # telnet server enable # password-recovery enable # vlan 1 # vlan 9 to 21 # vlan 100 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool v10 network 192.168.1.0 mask 255.255.255.0 gateway-list 192.168.1.1 dns-list 61.139.2.69 expired day 3 # dhcp server ip-pool v11 network 192.168.2.0 mask 255.255.255.0 gateway-list 192.168.2.1 dns-list 61.139.2.69 expired day 3 # user-group system # local-user admin password cipher $c$3$tImNlC/Jovg5GzO8YnEHn6A7uXtcE+44YECr authorization-attribute level 3 service-type telnet service-type web local-user webadmin password cipher $c$3$ZEUoVu+MNIh81sM8Ijy+I5LemLcwzbh5zUSC9Q== authorization-attribute level 3 service-type telnet service-type web # stp enable # interface NULL0 # interface Vlan-interface1 ip address dhcp-alloc client-identifier mac Vlan-interface1 # interface Vlan-interface10 ip address 192.168.1.1 255.255.255.0 # interface Vlan-interface11 ip address 192.168.2.1 255.255.255.0 # interface Vlan-interface100 description guanli ip address 192.168.100.1 255.255.255.0 # interface GigabitEthernet1/0/1 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/2 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/3 port access vlan 10 stp disable dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/4 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/5 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/6 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/7 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/8 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/9 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/10 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/11 port access vlan 10 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/44 port access vlan 18 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/45 port access vlan 15 # interface GigabitEthernet1/0/46 port access vlan 18 dhcp-snooping information enable dhcp-snooping check mac-address # interface GigabitEthernet1/0/47 description TO U200-M port access vlan 15 # interface GigabitEthernet1/0/48 description TO s5500-28F port link-type trunk port trunk permit vlan all dhcp-snooping trust # interface GigabitEthernet1/0/49 # interface GigabitEthernet1/0/50 # interface GigabitEthernet1/0/51 # interface GigabitEthernet1/0/52 # dhcp-snooping # ip route-static 0.0.0.0 0.0.0.0 192.168.6.1 # dhcp server forbidden-ip 192.168.1.1 192.168.1.100 dhcp server forbidden-ip 192.168.2.1 192.168.2.100 # dhcp enable # arp anti-attack active-ack enable arp anti-attack source-mac filter # load tr069-configuration # user-interface aux 0 user-interface vty 0 15 authentication-mode scheme
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论