• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

S5560S-52P-SI 上网缓慢

2025-05-06提问
  • 0关注
  • 0收藏,287浏览
粉丝:0人 关注:0人

问题描述:

最近感觉上网比较缓慢,通过PC ping核心交换机地址253,无丢包。ping 路由器地址存在丢包,有时丢包严重。在ping 淘宝百度地址丢包率很高。

打开网页时看ping 很正常的情况下打开网页缓慢或者打不开,拓扑图及交换机配置如下,请问有没有大佬帮忙分析下什么情况

[S5560S-52P-SI]dis cu

#

 version 7.1.070, Release 6113

#

 sysname S5560S-52P-SI

#

 clock timezone Lisbon add 00:00:00

 clock protocol none

#

 telnet server enable

#

 irf mac-address persistent timer

 irf auto-update enable

 undo irf link-delay

 irf member 1 priority 1

#

 mac-authentication

#

 dhcp enable

#

 lldp global enable

#

 password-recovery enable

#

vlan 1

#

vlan 110 to 116

#

vlan 120

#

qos policy WebIf_21_0

#

qos policy WebIf_21_1

#

 stp bpdu-protection

 stp global enable

#

dhcp server ip-pool vlan111

 gateway-list 192.168.111.254

 network 192.168.111.0 mask 255.255.255.0

 address range 192.168.111.40 192.168.111.149

 dns-list 192.168.120.254

#

dhcp server ip-pool vlan112

 gateway-list 192.168.112.254

 network 192.168.112.0 mask 255.255.255.0

 address range 192.168.112.40 192.168.112.149

 dns-list 192.168.120.254

#

dhcp server ip-pool vlan113

 gateway-list 192.168.113.254

 network 192.168.113.0 mask 255.255.255.0

 address range 192.168.113.40 192.168.113.149

 dns-list 192.168.120.254

#

dhcp server ip-pool vlan114

 gateway-list 192.168.114.254

 network 192.168.114.0 mask 255.255.255.0

 address range 192.168.114.40 192.168.114.149

 dns-list 192.168.120.254

#

dhcp server ip-pool vlan115

 gateway-list 192.168.115.254

 network 192.168.115.0 mask 255.255.255.0

 address range 192.168.115.40 192.168.115.149

 dns-list 192.168.120.254

#

dhcp server ip-pool vlan116

 gateway-list 192.168.116.254

 network 192.168.116.0 mask 255.255.255.0

 address range 192.168.116.40 192.168.116.149

 dns-list 192.168.120.254

#

interface NULL0

#

interface Vlan-interface110

 ip address 192.168.110.254 255.255.255.0

 local-proxy-arp enable

 dhcp server apply ip-pool vlan110

#

interface Vlan-interface111

 ip address 192.168.111.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan111

#

interface Vlan-interface112

 ip address 192.168.112.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan112

#

interface Vlan-interface113

 ip address 192.168.113.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan113

#

interface Vlan-interface114

 ip address 192.168.114.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan114

#

interface Vlan-interface115

 ip address 192.168.115.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan115

#

interface Vlan-interface116

 ip address 192.168.116.254 255.255.255.0

 local-proxy-arp enable

 packet-filter 3001 inbound

 dhcp server apply ip-pool vlan116

#

interface Vlan-interface120

 ip address 192.168.120.253 255.255.255.0

#

interface GigabitEthernet1/0/1

 port access vlan 120

#

interface GigabitEthernet1/0/2

 port access vlan 120

#

interface GigabitEthernet1/0/3

 port access vlan 110

#

interface GigabitEthernet1/0/4

 port access vlan 110

#

interface GigabitEthernet1/0/5

 port access vlan 110

#

interface GigabitEthernet1/0/6

 port access vlan 110

#

interface GigabitEthernet1/0/7

 port access vlan 110

#

interface GigabitEthernet1/0/8

 port access vlan 110

#

interface GigabitEthernet1/0/9

 port access vlan 110

#

interface GigabitEthernet1/0/10

 port access vlan 110

#

interface GigabitEthernet1/0/11

 port access vlan 110

 dot1x

#

interface GigabitEthernet1/0/12

 port access vlan 110

#

interface GigabitEthernet1/0/13

 port access vlan 110

#

interface GigabitEthernet1/0/14

 port access vlan 110

#

interface GigabitEthernet1/0/15

 port access vlan 110

#

interface GigabitEthernet1/0/16

 port access vlan 110

#

interface GigabitEthernet1/0/17

 port access vlan 110

#

interface GigabitEthernet1/0/18

 port access vlan 110

#

interface GigabitEthernet1/0/19

 port access vlan 110

#

interface GigabitEthernet1/0/20

 port access vlan 110

#

interface GigabitEthernet1/0/21

 port access vlan 110

 qos apply policy WebIf_21_0 inbound

 qos apply policy WebIf_21_1 outbound

#

interface GigabitEthernet1/0/22

 port access vlan 110

#

interface GigabitEthernet1/0/23

 port access vlan 110

#

interface GigabitEthernet1/0/24

 port access vlan 110

#

interface GigabitEthernet1/0/25

 port access vlan 110

#

interface GigabitEthernet1/0/26

 port access vlan 110

#

interface GigabitEthernet1/0/27

 port access vlan 110

#

interface GigabitEthernet1/0/28

 port access vlan 110

#

interface GigabitEthernet1/0/29

 port access vlan 110

#

interface GigabitEthernet1/0/30

 port access vlan 110

#

interface GigabitEthernet1/0/31

 port access vlan 111

#

interface GigabitEthernet1/0/32

 port access vlan 111

#

interface GigabitEthernet1/0/33

 port access vlan 112

#

interface GigabitEthernet1/0/34

 port access vlan 112

#

interface GigabitEthernet1/0/35

 port access vlan 113

#

interface GigabitEthernet1/0/36

 port access vlan 113

#

interface GigabitEthernet1/0/37

 port access vlan 114

#

interface GigabitEthernet1/0/38

 port access vlan 114

#

interface GigabitEthernet1/0/39

 port access vlan 115

#

interface GigabitEthernet1/0/40

 port access vlan 115

#

interface GigabitEthernet1/0/41

 port access vlan 116

#

interface GigabitEthernet1/0/42

 port access vlan 116

#

interface GigabitEthernet1/0/43

 port access vlan 116

#

interface GigabitEthernet1/0/44

 port access vlan 116

#

interface GigabitEthernet1/0/45

 port access vlan 116

#

interface GigabitEthernet1/0/46

 port access vlan 116

#

interface GigabitEthernet1/0/47

 port access vlan 116

#

interface GigabitEthernet1/0/48

 port access vlan 116

#

interface GigabitEthernet1/0/49

 port access vlan 112

#

interface GigabitEthernet1/0/50

 port access vlan 113

#

interface GigabitEthernet1/0/51

 port access vlan 114

#

interface GigabitEthernet1/0/52

 port access vlan 116

#

 scheduler logfile size 16

#

line class aux

 user-role network-admin

#

line class vty

 user-role network-operator

#

line aux 0

 user-role network-admin

#

line vty 0 15

 authentication-mode scheme

 user-role network-operator

#

line vty 16 63

 user-role network-operator

#

 ip route-static 0.0.0.0 0 192.168.120.254

#

 arp static 192.168.110.223 0025-643b-59b4 110 GigabitEthernet1/0/7

 arp static 192.168.110.248 0211-322c-3385

 arp static 192.168.113.64 4e29-bf86-b017 113 GigabitEthernet1/0/36

#

acl advanced 3001

 rule 0 deny ip source 192.168.111.0 0.0.0.255 destination 192.168.112.0 0.0.0.255

 rule 5 deny ip source 192.168.111.0 0.0.0.255 destination 192.168.113.0 0.0.0.255

 rule 10 deny ip source 192.168.111.0 0.0.0.255 destination 192.168.114.0 0.0.0.255

 rule 15 deny ip source 192.168.111.0 0.0.0.255 destination 192.168.115.0 0.0.0.255

 rule 20 deny ip source 192.168.111.0 0.0.0.255 destination 192.168.116.0 0.0.0.255

 rule 25 deny ip source 192.168.112.0 0.0.0.255 destination 192.168.111.0 0.0.0.255

 rule 30 deny ip source 192.168.112.0 0.0.0.255 destination 192.168.113.0 0.0.0.255

 rule 35 deny ip source 192.168.112.0 0.0.0.255 destination 192.168.114.0 0.0.0.255

 rule 40 deny ip source 192.168.112.0 0.0.0.255 destination 192.168.115.0 0.0.0.255

 rule 45 deny ip source 192.168.112.0 0.0.0.255 destination 192.168.116.0 0.0.0.255

 rule 50 deny ip source 192.168.113.0 0.0.0.255 destination 192.168.111.0 0.0.0.255

 rule 55 deny ip source 192.168.113.0 0.0.0.255 destination 192.168.112.0 0.0.0.255

 rule 60 deny ip source 192.168.113.0 0.0.0.255 destination 192.168.114.0 0.0.0.255

 rule 65 deny ip source 192.168.113.0 0.0.0.255 destination 192.168.115.0 0.0.0.255

 rule 70 deny ip source 192.168.113.0 0.0.0.255 destination 192.168.116.0 0.0.0.255

 rule 75 deny ip source 192.168.114.0 0.0.0.255 destination 192.168.111.0 0.0.0.255

 rule 80 deny ip source 192.168.114.0 0.0.0.255 destination 192.168.112.0 0.0.0.255

 rule 85 deny ip source 192.168.114.0 0.0.0.255 destination 192.168.113.0 0.0.0.255

 rule 90 deny ip source 192.168.114.0 0.0.0.255 destination 192.168.115.0 0.0.0.255

 rule 95 deny ip source 192.168.114.0 0.0.0.255 destination 192.168.116.0 0.0.0.255

 rule 100 deny ip source 192.168.115.0 0.0.0.255 destination 192.168.111.0 0.0.0.255

 rule 105 deny ip source 192.168.115.0 0.0.0.255 destination 192.168.112.0 0.0.0.255

 rule 110 deny ip source 192.168.115.0 0.0.0.255 destination 192.168.113.0 0.0.0.255

 rule 115 deny ip source 192.168.115.0 0.0.0.255 destination 192.168.114.0 0.0.0.255

 rule 120 deny ip source 192.168.115.0 0.0.0.255 destination 192.168.116.0 0.0.0.255

 rule 125 deny ip source 192.168.116.0 0.0.0.255 destination 192.168.111.0 0.0.0.255

 rule 130 deny ip source 192.168.116.0 0.0.0.255 destination 192.168.112.0 0.0.0.255

 rule 135 deny ip source 192.168.116.0 0.0.0.255 destination 192.168.113.0 0.0.0.255

 rule 140 deny ip source 192.168.116.0 0.0.0.255 destination 192.168.114.0 0.0.0.255

 rule 145 deny ip source 192.168.116.0 0.0.0.255 destination 192.168.115.0 0.0.0.255

#

acl advanced 3002

#

radius scheme system

 user-name-format without-domain

#

domain system

#

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#

role name level-13

 description Predefined level-13 role

#

role name level-14

 description Predefined level-14 role

#

user-group 12

#

user-group system

 

最佳答案

粉丝:100人 关注:9人

ping设备丢包是可能的,不能做参考

使用运营商提供的DNS试试 

暂无评论

0 个回答

该问题暂时没有网友解答

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明