• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

f100a 防火墙间隔几十分钟就断网

2018-10-16提问
  • 0关注
  • 1收藏,1143浏览
粉丝:0人 关注:0人

问题描述:

间隔几十分钟就断网

断网时的信息如下:

 description WCN_INTERFACE_WAN ip address 221.193.212.152 255.255.255.224 firewall packet-filter 3100 inbound nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/2 # interface NULL0 # firewall zone local set priority 100 # firewall zone trust add interface Ethernet0/0 add interface Ethernet0/1 add interface Ethernet0/2 add interface Ethernet0/3 set priority 85 # firewall zone untrust add interface Ethernet1/0 set priority 5 # firewall zone DMZ set priority 50 # firewall interzone local trust # firewall interzone local untrust # firewall interzone local DMZ # firewall interzone trust untrust # firewall interzone trust DMZ # firewall interzone DMZ untrust # undo info-center enable # ip route-static 0.0.0.0 0.0.0.0 221.193.212.129 preference 60 # firewall defend ip-spoofing firewall defend land firewall defend smurf firewall defend fraggle firewall defend winnuke firewall defend icmp-redirect firewall defend icmp-unreachable firewall defend source-route firewall defend route-record firewall defend tracert firewall defend ping-of-death firewall defend tcp-flag firewall defend ip-fragment firewall defend large-icmp firewall defend teardrop firewall defend ip-sweep firewall defend port-scan firewall defend arp-spoofing firewall defend arp-flood firewall defend frag-flood firewall defend syn-flood enable firewall defend udp-flood enable firewall defend icmp-flood enable # user-interface con 0 user-interface aux 0 user-interface vty 0 4 authentication-mode scheme set authentication password simple admin # return =============================================================== ===============display saved-cOnfiguration=============== =============================================================== # sysname HDZXXZ # firewall packet-filter enable firewall packet-filter default permit # insulate # nat aging-time tcp 3600 nat aging-time udp 180 nat aging-time icmp 10 nat aging-time pptp 300 nat aging-time dns 10 nat aging-time ftp-ctrl 300 nat aging-time tcp-fin 10 nat aging-time tcp-syn 10 nat session refresh-speed level 5 # firewall session aging-time tcp 260 # undo firewall statistic system enable # qos carl 1 source-ip-address range 192.168.100.1 to 192.168.100.27 per-address qos carl 2 source-ip-address range 192.168.100.28 to 192.168.100.40 per-address qos carl 3 source-ip-address range 192.168.100.41 to 192.168.100.88 per-address qos carl 4 source-ip-address range 192.168.100.89 to 192.168.100.234 per-address qos carl 5 source-ip-address range 192.168.100.235 to 192.168.100.254 per-address # firewall mac-binding 192.168.100.30 0026-2d23-f085 firewall mac-binding 192.168.100.31 0026-181c-e5c5 firewall mac-binding 192.168.100.35 001f-e208-7711 firewall mac-binding 192.168.100.39 001e-9042-fff8 firewall mac-binding 192.168.100.40 001e-904f-9cfb firewall mac-binding 192.168.100.41 0022-6879-bc36 firewall mac-binding 192.168.100.42 0022-685f-92d9 firewall mac-binding 192.168.100.43 001e-904f-dc10 firewall mac-binding 192.168.100.44 90fb-a642-6b97 firewall mac-binding 192.168.100.45 0022-685f-927b firewall mac-binding 192.168.100.46 001f-e26b-62ed firewall mac-binding 192.168.100.47 0021-9781-78b4 firewall mac-binding 192.168.100.48 0015-5846-6f46 firewall mac-binding 192.168.100.50 0022-685d-a672 firewall mac-binding 192.168.100.51 0024-8c40-8695 firewall mac-binding 192.168.100.53 0026-181c-e41f firewall mac-binding 192.168.100.54 0025-1183-ebb5 firewall mac-binding 192.168.100.55 0013-d4e4-cf31 firewall mac-binding 192.168.100.57 0024-8c40-80ad firewall mac-binding 192.168.100.59 0021-97ea-c4fa firewall mac-binding 192.168.100.61 d027-886a-f824 firewall mac-binding 192.168.100.62 001e-904f-1321 firewall mac-binding 192.168.100.65 0016-960d-6fbb firewall mac-binding 192.168.100.66 0026-181c-e664 firewall mac-binding 192.168.100.67 0025-1183-ebb3 firewall mac-binding 192.168.100.68 0011-5b0a-e789 firewall mac-binding 192.168.100.86 0022-687a-01e9 firewall mac-binding 192.168.100.92 0016-ec82-72d5 firewall mac-binding 192.168.100.93 0025-114c-f2fa firewall mac-binding 192.168.100.98 001e-904f-deef firewall mac-binding 192.168.100.99 4487-fcd2-aa45 firewall mac-binding 192.168.100.171 0001-6c1b-b3e9 firewall mac-binding 192.168.100.172 90fb-a690-1218 firewall mac-binding 192.168.100.201 00e0-6f05-7483 firewall mac-binding 192.168.100.239 001e-0bd6-dad0 firewall mac-binding 192.168.100.240 b499-baba-627c firewall mac-binding 192.168.100.242 b499-baba-627c firewall mac-binding 192.168.100.245 0024-acc9-6ae7 firewall mac-binding 192.168.100.251 001c-c4da-d7bc # DNS-proxy enable # radius scheme system server-type extended # domain system # local-user admin password simple hdszxxz00506# service-type telnet level 3 # acl number 2000 rule 0 permit rule 1 permit source 192.0.0.0 0.255.255.255 acl number 2001 rule 0 permit # acl number 3000 rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.100.251 0 acl number 3100 rule 0 deny tcp destination-port eq 445 rule 1 deny tcp destination-port eq 139 rule 2 permit ip # acl name www # interface Aux0 async mode flow # interface Ethernet0/0 description WCN_INTERFACE_LAN ip address 192.168.100.253 255.255.255.0 nat outbound 3000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 qos car inbound carl 2 cir 8192000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 3 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 4 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 5 cir 5120000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 1 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car outbound carl 4 cir 10000000 cbs 10000000 ebs 10000000 green pass red discard qos car outbound carl 6 cir 5000000 cbs 5000000 ebs 5000000 green pass red discard qos car outbound carl 8 cir 40000000 cbs 40000000 ebs 40000000 green pass red discard # interface Ethernet0/1 # interface Ethernet0/2 # interface Ethernet0/3 # interface Ethernet1/0 description WCN_INTERFACE_WAN nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/1 description WCN_INTERFACE_WAN ip address 221.193.212.152 255.255.255.224 firewall packet-filter 3100 inbound nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/2 # interface NULL0 # firewall zone local set priority 100 # firewall zone trust add interface Ethernet0/0 add interface Ethernet0/1 add interface Ethernet0/2 add interface Ethernet0/3 set priority 85 # firewall zone untrust add interface Ethernet1/0 set priority 5 # firewall zone DMZ set priority 50 # firewall interzone local trust # firewall interzone local untrust # firewall interzone local DMZ # firewall interzone trust untrust # firewall interzone trust DMZ # firewall interzone DMZ untrust # undo info-center enable # ip route-static 0.0.0.0 0.0.0.0 221.193.212.129 preference 60 # firewall defend ip-spoofing firewall defend land firewall defend smurf firewall defend fraggle firewall defend winnuke firewall defend icmp-redirect firewall defend icmp-unreachable firewall defend source-route firewall defend route-record firewall defend tracert firewall defend ping-of-death firewall defend tcp-flag firewall defend ip-fragment firewall defend large-icmp firewall defend teardrop firewall defend ip-sweep firewall defend port-scan firewall defend arp-spoofing firewall defend arp-flood firewall defend frag-flood firewall defend syn-flood enable firewall defend udp-flood enable firewall defend icmp-flood enable # user-interface con 0 user-interface aux 0 user-interface vty 0 4 authentication-mode scheme set authentication password simple admin # return ===================================================== ===============display interface=============== ===================================================== Aux0 current state :DOWN Line protocol current state :UP (spoofing) Description : Aux0 Interface The Maximum Transmit Unit is 1500 Internet protocol processing : disabled Data drive mode: flow Last 300 seconds input: 0.0 bytes/sec, 0.0 packets/sec Last 300 seconds output: 0.0 bytes/sec, 0.0 packets/sec 0 packets input, 0 bytes 0 packets output, 72 bytes error: Parity 0, Frame 0, Overrun 0, FIFO 0 DCD=DOWN DTR=UP DSR=DOWN RTS=UP CTS=DOWN Ethernet0/0 current state :UP Line protocol current state :UP Description : WCN_INTERFACE_LAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet Address is 192.168.100.253/24 IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set 100Mb/s, Full-duplex, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 56057.82 bytes/sec, 448455 bits/sec, 154.65 packets/sec Last 300 seconds output rate 112753.70 bytes/sec, 902022 bits/sec, 114.21 packets/sec Input: 244012646 packets, 246456995 bytes, 244012646 buffers 1147344 broadcasts, 677076 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:260812778 packets, 176846480 bytes, 260812801 buffers 14473 broadcasts, 0 multicasts, 0 pauses 4 errors, 4 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/1 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/1 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/2 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/2 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/3 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/3 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet1/0 current state :DOWN Line protocol current state :DOWN Description : WCN_INTERFACE_WAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d65 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet1/1 current state :UP Line protocol current state :UP Description : WCN_INTERFACE_WAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet Address is 221.193.212.152/27 IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d66 Media type is twisted pair, loopback not set, promiscuous mode not set 100Mb/s, Full-duplex, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/372711 Last clearing of counters: Never Last 300 seconds input rate 112804.38 bytes/sec, 902435 bits/sec, 114.27 packets/sec Last 300 seconds output rate 55165.93 bytes/sec, 441320 bits/sec, 146.91 packets/sec Input: 264491835 packets, 1068419573 bytes, 264491835 buffers 80271 broadcasts, 0 multicasts, 0 pauses 1814 errors, 1 runts, 0 giants 100 crc, 4 align errors, 1709 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:236884202 packets, 3632884171 bytes, 236884202 buffers 39 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 2130 lost carriers Ethernet1/2 current state :DOWN Line protocol current state :DOWN Description : Ethernet1/2 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d67 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers NULL0 current state :UP Line protocol current state :UP (spoofing) Description : NULL0 Interface The Maximum Transmit Unit is 1500 Internet protocol processing : disabled Physical is NULL DEV Last 300 seconds input: 0 bytes/sec 0 packets/sec Last 300 seconds output: 0 bytes/sec 0 packets/sec 0 packets input, 0 bytes, 0 drops 0 packets output, 0 bytes, 0 drops ====================================================== ===============display cOntroller=============== ====================================================== ^ % Unrecognized command found at '^' position. ======================================================== ===============display ip interface=============== ======================================================== Ethernet0/0 current state :UP Line protocol current state :UP Internet Address is 192.168.100.253/24 Broadcast address : 192.168.100.255 The Maximum Transmit Unit : 1500 bytes ip fast-forwarding incoming packets state is Enabled ip fast-forwarding outgoing packets state is Enabled IP packets input number: 243039371, bytes: 1057359638, multicasts: 404979 IP packets output number: 260683772, bytes: 768828073, multicasts: 0 ARP packets input number: 516694 Request packet: 507979 Reply packet: 8715 Unknown packet: 0 TTL invalid packet number: 502 ICMP packet input number: 2064 Echo reply: 0 Unreachable: 139 Source quench: 0 Routing redirect: 0 Echo request: 1925 Router advert: 0 Router solicit: 0 Time exceed: 0 IP header bad: 0 Timestamp request: 0 Timestamp reply: 0 Information request: 0 Information reply: 0 Netmask request: 0 Netmask reply: 0 Unknown type: 0 DHCP packet deal mode: global Ethernet1/1 current state :UP Line protocol current state :UP Internet Address is 221.193.212.152/27 Broadcast address : 221.193.212.159 The Maximum Transmit Unit : 1500 bytes ip fast-forwarding incoming packets state is Enabled ip fast-forwarding outgoing packets state is Enabled IP packets input number: 265093112, bytes: 2266346318, multicasts: 0 IP packets output number: 237256605, bytes: 58031091, multicasts: 0 ARP packets input number: 74781 Request packet: 74771 Reply packet: 10 Unknown packet: 0 TTL invalid packet number: 214 ICMP packet input number: 23866 Echo reply: 16 Unreachable: 7987 Source quench: 4 Routing redirect: 3 Echo request: 15681 Router advert: 0 Router solicit: 0 Time exceed: 174 IP header bad: 0 Timestamp request: 1 Timestamp reply: 0 Information request: 0 Information reply: 0 Netmask request: 0 Netmask reply: 0 Unknown type: 0 DHCP packet deal mode: global ========================================================= ===============display ip statistics=============== ========================================================= Input: sum 506875603 local 3963296 bad protocol 11 bad format 1852 bad checksum 0 bad options 0 Output: forwarding 494897083 local 3653546 dropped 0 no route 26097 compress fails 0 Fragment:input 1823 output 0 dropped 0 fragmented 0 couldn't fragment 0 Reassembling:sum 0 timeouts 1823 ===================================================== ===============display logbuffer=============== ===================================================== Logging buffer configuration and contents:enabled Allowed max buffer size : 1024 Actual buffer size : 512 Channel number : 4 , Channel name : logbuffer Dropped messages : 0 Overwritten messages : 0 Current messages : 181 %Oct 10 15:11:27:333 2018 HDZXXZ IC/6/SYS_RESTART: System restarted -- H3C Comware Software %Oct 10 15:11:30:907 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Aux0 %Oct 10 15:11:30:907 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/0 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/1 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/2 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/3 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/0 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/1 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/2 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface NULL0 %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:sysname HDZXXZ %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter enable %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter default permit %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:insulate %Oct 10 15:11:30:910 2018 HDZXXZ HTTPD/4/Log:Starting HTTP server. %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp 3600 %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time udp 180 %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time icmp 10 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time pptp 300 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time dns 10 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time ftp-ctrl 300 %Oct 10 15:11:30:021 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp-fin 10 %Oct 10 15:11:30:021 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp-syn 10 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat session refresh-speed level 5 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall session aging-time tcp 260 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:undo firewall statistic system enable %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 1 source-ip-address range 192.168.100.1 to 192.168.100.27 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 2 source-ip-address range 192.168.100.28 to 192.168.100.40 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 3 source-ip-address range 192.168.100.41 to 192.168.100.88 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 4 source-ip-address range 192.168.100.89 to 192.168.100.234 per-address %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 5 source-ip-address range 192.168.100.235 to 192.168.100.254 per-address %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.30 0026-2d23-f085 %Oct 10 15:11:30:024 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.30;bindMacAddr(1030)=00-26-2d-23-f0-85 %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.31 0026-181c-e5c5 %Oct 10 15:11:30:025 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.31;bindMacAddr(1030)=00-26-18-1c-e5-c5 %Oct 10 15:11:30:025 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.35 001f-e208-7711 %Oct 10 15:11:30:025 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.35;bindMacAddr(1030)=00-1f-e2-08-77-11 %Oct 10 15:11:30:026 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.39 001e-9042-fff8 %Oct 10 15:11:30:026 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.39;bindMacAddr(1030)=00-1e-90-42-ff-f8 %Oct 10 15:11:30:026 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.40 001e-904f-9cfb %Oct 10 15:11:30:027 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.40;bindMacAddr(1030)=00-1e-90-4f-9c-fb %Oct 10 15:11:30:042 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.41 0022-6879-bc36 %Oct 10 15:11:30:042 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.41;bindMacAddr(1030)=00-22-68-79-bc-36 %Oct 10 15:11:30:043 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.42 0022-685f-92d9 %Oct 10 15:11:30:043 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.42;bindMacAddr(1030)=00-22-68-5f-92-d9 %Oct 10 15:11:30:043 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.43 001e-904f-dc10 %Oct 10 15:11:30:044 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.43;bindMacAddr(1030)=00-1e-90-4f-dc-10 %Oct 10 15:11:30:044 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.44 90fb-a642-6b97 %Oct 10 15:11:30:044 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.44;bindMacAddr(1030)=90-fb-a6-42-6b-97 %Oct 10 15:11:30:045 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.45 0022-685f-927b %Oct 10 15:11:30:045 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.45;bindMacAddr(1030)=00-22-68-5f-92-7b %Oct 10 15:11:30:045 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.46 001f-e26b-62ed %Oct 10 15:11:30:045 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.46;bindMacAddr(1030)=00-1f-e2-6b-62-ed %Oct 10 15:11:30:046 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.47 0021-9781-78b4 %Oct 10 15:11:30:046 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.47;bindMacAddr(1030)=00-21-97-81-78-b4 %Oct 10 15:11:30:046 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.48 0015-5846-6f46 %Oct 10 15:11:30:047 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.48;bindMacAddr(1030)=00-15-58-46-6f-46 %Oct 10 15:11:30:047 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.50 0022-685d-a672 %Oct 10 15:11:30:047 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.50;bindMacAddr(1030)=00-22-68-5d-a6-72 %Oct 10 15:11:30:048 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.51 0024-8c40-8695 %Oct 10 15:11:30:048 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.51;bindMacAddr(1030)=00-24-8c-40-86-95 %Oct 10 15:11:31:062 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.53 0026-181c-e41f %Oct 10 15:11:31:063 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.53;bindMacAddr(1030)=00-26-18-1c-e4-1f %Oct 10 15:11:31:063 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.54 0025-1183-ebb5 %Oct 10 15:11:31:064 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.54;bindMacAddr(1030)=00-25-11-83-eb-b5 %Oct 10 15:11:31:064 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.55 0013-d4e4-cf31 %Oct 10 15:11:31:064 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.55;bindMacAddr(1030)=00-13-d4-e4-cf-31 %Oct 10 15:11:31:064 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.57 0024-8c40-80ad %Oct 10 15:11:31:065 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.57;bindMacAddr(1030)=00-24-8c-40-80-ad %Oct 10 15:11:31:065 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.59 0021-97ea-c4fa %Oct 10 15:11:31:065 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.59;bindMacAddr(1030)=00-21-97-ea-c4-fa %Oct 10 15:11:31:066 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.61 d027-886a-f824 %Oct 10 15:11:31:066 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.61;bindMacAddr(1030)=d0-27-88-6a-f8-24 %Oct 10 15:11:31:066 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.62 001e-904f-1321 %Oct 10 15:11:31:067 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.62;bindMacAddr(1030)=00-1e-90-4f-13-21 %Oct 10 15:11:31:067 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.65 0016-960d-6fbb %Oct 10 15:11:31:067 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.65;bindMacAddr(1030)=00-16-96-0d-6f-bb %Oct 10 15:11:31:067 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.66 0026-181c-e664 %Oct 10 15:11:31:068 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.66;bindMacAddr(1030)=00-26-18-1c-e6-64 %Oct 10 15:11:31:068 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.67 0025-1183-ebb3 %Oct 10 15:11:31:068 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.67;bindMacAddr(1030)=00-25-11-83-eb-b3 %Oct 10 15:11:31:083 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.68 0011-5b0a-e789 %Oct 10 15:11:31:083 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.68;bindMacAddr(1030)=00-11-5b-0a-e7-89 %Oct 10 15:11:31:084 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.86 0022-687a-01e9 %Oct 10 15:11:31:084 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.86;bindMacAddr(1030)=00-22-68-7a-01-e9 %Oct 10 15:11:31:084 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.92 0016-ec82-72d5 %Oct 10 15:11:31:085 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.92;bindMacAddr(1030)=00-16-ec-82-72-d5 %Oct 10 15:11:31:085 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.93 0025-114c-f2fa %Oct 10 15:11:31:085 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.93;bindMacAddr(1030)=00-25-11-4c-f2-fa %Oct 10 15:11:31:085 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.98 001e-904f-deef %Oct 10 15:11:31:086 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.98;bindMacAddr(1030)=00-1e-90-4f-de-ef %Oct 10 15:11:31:086 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.99 4487-fcd2-aa45 %Oct 10 15:11:31:086 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.99;bindMacAddr(1030)=44-87-fc-d2-aa-45 %Oct 10 15:11:31:087 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.171 0001-6c1b-b3e9 %Oct 10 15:11:31:087 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.171;bindMacAddr(1030)=00-01-6c-1b-b3-e9 %Oct 10 15:11:31:087 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.172 90fb-a690-1218 %Oct 10 15:11:31:088 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.172;bindMacAddr(1030)=90-fb-a6-90-12-18 %Oct 10 15:11:31:088 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.201 00e0-6f05-7483 %Oct 10 15:11:31:088 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.201;bindMacAddr(1030)=00-e0-6f-05-74-83 %Oct 10 15:11:31:088 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.239 001e-0bd6-dad0 %Oct 10 15:11:31:089 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.239;bindMacAddr(1030)=00-1e-0b-d6-da-d0 %Oct 10 15:11:31:471 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.240 b499-baba-627c %Oct 10 15:11:31:472 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.240;bindMacAddr(1030)=b4-99-ba-ba-62-7c %Oct 10 15:11:31:472 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.242 b499-baba-627c %Oct 10 15:11:31:472 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.242;bindMacAddr(1030)=b4-99-ba-ba-62-7c %Oct 10 15:11:31:473 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.245 0024-acc9-6ae7 %Oct 10 15:11:31:473 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.245;bindMacAddr(1030)=00-24-ac-c9-6a-e7 %Oct 10 15:11:31:473 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.251 001c-c4da-d7bc %Oct 10 15:11:31:474 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.251;bindMacAddr(1030)=00-1c-c4-da-d7-bc %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:DNS-proxy enable %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:radius scheme system %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:server-type extended %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:domain system %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:local-user admin %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:password simple ****** %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:service-type telnet %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:level 3 %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 2000 %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit %Oct 10 15:11:31:477 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 1 permit source 192.0.0.0 0.255.255.255 %Oct 10 15:11:31:477 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 2001 %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 3000 %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.100.251 0 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 3100 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 deny tcp destination-port eq 445 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 1 deny tcp destination-port eq 139 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 2 permit ip %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl name www %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Aux0 %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:async mode flow %Oct 10 15:11:31:754 2018 HDZXXZ PHY/1/PHY: Aux0: already in flow mode %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/0 %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_LAN %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:ip address 192.168.100.253 255.255.255.0 %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 3000 %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 2 cir 8192000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 3 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:31:757 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 4 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:133 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 5 cir 5120000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 1 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 4 cir 10000000 cbs 10000000 ebs 10000000 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 6 cir 5000000 cbs 5000000 ebs 5000000 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 8 cir 40000000 cbs 40000000 ebs 40000000 green pass red discard %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/1 %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/2 %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/3 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/0 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_WAN %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 2000 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/1 %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_WAN %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:ip address 221.193.212.152 255.255.255.224 %Oct 10 15:11:32:139 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter 3100 inbound %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 2000 %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/2 %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface NULL0 %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone local %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 100 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone trust %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/0 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/1 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/2 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/3 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 85 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone untrust %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet1/0 %Oct 10 15:11:32:211 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 5 %Oct 10 15:11:32:211 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone DMZ ============================================================ ===============display ip routing-table=============== ============================================================ Routing Table: public net Destination/Mask Protocol Pre Cost Nexthop Interface 0.0.0.0/0 STATIC 60 0 221.193.212.129 Ethernet1/1 127.0.0.0/8 DIRECT 0 0 127.0.0.1 InLoopBack0 127.0.0.1/32 DIRECT 0 0 127.0.0.1 InLoopBack0 192.168.100.0/24 DIRECT 0 0 192.168.100.253 Ethernet0/0 192.168.100.253/32 DIRECT 0 0 127.0.0.1 InLoopBack0 221.193.212.128/27 DIRECT 0 0 221.193.212.152 Ethernet1/1 221.193.212.152/32 DIRECT 0 0 127.0.0.1 InLoopBack0 <HDZXXZ>

组网及组网描述:

防火墙在边界,直连专线光猫

最佳答案

粉丝:24人 关注:0人

设备有重启吗?断网怎么恢复?

一会儿自动恢复,但过一会儿又不行了,断电重启过一次

zhiliao_bnXbm 发表时间:2018-10-16

拔一下网线,再插上也能立即恢复

zhiliao_bnXbm 发表时间:2018-10-16
回复zhiliao_bnXbm:

不通的现象是啥?直连运营商能上吗?

不科学君 发表时间:2018-10-16
回复zhiliao_bnXbm:

能ping通运营商的网关吗?

不科学君 发表时间:2018-10-16

直连运营商可以上,不通时ping 不通运营商的网关,防火墙到专线光猫的网线也换过了

zhiliao_bnXbm 发表时间:2018-10-16
回复不科学君:

直连运营商可以上,不通时ping 不通运营商的网关,防火墙到专线光猫的网线也换过了

zhiliao_bnXbm 发表时间:2018-10-16
回复不科学君:

谢谢大侠,您费心了,麻烦帮忙解决一下

zhiliao_bnXbm 发表时间:2018-10-16
回复zhiliao_bnXbm:

故障的时候,arp表项正常吗?也可以看看会话信息display session table 后面补全你的客户端源地址 verbose

不科学君 发表时间:2018-10-16

[HDZXXZ]display session table ^ % Unrecognized command found at '^' position. [HDZXXZ]

zhiliao_bnXbm 发表时间:2018-10-16

我不太懂防火墙,是个菜鸟,麻烦您了

zhiliao_bnXbm 发表时间:2018-10-16

你的版本号是啥?版本命令可能不一样

不科学君 发表时间:2018-10-16
回复不科学君:

Copyright(c) 2004-2010 Hangzhou H3C Technologies Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * * no decompiling or reverse-engineering shall be allowed.

zhiliao_bnXbm 发表时间:2018-10-16

display version 看看

不科学君 发表时间:2018-10-16
回复不科学君:

H3C Comware Software Comware Software, Version 3.40, Release 1662P07 Copyright (c) 2004-2010, Hangzhou H3C Technologies Co., Ltd. All rights reserved. H3C SecPath F100-A

zhiliao_bnXbm 发表时间:2018-10-16
回复不科学君:

硬件版本 3.0 逻辑版本 1.0 Boot ROM版本 1.19

zhiliao_bnXbm 发表时间:2018-10-16

这个是好老的设备了,这个我也没啥招了,升个版本试试了

不科学君 发表时间:2018-10-16

不敢升,怕彻底不能用了,谢谢您了!

zhiliao_bnXbm 发表时间:2018-10-16
回复不科学君:

请教这里不有高手能解决这个问题吗?怎么找他们?

zhiliao_bnXbm 发表时间:2018-10-16
0 个回答

该问题暂时没有网友解答

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明