• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

H3C SecPath F100-A防火墙频繁断网?

2018-10-16提问
  • 1关注
  • 1收藏,2095浏览
粉丝:0人 关注:0人

问题描述:

f100a防火墙,间隔几十分钟就断网,PING 运营商的网关也不通,过5分钟左右自修复又通了,机器比较老版本是:

软件版本 Release 1662P07 硬件版本 3.0 逻辑版本 1.0 Boot ROM版本 1.19。断网时机器的状态是:  

 description WCN_INTERFACE_WAN ip address 221.193.212.152 255.255.255.224 firewall packet-filter 3100 inbound nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/2 # interface NULL0 # firewall zone local set priority 100 # firewall zone trust add interface Ethernet0/0 add interface Ethernet0/1 add interface Ethernet0/2 add interface Ethernet0/3 set priority 85 # firewall zone untrust add interface Ethernet1/0 set priority 5 # firewall zone DMZ set priority 50 # firewall interzone local trust # firewall interzone local untrust # firewall interzone local DMZ # firewall interzone trust untrust # firewall interzone trust DMZ # firewall interzone DMZ untrust # undo info-center enable # ip route-static 0.0.0.0 0.0.0.0 221.193.212.129 preference 60 # firewall defend ip-spoofing firewall defend land firewall defend smurf firewall defend fraggle firewall defend winnuke firewall defend icmp-redirect firewall defend icmp-unreachable firewall defend source-route firewall defend route-record firewall defend tracert firewall defend ping-of-death firewall defend tcp-flag firewall defend ip-fragment firewall defend large-icmp firewall defend teardrop firewall defend ip-sweep firewall defend port-scan firewall defend arp-spoofing firewall defend arp-flood firewall defend frag-flood firewall defend syn-flood enable firewall defend udp-flood enable firewall defend icmp-flood enable # user-interface con 0 user-interface aux 0 user-interface vty 0 4 authentication-mode scheme set authentication password simple admin # return =============================================================== ===============display saved-cOnfiguration=============== =============================================================== # sysname HDZXXZ # firewall packet-filter enable firewall packet-filter default permit # insulate # nat aging-time tcp 3600 nat aging-time udp 180 nat aging-time icmp 10 nat aging-time pptp 300 nat aging-time dns 10 nat aging-time ftp-ctrl 300 nat aging-time tcp-fin 10 nat aging-time tcp-syn 10 nat session refresh-speed level 5 # firewall session aging-time tcp 260 # undo firewall statistic system enable # qos carl 1 source-ip-address range 192.168.100.1 to 192.168.100.27 per-address qos carl 2 source-ip-address range 192.168.100.28 to 192.168.100.40 per-address qos carl 3 source-ip-address range 192.168.100.41 to 192.168.100.88 per-address qos carl 4 source-ip-address range 192.168.100.89 to 192.168.100.234 per-address qos carl 5 source-ip-address range 192.168.100.235 to 192.168.100.254 per-address # firewall mac-binding 192.168.100.30 0026-2d23-f085 firewall mac-binding 192.168.100.31 0026-181c-e5c5 firewall mac-binding 192.168.100.35 001f-e208-7711 firewall mac-binding 192.168.100.39 001e-9042-fff8 firewall mac-binding 192.168.100.40 001e-904f-9cfb firewall mac-binding 192.168.100.41 0022-6879-bc36 firewall mac-binding 192.168.100.42 0022-685f-92d9 firewall mac-binding 192.168.100.43 001e-904f-dc10 firewall mac-binding 192.168.100.44 90fb-a642-6b97 firewall mac-binding 192.168.100.45 0022-685f-927b firewall mac-binding 192.168.100.46 001f-e26b-62ed firewall mac-binding 192.168.100.47 0021-9781-78b4 firewall mac-binding 192.168.100.48 0015-5846-6f46 firewall mac-binding 192.168.100.50 0022-685d-a672 firewall mac-binding 192.168.100.51 0024-8c40-8695 firewall mac-binding 192.168.100.53 0026-181c-e41f firewall mac-binding 192.168.100.54 0025-1183-ebb5 firewall mac-binding 192.168.100.55 0013-d4e4-cf31 firewall mac-binding 192.168.100.57 0024-8c40-80ad firewall mac-binding 192.168.100.59 0021-97ea-c4fa firewall mac-binding 192.168.100.61 d027-886a-f824 firewall mac-binding 192.168.100.62 001e-904f-1321 firewall mac-binding 192.168.100.65 0016-960d-6fbb firewall mac-binding 192.168.100.66 0026-181c-e664 firewall mac-binding 192.168.100.67 0025-1183-ebb3 firewall mac-binding 192.168.100.68 0011-5b0a-e789 firewall mac-binding 192.168.100.86 0022-687a-01e9 firewall mac-binding 192.168.100.92 0016-ec82-72d5 firewall mac-binding 192.168.100.93 0025-114c-f2fa firewall mac-binding 192.168.100.98 001e-904f-deef firewall mac-binding 192.168.100.99 4487-fcd2-aa45 firewall mac-binding 192.168.100.171 0001-6c1b-b3e9 firewall mac-binding 192.168.100.172 90fb-a690-1218 firewall mac-binding 192.168.100.201 00e0-6f05-7483 firewall mac-binding 192.168.100.239 001e-0bd6-dad0 firewall mac-binding 192.168.100.240 b499-baba-627c firewall mac-binding 192.168.100.242 b499-baba-627c firewall mac-binding 192.168.100.245 0024-acc9-6ae7 firewall mac-binding 192.168.100.251 001c-c4da-d7bc # DNS-proxy enable # radius scheme system server-type extended # domain system # local-user admin password simple hdszxxz00506# service-type telnet level 3 # acl number 2000 rule 0 permit rule 1 permit source 192.0.0.0 0.255.255.255 acl number 2001 rule 0 permit # acl number 3000 rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.100.251 0 acl number 3100 rule 0 deny tcp destination-port eq 445 rule 1 deny tcp destination-port eq 139 rule 2 permit ip # acl name www # interface Aux0 async mode flow # interface Ethernet0/0 description WCN_INTERFACE_LAN ip address 192.168.100.253 255.255.255.0 nat outbound 3000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 qos car inbound carl 2 cir 8192000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 3 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 4 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 5 cir 5120000 cbs 500000 ebs 0 green pass red discard qos car inbound carl 1 cir 2048000 cbs 500000 ebs 0 green pass red discard qos car outbound carl 4 cir 10000000 cbs 10000000 ebs 10000000 green pass red discard qos car outbound carl 6 cir 5000000 cbs 5000000 ebs 5000000 green pass red discard qos car outbound carl 8 cir 40000000 cbs 40000000 ebs 40000000 green pass red discard # interface Ethernet0/1 # interface Ethernet0/2 # interface Ethernet0/3 # interface Ethernet1/0 description WCN_INTERFACE_WAN nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/1 description WCN_INTERFACE_WAN ip address 221.193.212.152 255.255.255.224 firewall packet-filter 3100 inbound nat outbound 2000 nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www # interface Ethernet1/2 # interface NULL0 # firewall zone local set priority 100 # firewall zone trust add interface Ethernet0/0 add interface Ethernet0/1 add interface Ethernet0/2 add interface Ethernet0/3 set priority 85 # firewall zone untrust add interface Ethernet1/0 set priority 5 # firewall zone DMZ set priority 50 # firewall interzone local trust # firewall interzone local untrust # firewall interzone local DMZ # firewall interzone trust untrust # firewall interzone trust DMZ # firewall interzone DMZ untrust # undo info-center enable # ip route-static 0.0.0.0 0.0.0.0 221.193.212.129 preference 60 # firewall defend ip-spoofing firewall defend land firewall defend smurf firewall defend fraggle firewall defend winnuke firewall defend icmp-redirect firewall defend icmp-unreachable firewall defend source-route firewall defend route-record firewall defend tracert firewall defend ping-of-death firewall defend tcp-flag firewall defend ip-fragment firewall defend large-icmp firewall defend teardrop firewall defend ip-sweep firewall defend port-scan firewall defend arp-spoofing firewall defend arp-flood firewall defend frag-flood firewall defend syn-flood enable firewall defend udp-flood enable firewall defend icmp-flood enable # user-interface con 0 user-interface aux 0 user-interface vty 0 4 authentication-mode scheme set authentication password simple admin # return ===================================================== ===============display interface=============== ===================================================== Aux0 current state :DOWN Line protocol current state :UP (spoofing) Description : Aux0 Interface The Maximum Transmit Unit is 1500 Internet protocol processing : disabled Data drive mode: flow Last 300 seconds input: 0.0 bytes/sec, 0.0 packets/sec Last 300 seconds output: 0.0 bytes/sec, 0.0 packets/sec 0 packets input, 0 bytes 0 packets output, 72 bytes error: Parity 0, Frame 0, Overrun 0, FIFO 0 DCD=DOWN DTR=UP DSR=DOWN RTS=UP CTS=DOWN Ethernet0/0 current state :UP Line protocol current state :UP Description : WCN_INTERFACE_LAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet Address is 192.168.100.253/24 IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set 100Mb/s, Full-duplex, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 356409.55 bytes/sec, 2851269 bits/sec, 398.53 packets/sec Last 300 seconds output rate 151249.60 bytes/sec, 1209989 bits/sec, 255.28 packets/sec Input: 247801784 packets, 3472463141 bytes, 247801784 buffers 1173407 broadcasts, 694546 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:263500454 packets, 1724614769 bytes, 263500477 buffers 14752 broadcasts, 0 multicasts, 0 pauses 4 errors, 4 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/1 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/1 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/2 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/2 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet0/3 current state :DOWN Line protocol current state :DOWN Description : Ethernet0/3 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d68 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet1/0 current state :DOWN Line protocol current state :DOWN Description : WCN_INTERFACE_WAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d65 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers Ethernet1/1 current state :UP Line protocol current state :UP Description : WCN_INTERFACE_WAN The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet Address is 221.193.212.152/27 IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d66 Media type is twisted pair, loopback not set, promiscuous mode not set 100Mb/s, Full-duplex, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/372711 Last clearing of counters: Never Last 300 seconds input rate 150519.23 bytes/sec, 1204154 bits/sec, 256.56 packets/sec Last 300 seconds output rate 340708.68 bytes/sec, 2725662 bits/sec, 382.52 packets/sec Input: 267186061 packets, 2613536739 bytes, 267186061 buffers 82308 broadcasts, 0 multicasts, 0 pauses 1814 errors, 1 runts, 0 giants 100 crc, 4 align errors, 1709 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:240513616 packets, 2415942285 bytes, 240513616 buffers 39 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 2130 lost carriers Ethernet1/2 current state :DOWN Line protocol current state :DOWN Description : Ethernet1/2 Interface The Maximum Transmit Unit is 1500, Hold timer is 10(sec) Internet protocol processing : disabled IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 3ce5-a6ce-3d67 Media type is twisted pair, loopback not set, promiscuous mode not set Speed Negotiation, Duplex Negotiation, link type is autonegotiation Output flow-control is disabled, input flow-control is disabled Output queue : (Urgent queuing : Size/Length/Discards) 0/50/0 Output queue : (Protocol queuing : Size/Length/Discards) 0/500/0 Output queue : (FIFO queuing : Size/Length/Discards) 0/75/0 Last clearing of counters: Never Last 300 seconds input rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Last 300 seconds output rate 0.00 bytes/sec, 0 bits/sec, 0.00 packets/sec Input: 0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 runts, 0 giants 0 crc, 0 align errors, 0 overruns 0 dribbles, 0 drops, 0 no buffers 0 frame errors Output:0 packets, 0 bytes, 0 buffers 0 broadcasts, 0 multicasts, 0 pauses 0 errors, 0 underruns, 0 collisions 0 deferred, 0 lost carriers NULL0 current state :UP Line protocol current state :UP (spoofing) Description : NULL0 Interface The Maximum Transmit Unit is 1500 Internet protocol processing : disabled Physical is NULL DEV Last 300 seconds input: 0 bytes/sec 0 packets/sec Last 300 seconds output: 0 bytes/sec 0 packets/sec 0 packets input, 0 bytes, 0 drops 0 packets output, 0 bytes, 0 drops ====================================================== ===============display cOntroller=============== ====================================================== ^ % Unrecognized command found at '^' position. ======================================================== ===============display ip interface=============== ======================================================== Ethernet0/0 current state :UP Line protocol current state :UP Internet Address is 192.168.100.253/24 Broadcast address : 192.168.100.255 The Maximum Transmit Unit : 1500 bytes ip fast-forwarding incoming packets state is Enabled ip fast-forwarding outgoing packets state is Enabled IP packets input number: 246797893, bytes: 4225277713, multicasts: 414045 IP packets output number: 263368753, bytes: 2277307286, multicasts: 0 ARP packets input number: 529380 Request packet: 520486 Reply packet: 8894 Unknown packet: 0 TTL invalid packet number: 507 ICMP packet input number: 2064 Echo reply: 0 Unreachable: 139 Source quench: 0 Routing redirect: 0 Echo request: 1925 Router advert: 0 Router solicit: 0 Time exceed: 0 IP header bad: 0 Timestamp request: 0 Timestamp reply: 0 Information request: 0 Information reply: 0 Netmask request: 0 Netmask reply: 0 Unknown type: 0 DHCP packet deal mode: global Ethernet1/1 current state :UP Line protocol current state :UP Internet Address is 221.193.212.152/27 Broadcast address : 221.193.212.159 The Maximum Transmit Unit : 1500 bytes ip fast-forwarding incoming packets state is Enabled ip fast-forwarding outgoing packets state is Enabled IP packets input number: 267787075, bytes: 3772230300, multicasts: 0 IP packets output number: 240886011, bytes: 3082155477, multicasts: 0 ARP packets input number: 76690 Request packet: 76680 Reply packet: 10 Unknown packet: 0 TTL invalid packet number: 214 ICMP packet input number: 24057 Echo reply: 16 Unreachable: 8028 Source quench: 4 Routing redirect: 3 Echo request: 15831 Router advert: 0 Router solicit: 0 Time exceed: 174 IP header bad: 0 Timestamp request: 1 Timestamp reply: 0 Information request: 0 Information reply: 0 Netmask request: 0 Netmask reply: 0 Unknown type: 0 DHCP packet deal mode: global ========================================================= ===============display ip statistics=============== ========================================================= Input: sum 513325528 local 3988436 bad protocol 11 bad format 1857 bad checksum 0 bad options 0 Output: forwarding 501191529 local 3674256 dropped 0 no route 26097 compress fails 0 Fragment:input 1823 output 0 dropped 0 fragmented 0 couldn't fragment 0 Reassembling:sum 0 timeouts 1823 ===================================================== ===============display logbuffer=============== ===================================================== Logging buffer configuration and contents:enabled Allowed max buffer size : 1024 Actual buffer size : 512 Channel number : 4 , Channel name : logbuffer Dropped messages : 0 Overwritten messages : 0 Current messages : 181 %Oct 10 15:11:27:333 2018 HDZXXZ IC/6/SYS_RESTART: System restarted -- H3C Comware Software %Oct 10 15:11:30:907 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Aux0 %Oct 10 15:11:30:907 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/0 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/1 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/2 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/3 %Oct 10 15:11:30:908 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/0 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/1 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/2 %Oct 10 15:11:30:909 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface NULL0 %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:sysname HDZXXZ %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter enable %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter default permit %Oct 10 15:11:30:910 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:insulate %Oct 10 15:11:30:910 2018 HDZXXZ HTTPD/4/Log:Starting HTTP server. %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp 3600 %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time udp 180 %Oct 10 15:11:30:911 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time icmp 10 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time pptp 300 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time dns 10 %Oct 10 15:11:30:912 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time ftp-ctrl 300 %Oct 10 15:11:30:021 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp-fin 10 %Oct 10 15:11:30:021 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat aging-time tcp-syn 10 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat session refresh-speed level 5 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall session aging-time tcp 260 %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:undo firewall statistic system enable %Oct 10 15:11:30:022 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 1 source-ip-address range 192.168.100.1 to 192.168.100.27 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 2 source-ip-address range 192.168.100.28 to 192.168.100.40 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 3 source-ip-address range 192.168.100.41 to 192.168.100.88 per-address %Oct 10 15:11:30:023 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 4 source-ip-address range 192.168.100.89 to 192.168.100.234 per-address %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos carl 5 source-ip-address range 192.168.100.235 to 192.168.100.254 per-address %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.30 0026-2d23-f085 %Oct 10 15:11:30:024 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.30;bindMacAddr(1030)=00-26-2d-23-f0-85 %Oct 10 15:11:30:024 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.31 0026-181c-e5c5 %Oct 10 15:11:30:025 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.31;bindMacAddr(1030)=00-26-18-1c-e5-c5 %Oct 10 15:11:30:025 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.35 001f-e208-7711 %Oct 10 15:11:30:025 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.35;bindMacAddr(1030)=00-1f-e2-08-77-11 %Oct 10 15:11:30:026 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.39 001e-9042-fff8 %Oct 10 15:11:30:026 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.39;bindMacAddr(1030)=00-1e-90-42-ff-f8 %Oct 10 15:11:30:026 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.40 001e-904f-9cfb %Oct 10 15:11:30:027 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.40;bindMacAddr(1030)=00-1e-90-4f-9c-fb %Oct 10 15:11:30:042 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.41 0022-6879-bc36 %Oct 10 15:11:30:042 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.41;bindMacAddr(1030)=00-22-68-79-bc-36 %Oct 10 15:11:30:043 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.42 0022-685f-92d9 %Oct 10 15:11:30:043 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.42;bindMacAddr(1030)=00-22-68-5f-92-d9 %Oct 10 15:11:30:043 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.43 001e-904f-dc10 %Oct 10 15:11:30:044 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.43;bindMacAddr(1030)=00-1e-90-4f-dc-10 %Oct 10 15:11:30:044 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.44 90fb-a642-6b97 %Oct 10 15:11:30:044 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.44;bindMacAddr(1030)=90-fb-a6-42-6b-97 %Oct 10 15:11:30:045 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.45 0022-685f-927b %Oct 10 15:11:30:045 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.45;bindMacAddr(1030)=00-22-68-5f-92-7b %Oct 10 15:11:30:045 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.46 001f-e26b-62ed %Oct 10 15:11:30:045 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.46;bindMacAddr(1030)=00-1f-e2-6b-62-ed %Oct 10 15:11:30:046 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.47 0021-9781-78b4 %Oct 10 15:11:30:046 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.47;bindMacAddr(1030)=00-21-97-81-78-b4 %Oct 10 15:11:30:046 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.48 0015-5846-6f46 %Oct 10 15:11:30:047 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.48;bindMacAddr(1030)=00-15-58-46-6f-46 %Oct 10 15:11:30:047 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.50 0022-685d-a672 %Oct 10 15:11:30:047 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.50;bindMacAddr(1030)=00-22-68-5d-a6-72 %Oct 10 15:11:30:048 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.51 0024-8c40-8695 %Oct 10 15:11:30:048 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.51;bindMacAddr(1030)=00-24-8c-40-86-95 %Oct 10 15:11:31:062 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.53 0026-181c-e41f %Oct 10 15:11:31:063 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.53;bindMacAddr(1030)=00-26-18-1c-e4-1f %Oct 10 15:11:31:063 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.54 0025-1183-ebb5 %Oct 10 15:11:31:064 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.54;bindMacAddr(1030)=00-25-11-83-eb-b5 %Oct 10 15:11:31:064 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.55 0013-d4e4-cf31 %Oct 10 15:11:31:064 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.55;bindMacAddr(1030)=00-13-d4-e4-cf-31 %Oct 10 15:11:31:064 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.57 0024-8c40-80ad %Oct 10 15:11:31:065 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.57;bindMacAddr(1030)=00-24-8c-40-80-ad %Oct 10 15:11:31:065 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.59 0021-97ea-c4fa %Oct 10 15:11:31:065 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.59;bindMacAddr(1030)=00-21-97-ea-c4-fa %Oct 10 15:11:31:066 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.61 d027-886a-f824 %Oct 10 15:11:31:066 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.61;bindMacAddr(1030)=d0-27-88-6a-f8-24 %Oct 10 15:11:31:066 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.62 001e-904f-1321 %Oct 10 15:11:31:067 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.62;bindMacAddr(1030)=00-1e-90-4f-13-21 %Oct 10 15:11:31:067 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.65 0016-960d-6fbb %Oct 10 15:11:31:067 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.65;bindMacAddr(1030)=00-16-96-0d-6f-bb %Oct 10 15:11:31:067 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.66 0026-181c-e664 %Oct 10 15:11:31:068 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.66;bindMacAddr(1030)=00-26-18-1c-e6-64 %Oct 10 15:11:31:068 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.67 0025-1183-ebb3 %Oct 10 15:11:31:068 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.67;bindMacAddr(1030)=00-25-11-83-eb-b3 %Oct 10 15:11:31:083 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.68 0011-5b0a-e789 %Oct 10 15:11:31:083 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.68;bindMacAddr(1030)=00-11-5b-0a-e7-89 %Oct 10 15:11:31:084 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.86 0022-687a-01e9 %Oct 10 15:11:31:084 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.86;bindMacAddr(1030)=00-22-68-7a-01-e9 %Oct 10 15:11:31:084 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.92 0016-ec82-72d5 %Oct 10 15:11:31:085 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.92;bindMacAddr(1030)=00-16-ec-82-72-d5 %Oct 10 15:11:31:085 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.93 0025-114c-f2fa %Oct 10 15:11:31:085 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.93;bindMacAddr(1030)=00-25-11-4c-f2-fa %Oct 10 15:11:31:085 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.98 001e-904f-deef %Oct 10 15:11:31:086 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.98;bindMacAddr(1030)=00-1e-90-4f-de-ef %Oct 10 15:11:31:086 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.99 4487-fcd2-aa45 %Oct 10 15:11:31:086 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.99;bindMacAddr(1030)=44-87-fc-d2-aa-45 %Oct 10 15:11:31:087 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.171 0001-6c1b-b3e9 %Oct 10 15:11:31:087 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.171;bindMacAddr(1030)=00-01-6c-1b-b3-e9 %Oct 10 15:11:31:087 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.172 90fb-a690-1218 %Oct 10 15:11:31:088 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.172;bindMacAddr(1030)=90-fb-a6-90-12-18 %Oct 10 15:11:31:088 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.201 00e0-6f05-7483 %Oct 10 15:11:31:088 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.201;bindMacAddr(1030)=00-e0-6f-05-74-83 %Oct 10 15:11:31:088 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.239 001e-0bd6-dad0 %Oct 10 15:11:31:089 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.239;bindMacAddr(1030)=00-1e-0b-d6-da-d0 %Oct 10 15:11:31:471 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.240 b499-baba-627c %Oct 10 15:11:31:472 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.240;bindMacAddr(1030)=b4-99-ba-ba-62-7c %Oct 10 15:11:31:472 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.242 b499-baba-627c %Oct 10 15:11:31:472 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.242;bindMacAddr(1030)=b4-99-ba-ba-62-7c %Oct 10 15:11:31:473 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.245 0024-acc9-6ae7 %Oct 10 15:11:31:473 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.245;bindMacAddr(1030)=00-24-ac-c9-6a-e7 %Oct 10 15:11:31:473 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall mac-binding 192.168.100.251 001c-c4da-d7bc %Oct 10 15:11:31:474 2018 HDZXXZ SEC/4/MACBIND:bindOptMode(1029)=add;bindIPAddr(1031)=192.168.100.251;bindMacAddr(1030)=00-1c-c4-da-d7-bc %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:DNS-proxy enable %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:radius scheme system %Oct 10 15:11:31:474 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:server-type extended %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:domain system %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:local-user admin %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:password simple ****** %Oct 10 15:11:31:475 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:service-type telnet %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:level 3 %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 2000 %Oct 10 15:11:31:476 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit %Oct 10 15:11:31:477 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 1 permit source 192.0.0.0 0.255.255.255 %Oct 10 15:11:31:477 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 2001 %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 3000 %Oct 10 15:11:31:752 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.100.251 0 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl number 3100 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 0 deny tcp destination-port eq 445 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 1 deny tcp destination-port eq 139 %Oct 10 15:11:31:753 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:rule 2 permit ip %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:acl name www %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Aux0 %Oct 10 15:11:31:754 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:async mode flow %Oct 10 15:11:31:754 2018 HDZXXZ PHY/1/PHY: Aux0: already in flow mode %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/0 %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_LAN %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:ip address 192.168.100.253 255.255.255.0 %Oct 10 15:11:31:755 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 3000 %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 2 cir 8192000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:31:756 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 3 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:31:757 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 4 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:133 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 5 cir 5120000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car inbound carl 1 cir 2048000 cbs 500000 ebs 0 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 4 cir 10000000 cbs 10000000 ebs 10000000 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 6 cir 5000000 cbs 5000000 ebs 5000000 green pass red discard %Oct 10 15:11:32:134 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:qos car outbound carl 8 cir 40000000 cbs 40000000 ebs 40000000 green pass red discard %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/1 %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/2 %Oct 10 15:11:32:135 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet0/3 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/0 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_WAN %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 2000 %Oct 10 15:11:32:136 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:32:137 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/1 %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:description WCN_INTERFACE_WAN %Oct 10 15:11:32:138 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:ip address 221.193.212.152 255.255.255.224 %Oct 10 15:11:32:139 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall packet-filter 3100 inbound %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat outbound 2000 %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 www inside 192.168.100.251 www %Oct 10 15:11:32:206 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8888 inside 192.168.100.245 www %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8080 inside 192.168.100.242 8080 %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 3389 inside 192.168.100.239 3389 %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:nat server protocol tcp global 221.193.212.152 8088 inside 192.168.100.239 www %Oct 10 15:11:32:207 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface Ethernet1/2 %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:interface NULL0 %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone local %Oct 10 15:11:32:208 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 100 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone trust %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/0 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/1 %Oct 10 15:11:32:209 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/2 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet0/3 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 85 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone untrust %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet1/0 %Oct 10 15:11:32:211 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:set priority 5 %Oct 10 15:11:32:211 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:firewall zone DMZ ============================================================ ===============display ip routing-table=============== ============================================================ Routing Table: public net Destination/Mask Protocol Pre Cost Nexthop Interface 0.0.0.0/0 STATIC 60 0 221.193.212.129 Ethernet1/1 127.0.0.0/8 DIRECT 0 0 127.0.0.1 InLoopBack0 127.0.0.1/32 DIRECT 0 0 127.0.0.1 InLoopBack0 192.168.100.0/24 DIRECT 0 0 192.168.100.253 Ethernet0/0 192.168.100.253/32 DIRECT 0 0 127.0.0.1 InLoopBack0 221.193.212.128/27 DIRECT 0 0 221.193.212.152 Ethernet1/1 221.193.212.152/32 DIRECT 0 0 127.0.0.1 InLoopBack0 <HDZXXZ>

最佳答案

粉丝:5人 关注:1人


hi!上不去网的原因较多,建议先通过日志信息排查下断网原因,先看下是否是由于接口物理up down引起的断网,还是由于其他原因导致(网络攻击、是否是拨号ip等)再进一步来定位原因

您好您能看到随问题发的文件吗?帮忙看一下,里面是日志

zhiliao_bnXbm 发表时间:2018-10-16

防火墙日志统计信息概览 当前页:页总数: 项总数: 页面大小 « 1 2 » 攻击类型 攻击次数 IP-sweep 0 Large-icmp 0 Source-route attack 0 Route-record attack 0 ARP-spoofing 514372 ARP-flood 17 Frag-flood 0 TCP port-scan 0 UDP port-scan 0 Other attack 0 total 514389 防火墙日志统计信息概览 当前页:页总数: 项总数: 页面大小 « 1 2 » 攻击类型 攻击次数 IP-sweep 0 Large-icmp 0 Source-route attack 0 Route-record attack 0 ARP-spoofing 514372 ARP-flood 17 Frag-flood 0 TCP port-scan 0 UDP port-scan 0 Other attack 0 total 514389

zhiliao_bnXbm 发表时间:2018-10-16

看了下日志里有ARP攻击

zhiliao_bnXbm 发表时间:2018-10-16

您好,怎么判断是不是由物理接口up down引起的断网

zhiliao_bnXbm 发表时间:2018-10-17

物理接口up down设备会有日志高进 提示接口up down 您可在业务断开前后收集logbuff信息来判断

板凳儿 发表时间:2018-10-17

设备的logbuff里面有较多自动执行的命令 %Oct 10 15:11:32:210 2018 HDZXXZ SHELL/4/CMD:task:CFM ip:** user:** command:add interface Ethernet1/0 ,也不能排除是软件问题,如无物理接口up down情况,以及丢包是发生在防火墙上,建议联系400协助处理。

板凳儿 发表时间:2018-10-17
0 个回答

该问题暂时没有网友解答

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明