最近登陆交换机后,发现有很多ARP相关的攻击信息,以下是从交换机中复制出来的部分攻击信息,请问一下是怎么回事?
<H3C>dis cu # version 5.20, Release 6616P05 # sysname H3C # domain default enable system # loopback-detection enable loopback-detection multi-port-mode enable # mac-authentication # switch-mode standard switch-mode normal slot 5 # time-range test 08:00 to 18:00 working-day # vlan 1 # vlan 10 # vlan 20 # %Jul 4 08:59:20:444 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=2; An attack from MAC 0050-56aa-4af4 was detected on interface GE2/0/1. %Jul 4 08:59:33:828 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=2; An attack from MAC 0050-56aa-6d7e was detected on interface GE2/0/2. %Jul 4 08:59:38:471 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 0025-64a8-f85f was detected on interface GE5/0/3. %Jul 4 08:59:53:525 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC f04d-a224-9fc1 was detected on interface GE5/0/3. %Jul 4 08:59:57:507 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 0025-64a8-f7b6 was detected on interface GE5/0/2. domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool all # dhcp server ip-pool jshm static-bind ip-address 192.168.10.133 mask 255.255.255.0 static-bind mac-address 4061-8630-f2b8 # user-group system # local-user admin password simple admin service-type telnet # interface NULL0 # interface Vlan-interface10 ip address 192.168.10.1 255.255.255.0 # interface Vlan-interface20 ip address 192.168.20.1 255.255.255.0 # interface GigabitEthernet2/0/1 port link-mode bridge port access vlan 10 user-bind ip-address 192.168.10.25 mac-address 0050-56aa-4e6e user-bind ip-address 192.168.10.195 mac-address e41f-13b7-fa98 user-bind ip-address 192.168.10.215 mac-address 0050-56aa-4af4 user-bind ip-address 192.168.10.228 mac-address 0050-56aa-334d # interface GigabitEthernet2/0/2 port link-mode bridge port access vlan 10 user-bind ip-address 192.168.10.5 mac-address 0050-56aa-6d7e user-bind ip-address 192.168.10.221 mac-address e41f-13b7-c914 # interface GigabitEthernet2/0/3 port link-mode bridge port access vlan 10 user-bind ip-address 192.168.10.101 mac-address 0050-568c-5b53 user-bind ip-address 192.168.10.251 mac-address 6cae-8b77-bcec # %Jul 4 09:00:13:722 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 509a-4c25-f9db was detected on interface GE5/0/2. %Jul 4 09:00:44:881 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 0025-64a8-f85f was detected on interface GE5/0/3. %Jul 4 09:00:57:511 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 0025-64a8-f7b6 was detected on interface GE5/0/2. %Jul 4 09:01:03:853 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC c81f-6613-1e45 was detected on interface GE5/0/2. %Jul 4 09:01:18:219 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC 509a-4c25-f9db was detected on interface GE5/0/2. %Jul 4 09:01:44:050 2018 H3C ARP/6/ARP_SRC_MAC_FOUND_ATTACK: -Slot=5; An attack from MAC c03f-d57b-43b8 was detected on interface GE5/0/3. #Jul 4 09:01:54:777 2018 H3C IFNET/1/FLUX EXCEED UPPER LIMIT: -Slot=5; Trap1.3.6.1.4.1.2011.10.2.66.3.1<h3cStormRising> ifnet_index:42991619, table_index:42991619, packet type:3, upper-limit:200 port status:1 %Jul 4 09:01:54:817 2018 H3C IFNET/1/STORM_CONSTRAIN_CONTROLLED: -Slot=5; Gigab itEthernet5/0/4 turned into controlled status, port status is controlled, packet type is UC, upper threshold is 200.
(0)
最佳答案
1、请问需要在攻击源上查什么?怎么查?
2、请问怎么查看我的设备有没有开启ARP攻击防护?
3、请问如果没有开启ARP攻击防护,需要怎么开启呢?
我是小白,请指教,谢谢!
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论