V5版本 5.20.99release111
traffic behavior 1
accounting
做流统怎么敲不出这条命令
(0)
您好,V5是使用包过滤的方式判断丢包,参考
一、 V5平台的MSR/SR66/SR66-X系列路由器对丢包位置的定位使用包过滤防火墙
1.首先全局开启firewall功能:firewall enable;
2.写两条ACL,分别匹配从10.0.0.1到10.0.0.2与从10.0.0.2到10.0.0.1的icmp报文:
acl number 3100
rule 0 permit icmp source 10.0.0.1 0 destination 10.0.0.2 0
acl number 3200
rule 0 permit icmp source 10.0.0.2 0 destination 10.0.0.1 0
3.在G0/0口的出、入方向下应用firewall:
firewall packet-filter 3100 outbound
firewall packet-filter 3200 inbound
4.测试前,先清空G0/0接口的防火墙统计信息:
reset firewall-statistics interface G0/0
5.从SR66路由器ping公网网关10.0.0.2 50个包,然后查看接口统计信息:
display firewall-statistics interface g0/0
<SR66>dis firewall-statistics interface GigabitEthernet 0/0
Interface: GigabitEthernet0/0
In-bound Policy: acl 3200
From 2013-12-14 8:14:09 to 2013-12-14 8:17:00
50 packets, 4200 bytes, 0% permitted,
0 packets, 0 bytes, 0% denied,
421438 packets, 84622789 bytes, 100% permitted default,
0 packets, 0 bytes, 0% denied default,
Totally 421488 packets, 84626989 bytes, 100% permitted,
Totally 0 packets, 0 bytes, 0% denied.
Interface: GigabitEthernet0/0
Out-bound Policy: acl 3100
From 2013-12-14 8:14:09 to 2013-12-14 8:17:00
50 packets, 4200 bytes, 0% permitted,
0 packets, 0 bytes, 0% denied,
553218 packets, 585289690 bytes, 100% permitted default,
0 packets, 0 bytes, 0% denied default,
Totally 553268 packets, 585293890 bytes, 100% permitted,
Totally 0 packets, 0 bytes, 0% denied.
观察上述信息,会有以下两种现象:
1) Out-bound方向的permit报文为0或者不到50个,则证明报文是在SR66路由器内部丢失的,请排查SR66路由器的配置,以及板间转发信息。
2) Out-bound方向的permit报文为50个,但是In-bound方向为0或者不到50个,则证明SR66路由器并没有收到回应报文,报文在线路或者对端设备丢失,请排查公网线路及设备问题。
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论