• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

7003E网络时断时续

2024-03-20提问
  • 0关注
  • 0收藏,194浏览
夜见 三段
粉丝:3人 关注:12人

问题描述:

 

 

客户7003E重启后出现某个时间某个网段会断几秒,然后恢复正常,查看了配置也没啥问题,查看了交换机日志也没有显示错误信息,这个有可能是什么导致的?配置文件在下面

 

#

 version 7.1.070, Release 7585P05

#

 sysname Core_SW

#

 telnet server enable

#

 forward-path-detection enable

#

 irf mode normal

#

 dhcp enable

 dhcp server forbidden-ip 172.24.1.1 172.24.1.50

 dhcp server forbidden-ip 172.24.2.1 172.24.2.50

 dhcp server forbidden-ip 172.24.3.1 172.24.3.50

 dhcp server forbidden-ip 172.24.4.1 172.24.4.50

 dhcp server forbidden-ip 172.24.5.1 172.24.5.50

 dhcp server forbidden-ip 172.24.6.1 172.24.6.50

 dhcp server forbidden-ip 172.24.7.1 172.24.7.50

 dhcp server forbidden-ip 172.24.8.1 172.24.8.50

 dhcp server forbidden-ip 172.24.9.1 172.24.9.50

 dhcp server forbidden-ip 172.24.10.1 172.24.10.50

 dhcp server forbidden-ip 172.24.11.1 172.24.11.50

 dhcp server forbidden-ip 172.24.14.1 172.24.14.50

 dhcp server forbidden-ip 172.24.15.1 172.24.15.10

 dhcp server forbidden-ip 172.24.16.1 172.24.16.50

 dhcp server forbidden-ip 172.24.17.1 172.24.17.50

#

 dhcp snooping enable

#

 dns server 10.220.144.10

 dns server 10.210.144.10

#

 mirroring-group 1 local

#

 lldp global enable

#

 system-working-mode standard

 password-recovery enable

#

vlan 1

#

vlan 2

#

vlan 11 to 22

#

vlan 24

#

vlan 26 to 28

#

vlan 100

#

vlan 200

#

traffic classifier 1 operator and

 if-match acl 3000

#

traffic classifier 2 operator and

 if-match acl 3002

#

traffic behavior 1

 filter deny

#

traffic behavior 2

 filter permit

#

qos policy guo

 classifier 1 behavior 1

 classifier 2 behavior 2

#

 stp global enable

#

ftth

#

dhcp server ip-pool chejian&fuliaoku

 gateway-list 172.24.4.1

 network 172.24.4.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool erqibangongshi

 gateway-list 172.24.7.1

 network 172.24.7.0 mask 255.255.255.0

 dns-list 10.210.144.10

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool erqichejian

 gateway-list 172.24.8.1

 network 172.24.8.0 mask 255.255.255.0

 dns-list 10.210.144.10

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool erqigongying

 gateway-list 172.24.11.1

 network 172.24.11.0 mask 255.255.255.0

 dns-list 10.210.144.10

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool erqiwuliu

 gateway-list 172.24.10.1

 network 172.24.10.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool naiyuan&huayan

 gateway-list 172.24.3.1

 network 172.24.3.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool office

 gateway-list 172.24.2.1

 network 172.24.2.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool waiwei

 gateway-list 172.24.6.1

 network 172.24.6.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool wifi

 gateway-list 172.24.15.1

 network 172.24.15.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 expired day 0 hour 2

#

dhcp server ip-pool wifi2

 gateway-list 172.24.12.1

 network 172.24.12.0 mask 255.255.254.0

 dns-list 10.210.144.10 202.100.96.68

 expired day 0 hour 1

#

dhcp server ip-pool wuliu

 gateway-list 172.24.5.1

 network 172.24.5.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180014

#

dhcp server ip-pool xingzheng

 gateway-list 172.24.1.1

 network 172.24.1.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

dhcp server ip-pool xingzheng2

 gateway-list 172.24.9.1

 network 172.24.9.0 mask 255.255.255.0

 dns-list 10.210.144.10 202.100.96.68

 option 43 hex 8007000001ac180013

#

interface NULL0

#

interface Vlan-interface1

 ip address 10.1.1.2 255.255.255.0

 arp send-gratuitous-arp

#

interface Vlan-interface2

#

interface Vlan-interface11

 ip address 172.24.1.1 255.255.255.0

#

interface Vlan-interface12

 ip address 172.24.2.1 255.255.255.0

#

interface Vlan-interface13

 ip address 172.24.3.1 255.255.255.0

#

interface Vlan-interface14

 ip address 172.24.4.1 255.255.255.0

#

interface Vlan-interface15

 ip address 172.24.5.1 255.255.255.0

#

interface Vlan-interface16

 ip address 172.24.6.1 255.255.255.0

#

interface Vlan-interface17

 ip address 172.24.7.1 255.255.255.0

#

interface Vlan-interface18

 ip address 172.24.8.1 255.255.255.0

#

interface Vlan-interface19

 ip address 172.24.9.1 255.255.255.0

#

interface Vlan-interface20

 ip address 172.24.10.1 255.255.255.0

#

interface Vlan-interface21

 ip address 172.24.11.1 255.255.255.0

#

interface Vlan-interface22

 ip address 172.24.12.1 255.255.254.0

#

interface Vlan-interface100

 ip address 172.24.0.1 255.255.255.0

#

interface Vlan-interface200

 ip address 172.24.200.1 255.255.255.0

#

interface GigabitEthernet0/0/20

 port link-mode route

 ip address 10.255.255.1 255.255.255.252

#

interface GigabitEthernet0/0/1

 port link-mode bridge

 description To-WangZhenX20

 port access vlan 21

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/2

 port link-mode bridge

 description To-YiDongWangZhen

 port access vlan 21

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/3

 port link-mode bridge

 description To-FireWall

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/4

 port link-mode bridge

 description To-Print-Server

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/5

 port link-mode bridge

 description AC

 port link-type trunk

 port trunk permit vlan 1 to 199 201 to 4094

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/6

 port link-mode bridge

 description To-Sanfor

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/7

 port link-mode bridge

 description To-New-WIFI

 port link-type trunk

 port trunk permit vlan all

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/8

 port link-mode bridge

 description To-DongMen-DaoZha

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface GigabitEthernet0/0/9

 port link-mode bridge

 port access vlan 19

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/10

 port link-mode bridge

 description To-BeiMen-DaoZha-10.7

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/11

 port link-mode bridge

 description To-YuChuLi-YuanCheng

 port access vlan 11

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/12

 port link-mode bridge

 description To-BeiMen-DaoZha-10.9

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/13

 port link-mode bridge

 description To-R740-Server

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/14

 port link-mode bridge

 description To-JiFangWiFi

 port access vlan 11

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/15

 port link-mode bridge

 description CeShi-HuaFang

 port link-type trunk

 port trunk permit vlan 1 11 to 23 100

 port trunk pvid vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/16

 port link-mode bridge

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/17

 port link-mode bridge

 description Ceshi

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/18

 port link-mode bridge

 description ceshi

 port link-type trunk

 port trunk permit vlan all

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/19

 port link-mode bridge

 description Ceshi

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/21

 port link-mode bridge

 description NAS-1-Xingzheng

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/22

 port link-mode bridge

 description NAS-2-Other

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/23

 port link-mode bridge

 description To-AC-ETH0

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet0/0/24

 port link-mode bridge

 port access vlan 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/1

 port link-mode bridge

 description To-Naiyuan-Office

 port access vlan 13

 packet-filter 3000 inbound

 mirroring-group 1 mirroring-port both

 qos apply policy guo inbound

#

interface GigabitEthernet1/0/2

 port link-mode bridge

 description To-Erqi-Office

 port access vlan 17

 packet-filter 3000 inbound

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/3

 port link-mode bridge

 description To-DaBanGongShi

 port access vlan 19

 packet-filter 3000 inbound

 mirroring-group 1 mirroring-port both

 qos apply policy guo inbound

#

interface GigabitEthernet1/0/4

 port link-mode bridge

 description To-WangZhenHuiYiShi

 port access vlan 21

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/5

 port link-mode bridge

 description To-JiFang-0DuanSW

 port link-type trunk

 port trunk permit vlan 1 11 to 12 16 19 24 26 to 28 100

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/6

 port link-mode bridge

 description To-Yiqi-Huayan

 port access vlan 13

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/7

 port link-mode bridge

 description To-YuanNai-HuanYan

 port access vlan 13

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/8

 port link-mode bridge

 description To-BeiJianKu

 port access vlan 14

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/9

 port link-mode bridge

 description To-Waiwei

 port access vlan 16

 packet-filter 3000 inbound

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface GigabitEthernet1/0/10

 port link-mode bridge

 description To-WuLiu

 port access vlan 12

 packet-filter 3000 inbound

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/11

 port link-mode bridge

 description To-YuanNaiJianYan-Wangluo

 port access vlan 18

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/12

 port link-mode bridge

 description To-GongYing-Office

 port access vlan 11

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/13

 port link-mode bridge

 description To-ErQiWuShuiChang

 port access vlan 16

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/14

 port link-mode bridge

 description To-ErQi-WuLiu

 port access vlan 18

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/15

 port link-mode bridge

 description To-PeiLiaoJian

 port access vlan 14

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/16

 port link-mode bridge

 description To-CanTingXiaoFeiJi

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface GigabitEthernet1/0/17

 port link-mode bridge

 description To-PeiXunShi

 port access vlan 11

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/18

 port link-mode bridge

 description To-PET-Wangluo

 port access vlan 13

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/19

 port link-mode bridge

 description To-CanTing-WangLuo

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface GigabitEthernet1/0/20

 port link-mode bridge

 description To-WuShuiChang

 port access vlan 16

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/21

 port link-mode bridge

 description To-GuoLuFang-WangLuo

 port access vlan 16

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/22

 port link-mode bridge

 description To-BaoZhuangJian-Network

 port access vlan 16

 mirroring-group 1 mirroring-port both

#

interface GigabitEthernet1/0/23

 port link-mode bridge

 description To-ShouNaiGuangChang-WangLuo

 port link-type trunk

 port trunk permit vlan all

#

interface GigabitEthernet1/0/24

 port link-mode bridge

 description To-WaiWei

 port access vlan 16

 mirroring-group 1 mirroring-port both

#

interface M-GigabitEthernet0/0/0

#

interface Ten-GigabitEthernet0/0/25

 port link-mode bridge

 mirroring-group 1 mirroring-port both

#

interface Ten-GigabitEthernet0/0/26

 port link-mode bridge

 mirroring-group 1 mirroring-port both

#

interface Ten-GigabitEthernet0/0/27

 port link-mode bridge

 port access vlan 100

 mirroring-group 1 monitor-port

#

interface Ten-GigabitEthernet0/0/28

 port link-mode bridge

#

interface Ten-GigabitEthernet1/0/25

 port link-mode bridge

 description To-BeiMenJingJingShi

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface Ten-GigabitEthernet1/0/26

 port link-mode bridge

 description To-CaiYangGuangChang-WangLuo

 port access vlan 13

 mirroring-group 1 mirroring-port both

#

interface Ten-GigabitEthernet1/0/27

 port link-mode bridge

 description To-BeiMenXiaoFang

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

interface Ten-GigabitEthernet1/0/28

 port link-mode bridge

 description To-NaiTaiZhongKong

 port access vlan 16

 mirroring-group 1 mirroring-port both

 dhcp snooping trust

#

 scheduler logfile size 16

#

line class aux

 user-role network-admin

#

line class vty

 user-role network-operator

#

line aux 0 1

 user-role network-admin

#

line vty 0

 authentication-mode scheme

 user-role level-15

 user-role level-3

 user-role network-operator

 protocol inbound ssh

#

line vty 1 4

 authentication-mode scheme

 user-role level-3

 user-role network-operator

 protocol inbound ssh

#

line vty 5 63

 user-role network-operator

#

 ip route-static 0.0.0.0 0 10.1.1.1

 ip route-static 10.1.0.0 21 10.1.1.1

 ip route-static 10.10.16.0 24 10.10.16.2

 ip route-static 172.24.0.0 16 10.1.1.4

#

 undo info-center enable

 info-center loghost 172.24.0.16

 info-center source default loghost level debugging

#

 snmp-agent

 snmp-agent local-engineid 800063A2033CE5A6CFD764

 snmp-agent community read arp

 snmp-agent community read public

 snmp-agent community read s7503e

 snmp-agent sys-info version all

 snmp-agent target-host inform address udp-domain 172.24.0.21 udp-port 161 params securityname pubilc v2c

 snmp-agent trap enable arp

 snmp-agent trap enable radius

 snmp-agent trap enable stp

 snmp-agent trap enable syslog

#

 ssh server enable

#

acl number 3000

 rule 1 deny ip source 172.24.6.54 0

 rule 2 deny ip destination 172.24.6.54 0

 rule 5 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 10 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 15 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 20 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 25 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 30 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 35 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 40 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 45 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 50 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 55 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 60 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 65 deny ip source 172.24.1.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 70 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 75 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 80 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 85 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 90 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 95 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 100 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 105 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 110 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 115 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 120 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 125 deny ip source 172.24.2.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 130 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 135 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 140 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 145 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 150 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 155 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 160 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 165 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 170 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 175 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 180 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 185 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 190 deny ip source 172.24.3.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 195 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 200 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 205 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 210 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 215 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 220 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 225 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 230 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 235 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 240 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 245 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 250 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 255 deny ip source 172.24.4.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 260 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 265 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 270 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 275 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 280 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 285 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 290 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 295 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 300 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 305 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 310 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 315 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 320 deny ip source 172.24.5.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 325 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 330 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 335 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 340 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 345 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 350 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 355 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 360 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 365 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 370 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 375 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 380 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 385 deny ip source 172.24.6.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 390 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 395 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 400 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 405 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 410 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 415 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 420 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 425 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 430 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 435 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 440 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 445 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 450 deny ip source 172.24.7.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 455 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 460 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 465 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 470 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 475 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 480 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 485 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 490 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 495 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 500 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 505 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 510 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 515 deny ip source 172.24.8.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 520 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 525 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 530 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 535 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 540 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 545 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 550 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 555 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 560 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 565 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 570 deny ip source 172.24.9.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 575 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 580 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 585 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 590 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 595 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 600 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 605 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 610 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 615 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 620 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 625 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 630 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 635 deny ip source 172.24.10.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 640 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 645 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 650 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 655 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 660 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 665 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 670 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 675 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 680 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 685 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 690 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 695 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 700 deny ip source 172.24.11.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 705 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 710 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 715 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 720 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 725 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 730 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 735 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 740 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 745 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 750 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 755 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 760 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

 rule 765 deny ip source 172.24.12.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 770 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 775 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 780 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 785 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 790 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 795 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 800 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 805 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 810 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 815 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 820 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 825 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 830 deny ip source 172.24.13.0 0.0.0.255 destination 172.24.15.0 0.0.0.255

 rule 835 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.1.0 0.0.0.255

 rule 840 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.2.0 0.0.0.255

 rule 845 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.3.0 0.0.0.255

 rule 850 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.4.0 0.0.0.255

 rule 855 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.5.0 0.0.0.255

 rule 860 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.6.0 0.0.0.255

 rule 865 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.7.0 0.0.0.255

 rule 870 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.8.0 0.0.0.255

 rule 875 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.9.0 0.0.0.255

 rule 880 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.10.0 0.0.0.255

 rule 885 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.11.0 0.0.0.255

 rule 890 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.12.0 0.0.0.255

 rule 895 deny ip source 172.24.15.0 0.0.0.255 destination 172.24.13.0 0.0.0.255

#

acl number 3002

 rule 0 permit ip

#

 password-control enable

 password-control login-attempt 5 exceed lock-time 10

#

radius scheme system

#

domain system

#

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#

role name level-13

 description Predefined level-13 role

#

role name level-14

 description Predefined level-14 role

#

user-group system

#

local-user mansen41 class manage

 service-type telnet ssh terminal

 authorization-attribute user-role level-3

 authorization-attribute user-role level-15

 authorization-attribute user-role network-admin

 authorization-attribute user-role network-operator

#

local-user mansen42 class manage

 service-type ssh

 authorization-attribute user-role security-audit

#

local-user mansen43 class manage

 service-type ssh

 authorization-attribute user-role guest-manager

 authorization-attribute user-role network-operator

#

return

 

最佳答案

佚名 九段
粉丝:22人 关注:0人

找一条故障流,做下流统,先确认丢包点,才还有针对性的排查,检查故障设备是否有异常日志,mac漂移  端口错包之类的

3 个回答
粉丝:226人 关注:0人

您好,看下是否是高峰导致的端口阻塞

之前没有出现过这种情况,不在现场没法确定

夜见 发表时间:2024-03-20
粉丝:2人 关注:15人

感觉是 qos policy guo 导致的。

夜见 三段
粉丝:3人 关注:12人

直连核心交换机测试也会丢包

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明