iKuai爱快流控路由

 找回密码
 立即注册

QQ登录

只需一步,快速开始

查看: 570|回复: 4
打印 上一主题 下一主题

路由体检-内网PPPoE检测-异常

[复制链接]
跳转到指定楼层
楼主
发表于 2023-2-13 23:56:20 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
本帖最后由 77547117 于 2023-2-14 00:10 编辑

检测已完成
检测内网PPPOE服务.
异常: 接口:lan1 Access-Concentrator:GDZHS-MS-IPMAN-BNG01-XLMA-HW 服务器名: Mac:48:57:02:60:49:ca

现在软路由经常崩掉,不知道是什么情况,今天体检提示这个!

然后ARP日志显示
2023-02-13 23:54:459c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:459c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:456a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6
2023-02-13 23:54:449c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:449c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:436a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6
2023-02-13 23:54:439c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:439c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:299c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:299c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:296a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6
2023-02-13 23:54:289c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:289c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:286a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6
2023-02-13 23:54:276a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6
2023-02-13 23:54:279c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:279c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:149c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth0): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:149c:9d:7e:b6:3a:ee" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.101 9c:9d:7e:7e:27:16->9c:9d:7e:b6:3a:ee
2023-02-13 23:54:146a:64:4a:a7:19:a6" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth1): 192.168.31.107 64:64:4a:a7:19:a3->6a:64:4a:a7:19:a6

[backcolor=rgba(245, 245, 245, 0.055)]环路检测: lan1: received packet on eth0 with own address as source address (addr:ca:47:b4:b9:78:61, vlan:0)然后这个指向的是虚拟机的爱快虚拟网卡,现在我都不知道咋解决。。。


分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 支持支持 反对反对
沙发
发表于 2023-3-19 15:48:37 来自手机访问 | 只看该作者
我也是这问题,你解决了吗
板凳
发表于 2023-3-20 07:53:20 | 只看该作者
PPPOE那里,你是不是把IPTV也接进去了?



消息来自爱快e云
地板
 楼主| 发表于 2023-5-11 10:23:36 | 只看该作者
caiyong861024 发表于 2023-3-19 15:48
我也是这问题,你解决了吗

没解决!
5#
 楼主| 发表于 2023-5-11 10:25:53 | 只看该作者
浅梦忆微凉 发表于 2023-3-20 07:53
PPPOE那里,你是不是把IPTV也接进去了?

没有iptv
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

QQ|小黑屋|手机版|Archiver|论坛规章制度|iKuai Inc. ( 京ICP备13042604号 )

GMT+8, 2024-5-6 07:17

Powered by Discuz! X3.3

© 2001-2024 Comsenz Inc.

快速回复 返回顶部 返回列表