关于路由器日志的问题?
发布网友
发布时间:2022-05-10 02:56
我来回答
共3个回答
热心网友
时间:2023-10-24 19:00
VOLANS路由器日志说明
志类型 日志内容 说明
system: Volans router start. 路由器启动,开始日志服务
system: Start url filter. 启用域名过滤
system: Start traffic control. 启用流量控制
system: Start pptp *. 启动pptp*
system: Start s* client. 启动s*客户端
system: Start svnp server. 启动s*服务端
system: Link check enable. 启动通断检测
system: Start web control server. 启动web控制界面
系统信息
service: Start DNS and DHCP server. 启动dhcp和dns缓存服务器
security: Connect limit on 300. 启用连接*为300条
security: Set connect limit 192.168.0.10 500. 192.168.0.10连接*为500条
security: Connect limit off. 关闭连接*
security: Enable wan icmp request. 允许*ping
security: Block wan icmp request. 阻断*ping
security: Enable wan udp request. 允许*udp请求
security: Block wan udp request. 阻断*udp请求
security: Enable wan syn request. 允许*syn请求
security: Block wan syn request. 阻断*syn请求
security: Wan arp limit on 10. 启用*arp*为10pps
security: Wan arp limit off. 关闭*arp防御*
security: Lan virus protect enable. 启用内网病毒防御
security: Lan virus protect disable. 关闭内网病毒防御
security: Wan port protect enable. 启用*端口保护
security: Wan port protect disable. 关闭*端口保护
security: Lan broadcast limit enable. 启用内网广播风暴抑制
security: Lan broadcast limit disable. 启用内网广播风暴抑制
security: Lan synflood protect enable 50. 启用内网synflood防御为50pps
security: Lan synflood protect disable. 关闭内网synflood防御
security: Lan udpflood protect enable 500. 启用内网udpflood防御为500pps
security: Lan udpflood protect disable. 关闭内网udpflood防御
security: Lan icmpflood protect enable 50. 启用内网icmpflood防御为50pps
security: Lan icmpflood protect disable. 关闭内网icmpflood防御
security: Open portfw port 80 on tcp 500. 80tcp端口映射,最大连接500
security: Arp attack from 00:01:02:03:04:05. 指定mac机器可能存在arp病毒
security: Lan arp broadcast enable. 启用内网arp欺骗防御
security: Lan arp broadcast disable. 关闭内网arp欺骗防御
网络安全
security: Web admin ip enable 192.168.0.1. 设置192.168.0.1为web管理ip
security: Web admin ip disable. 不启用web管理ip功能
*:1.1.1.1 try to connect. 1.1.1.1开始pptp*拨号
*: remote:192.168.0.152 close connection. 客户端192.168.0.152断开连接
*-pppoe: authentication succeeded for user. user用户认证成功
*拨号
*-pppoe: authentication failed for user. user用户认证失败
config: Change p2p filter config. 修改智能过滤配置
config: Change DNS server config. 修改dns缓存配置
config: Change dyndns config. 修改动态域名配置
config: Change traffic control config. 修改流量控制配置
config: Change firewall config. 修改防火墙规则
config: Change ipmac config. 修改ipmac绑定配置
config: Change mac filter config. 修改mac过滤配置
config: Change nat 1to1 config. 修改nat1对1配置
config: Change nat out config. 修改nat外出规则
config: Change admin config. 修改管理选项
config: Change port forward config. 修改端口映射配置
config: Change static route config. 修改静态路由配置
config: Change port sniff config. 修改端口镜像配置
config: Change DHCP server config. 修改dhcp服务器配置
config: Change syslog config. 修改系统日志配置
config: Change system basic config. 修改系统基本选项
config: Change url filter config. 修改域名过滤配置
config: Change vlan config. 修改vlan配置
config: Change lan config. 修改内网配置
config: Change net protect config. 修改攻击防御配置
config: Change wan config. 修改*配置
password: Modify admin password. 修改管理员密码
配置信息
password: Modify user1 password. 修改用户user1密码
smartlink: Wan* up. wan*连接正常,线路自动均衡
smartlink: Wan* down. wan*连接断开,线路自动均衡
pppoe: Wan* ppp* up(1.1.1.1). wan* pppoe拨号连接建立
pppoe: Wan* ppp* down(1.1.1.1). wan* pppoe拨号连接断开
warning: Wan* receive bandwidth full. wan*下行带宽已满
info: Wan* receive bandwidth regular. wan*下行带宽恢复正常
warning: Wan* transmit bandwidth full. wan*上行带宽已满
状态检测
info: Wan* transmit bandwidth regular. wan*上行带宽恢复正常
说明:1,状态检测的可靠性依赖于配置
a. smartlink需要配置正确的检测模式.
b. 带宽检测需要在wan配置界面指定正确的上下行带宽,当日志中大量出现
bandwidth full表示该线路带宽可能不足.
2,security: Arp attack from 00:01:02:03:04:05.表明mac为00:01:02:03:04:05的机器可
能存在arp病毒.
热心网友
时间:2023-10-24 19:00
你的电脑已经中了木马之类,路由器有一定的防火墙功能,再加上你的电脑上有防火墙,绝对没什么是。杀毒,防火墙开启,不用管他
热心网友
时间:2023-10-24 19:01
有MAC地址0x001c256a9624的电脑请求DHCP地址,DHCP功能发地址192.168.1.105给它