烟花里的尘埃,F100-C-G 的VLAN 70 掩码从 24 改为 23后,网络全部VLAN网络很慢
问题描述:
问题: 我这边的一个 VLAN 需要接入 超过 254 个无线终端,10个 AP由同一个 AC管理。于是我昨天把原来的VLAN VLAN 60 删除了,把 70 的掩码 由24改为 23,修改后的配置如下,今天的所有VLAN网络异常卡顿,常用的百度、京东甚至打不开,求解,我的
#
version 5.
#
sysname ds_F100
#
clock timezone UTC add 00:00:00
#
l2tp enable
#
undo voice VLAN mac-address 00e0-bb00-0000
#
interzone policy default by-priority
#
ip pool 1 172.18.10.2 172.18.10.254
#
domain default enable system
#
dns resolve
dns proxy enable
#
telnet server enable
#
qos carl 5 destination-ip-address subnet 172.18.5.0 24 per-address
qos carl 6 destination-ip-address subnet 172.18.6.0 24 per-address
qos carl 7 destination-ip-address subnet 172.18.7.0 24 per-address
qos carl 8 destination-ip-address subnet 172.18.8.0 24 per-address
qos carl 12 destination-ip-address subnet 172.18.12.0 24 per-address
qos carl 13 destination-ip-address subnet 172.18.13.0 24 per-address
qos carl
qos carl
qos carl 22 destination-ip-address range 172.18.5.
qos carl 51 destination-ip-address range 172.18.5.2 to 172.18.5.
qos carl 52 destination-ip-address range 172.18.5.
qos carl 103 destination-ip-address range 172.18.5.2 to 172.18.5.103 per-address
qos carl 104 destination-ip-address range 172.18.5.104 to 172.18.5.105
qos carl 106 destination-ip-address range 172.18.5.106 to 172.18.5.
#
port-security enable
#
undo alg dns
undo alg rtsp
undo alg h323
undo alg sip
undo alg sqlnet
undo alg ils
undo alg nbt
undo alg msn
undo alg qq
undo alg tftp
undo alg sccp
undo alg gtp
#
session synchronization enable
#
password-recovery enable
#
acl number
rule 2 permit source 172.18.4.0 0.0.0.255
rule 3 permit source 172.18.5.0 0.0.0.255
rule 4 permit source 172.18.6.0 0.0.0.255
rule 5 permit source 172.18.7.0 0.0.0.255
rule 6 permit source 172.18.8.0 0.0.0.255
rule 7 permit source 172.18.11.0 0.0.0.255
rule 8 permit source 172.18.12.0 0.0.0.255
rule 9 permit source 172.18.13.0 0.0.0.255
rule 10 permit source 172.18.14.0 0.0.0.255
rule 11 permit source 172.18.3.0 0.0.0.255
rule 15 permit source 172.18.18.0 0.0.0.255
#
vlan 1
pki domain datastory
ca identifier CA Server
certificate request from ca
certificate request entity datastory
#
pki domain datastoryca
ca identifier CA Server
certificate request from ra
certificate request entity datastory
root-certificate fingERPrint sha1 4DC243
#
pki domain default
crl check disable
#
qos policy ceshi003
#
dhcp server ip-pool vlan1
network 172.18.12.0 mask 255.255.255.0
gateway-list 172.18.12.1
dns-list 192.168.1.2
expired day 0 hour 4
#
dhcp server ip-pool vlan130
network 172.18.13.0 mask 255.255.255.0
gateway-list 172.18.13.1
dns-list 192.168.1.2
expired day 0 hour 3
#
dhcp server ip-pool vlan180
network 172.18.18.0 mask 255.255.255.0
gateway-list 172.18.18.1
dns-list 192.168.1.2
expired day 0 hour 1
#
dhcp server ip-pool vlan50
network 172.18.5.0 mask 255.255.255.0
gateway-list 172.18.5.1
dns-list 192.168.1.2
#
dhcp server ip-pool vlan70
network 172.18.6.0 mask 255.255.254.0
gateway-list 172.18.7.1
dns-list 192.168.1.2
expired day 0 hour 1 minute 30
#
dhcp server ip-pool vlan80
network 172.18.8.0 mask 255.255.255.0
gateway-list 172.18.8.1
dns-list 192.168.1.2
#
policy-based-route
if-match acl
apply ip-address next-hop 192.168.1.3
#
user-group system
group-attribute allow-guest
#
local-user admin
password ci
authorization-attribute level 3
service-type telnet
service-type web
local-user u8user
password cipher $
service-type ppp
local-user vpnuser
password cipher $
service-type ppp
#
stp max-hops 30
stp bpdu-protection
stp enable
#
ssl server-policy access-policy
pki-domain datastory
#
cwmp
undo cwmp enable
#
interface NULL0
#
interface Vlan-interface1
ip policy-based-route
#
interface GigabitEthernet0/1
port link-mode route
nat outbound
ip address 192.168.1.3 255.255.255.0
qos car inbound carl 13 cir 30000 cbs 64000 ebs 0 green pass red discard
qos car inbound carl 14 cir 10000 cbs 64000 ebs 0 green pass red discard
qos car inbound carl 52 cir
qos car inbound carl 8 cir 60000 cbs 64000 ebs 0 green pass red discard
qos car inbound carl 103 cir 10000 cbs 625000 ebs 0 green pass red discard
qos car inbound carl 104 cir 40000 cbs 2500000 ebs 0 green pass red discard
qos car inbound carl 106 cir 10000 cbs 625000 ebs 0 green pass red discard
qos car inbound carl
qos car inbound carl 6 cir 40000 cbs 3750000 ebs 0 green pass red discard
qos car inbound carl 12 cir 40000 cbs 625000 ebs 0 green pass red discard
#
interface GigabitEthernet0/2
port link-mode route
ip address XXXXXXXXXXX
#
interface GigabitEthernet0/3
port link-mode route
#
interface GigabitEthernet0/3.1
vlan-type dot1q vid 140
ip address 172.18.14.1 255.255.255.0
#
interface GigabitEthernet0/4
port link-mode route
#
interface GigabitEthernet0/4.3
vlan-type dot1q vid 50
ip address 172.18.5.1 255.255.255.0
#
interface GigabitEthernet0/4.5
vlan-type dot1q vid 70
ip address 172.18.7.1 255.255.254.0
#
interface GigabitEthernet0/4.6
vlan-type dot1q vid 80
ip address 172.18.8.1 255.255.255.0
#
interface GigabitEthernet0/4.8
vlan-type dot1q vid 1
ip address 172.18.12.1 255.255.255.0
#
interface GigabitEthernet0/4.9
vlan-type dot1q vid 130
ip address 172.18.13.1 255.255.255.0
#
interface GigabitEthernet0/4.15
vlan-type dot1q vid 180
ip address 172.18.18.1 255.255.255.0
#
vd Root id 1
#
zone name Management id 0
priority 100
import interface GigabitEthernet0/0
zone name Local id 1
priority 100
zone name Trust id 2
priority 85
import interface GigabitEthernet0/3
import interface GigabitEthernet0/3.1
import interface GigabitEthernet0/4
import interface GigabitEthernet0/4.3
import interface GigabitEthernet0/4.5
import interface GigabitEthernet0/4.6
import interface GigabitEthernet0/4.8
import interface GigabitEthernet0/4.9
import interface GigabitEthernet0/4.15
import interface Virtual-Template0
zone name DMZ id 3
priority 50
zone name Untrust id 4
priority 5
import interface GigabitEthernet0/1
import interface GigabitEthernet0/2
switchto vd Root
object service wannacry01
description 阻止比特币病毒
service tcp destination-port 445
object service wannacry02
service tcp destination-port 135
object service wannacry03
service tcp destination-port 137
object service wannacry04
service tcp destination-port 139
zone name Management id 0
ip virtual-reassembly
zone name Local id 1
ip virtual-reassembly
zone name Trust id 2
ip virtual-reassembly
zone name DMZ id 3
ip virtual-reassembly
zone name Untrust id 4
ip virtual-reassembly
interzone source Trust destination Trust
rule 0 permit logging
source-ip any_address
destination-ip any_address
service any_service
rule enable
interzone source Untrust destination Trust
rule 2 deny
source-ip any_address
destination-ip any_address
service wannacry01
service wannacry02
service wannacry03
service wannacry04
rule enable
rule 0 permit logging
source-ip any_address
destination-ip any_address
service any_service
rule enable
#
ssl-vpn server-policy access-policy
ssl-vpn enable
#
ip route-static 0.0.0.0 0.0.0.0 192.168.1.2
#
dhcp enable
#
load xml-configuration
#
load tr069-configuration
#
user-interface con 0
user-interface vty 0 4
authentication-mode scheme
#
return
组网及组网描述:
最佳答案
把qos去掉试试?cpu高吗?不排除是性能不够了。ping丢包吗?丢包估计性能问题问400吧,如果只有网页卡可以修改下tcp mss试试
CPU 1% ,内存 29% ,温度 47 度,没有满负载的吧,之前都好好的,就是昨天我把 VLAN60删除了,把VLAN70的掩码由 24改为 23后,原来V少部分的 VLAN 60 的打印机、台式机都连接到 VLAN 70上。今天中午开始,就很卡了,全公司的台式机、笔记本都上网很慢,网页经常打不开。首先想请教一下,我这样设置的VLAN 70 ,得到的500个IP ,有没有问题
烟花里的尘埃能否做下流统看下 是不是有丢包,有可能是被策略给丢了
你正在,F100-C-G 的VLAN 70 掩码从 24 改为 23后,网络全部VLAN网络很慢