查看: 9792|回复: 3

局域网中了arp,网络闪断,抓包找不到

[复制链接]
发表于 2013-5-27 08:42:28 | 显示全部楼层 |阅读模式
本帖最后由 zhaoyutg 于 2013-5-27 10:38 编辑

这段时间单位局域网中了arp,用arp -a扫描出一堆网关。于是下了一堆防火墙一个一个试,但是都没有提示有arp攻击,同时网络不间断闪断一直存在。网络配置华为3030防火墙 三层2000交换机,如图:
我在生产部赵上装的科来分析数据包地址
丢包那图我ping的是dns
第四张图是arp -a得到的真实的网关是10.6.2.1
闪断的频率大约每分钟2-3次……
防火墙日志缓冲区报文

12013/5/26 14:54:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 ; proto:ICMP(8,0) ; from 10.6.2.55 10.6.2.93 ; to 116.113.81.125 61.138.85.38 ; begin time :2013/05/26 14:54:30; end time: 2013/05/26 14:54:34; total packets: 2;


22013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:IP spoof attack; Receive Interface: GigabitEthernet0/0 ; proto:UDP ; from 192.168.0.42:11793 ; to 116.113.83.2:22805 ; begin time :2013/05/26 14:54:53; end time: 2013/05/26 14:55:11; total packets: 4;


32013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:Unreachable attack; Receive Interface: GigabitEthernet0/0 GigabitEthernet0/1 ; proto:ICMP(3,3) ; from 218.29.132.206 218.29.154.14 221.215.84.158 118.212.96.24 120.82.224.169 60.29.189.2 61.167.145.58 175.21.115.218 121.28.110.190 122.193.174.172 118.80.104.197 122.139.5.147 ; to 116.113.83.2 221.221.6.228 ; begin time :2013/05/26 14:54:42; end time: 2013/05/26 14:55:12; total packets: 153;


42013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:Trace route attack; Receive Interface: GigabitEthernet0/0 ; proto:ICMP(11,0) ; from 116.113.83.2 ; to 116.113.31.101 ; begin time :2013/05/26 14:55:04; end time: 2013/05/26 14:55:04; total packets: 1;


52013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 ; proto:UDP ; from 10.6.2.235:1863 10.6.2.55:8985 10.6.2.233:1863 10.6.2.81:10739 10.6.2.93:13536 10.6.2.54:4000 10.6.2.72:53636 10.6.2.72:63260 10.6.2.81:18037 10.6.2.125:9382 10.6.2.72:60512 10.6.2.72:50892 ; to 112.83.92.120:21947 115.48.201.225:1030 112.229.213.40:1863 123.5.39.80:2801 58.241.239.163:9278 112.251.88.23:1863 183.94.237.119:22263 125.42.98.17:5042 180.95.215.107:1863 119.184.118.70:3629 112.90.84.97:8000 139.226.23.219:4346 ; begin time :2013/05/26 14:54:43; end time: 2013/05/26 14:55:09; total packets: 98;


62013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 ; proto:TCP ; from 10.6.2.81:18149 10.6.2.72:55445 10.6.2.72:55377 10.6.2.72:55511 10.6.2.72:55540 10.6.2.72:55239 10.6.2.72:55371 10.6.2.54:1245 10.6.2.54:1246 10.6.2.54:1251 10.6.2.54:1261 10.6.2.72:55265 ; to 119.188.27.169:8080 219.157.145.106:30105 110.252.131.9:8080 112.233.197.187:30100 183.187.92.130:30008 218.29.184.109:8080 122.143.2.8:8080 111.161.80.227:80 112.90.139.96:80 221.204.218.171:80 183.93.80.146:8080 123.153.235.219:30101 ; begin time :2013/05/26 14:54:43; end time: 2013/05/26 14:55:09; total packets: 55;


72013/5/26 14:55:12MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 ; proto:ICMP(8,0) ; from 10.6.2.93 10.6.2.105 ; to 61.138.85.38 202.99.224.8 ; begin time :2013/05/26 14:54:45; end time: 2013/05/26 14:54:56; total packets: 3;


82013/5/26 14:55:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:IP spoof attack; Receive Interface: GigabitEthernet0/0 ; proto:UDP ; from 192.168.0.42:11793 ; to 116.113.83.2:22805 ; begin time :2013/05/26 14:55:17; end time: 2013/05/26 14:55:36; total packets: 4;


92013/5/26 14:55:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:Unreachable attack; Receive Interface: GigabitEthernet0/0 GigabitEthernet0/1 ; proto:ICMP(3,3) ; from 60.217.235.160 10.6.2.72 60.217.235.188 125.40.54.45 221.215.84.158 139.226.66.89 125.43.104.41 219.156.119.69 124.164.232.21 61.167.145.58 122.192.246.192 175.21.115.218 ; to 116.113.83.2 116.113.83.2 202.99.224.8 116.113.83.2 221.221.6.228 ; begin time :2013/05/26 14:55:13; end time: 2013/05/26 14:55:41; total packets: 297;


102013/5/26 14:55:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:Trace route attack; Receive Interface: GigabitEthernet0/0 ; proto:ICMP(11,0) ; from 116.113.83.2 ; to 116.113.83.1 ; begin time :2013/05/26 14:55:28; end time: 2013/05/26 14:55:28; total packets: 1;


112013/5/26 14:55:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 GigabitEthernet0/0 ; proto:UDP ; from 10.6.2.55:8985 10.6.2.235:1863 10.6.2.233:4000 10.6.2.93:13536 218.28.31.210:6748 10.6.2.81:10739 10.6.2.72:50892 10.6.2.72:61466 10.6.2.72:60512 10.6.2.55:4000 10.6.2.54:1320 10.6.2.72:56439 ; to 58.255.206.32:9418 58.241.239.163:9278 123.159.231.132:12342 119.5.180.172:9783 27.195.58.138:41980 125.39.205.66:8000 121.27.37.45:11991 180.95.215.107:1863 218.26.110.52:4292 183.94.237.119:22263 183.94.86.240:1863 112.251.88.23:1863 ; begin time :2013/05/26 14:55:12; end time: 2013/05/26 14:55:39; total packets: 109;


122013/5/26 14:55:42MFTG0-USG3030 SEC/5/ATCKDF:AttackType:header check error; Receive Interface: GigabitEthernet0/1 ; proto:TCP ; from 10.6.2.30:27346 10.6.2.54:1312 10.6.2.72:54654 10.6.2.72:55514 10.6.2.72:55445 10.6.2.72:55529 10.6.2.81:18195 10.6.2.72:55571 10.6.2.72:55416 10.6.2.72:55401 10.6.2.72:54908 10.6.2.72:55177 ; to 119.167.155.22:2456 112.95.243.27:80 123.131.165.107:8080 114.248.153.91:30105 219.157.145.106:30105 112.234.224.112:30105 123.125.80.88:80 61.52.138.194:30001 101.17.169.141:8080 120.7.56.136:8080 123.131.165.103:8080 110.254.13.127:8080 ; begin time :2013/05/26 14:55:13; end time: 2013/05/26 14:55:38; total packets: 40;
1.JPG
2.JPG
3.JPG
4.JPG
5.JPG

数据包地址.txt

26 Bytes, 下载次数: 18, 下载积分: 魔法币 -3

回复

使用道具 举报

发表于 2013-5-27 09:15:14 | 显示全部楼层
本帖最后由 zhaoyutg 于 2013-5-27 08:50 编辑


服务器时间不对嘛。。
楼主理清思路了再来发贴好吧,说的什么乱七八糟的。这样没人能帮你的,最好上数据包。
回复

使用道具 举报

发表于 2013-5-28 13:11:21 | 显示全部楼层
楼主你最好把你网络拓扑图简单的画下在就是你描述下在那抓的包,还就是传个数据包上来。
回复

使用道具 举报

 楼主| 发表于 2013-6-7 08:25:01 | 显示全部楼层
光猫接入usg3030防火墙,出来接三层交换机2000……数据包太大,地址我已经放上去了啊
回复

使用道具 举报

您需要登录后才可以回帖 登录 | CSNA会员注册

本版积分规则

快速回复 返回顶部 返回列表