abbass 发表于 2004-10-4 04:57:12

一天之中ROS死机数次。大家有没有谁遇到过这种情况?

sblive 发表于 2004-10-4 07:50:48

CPU占用率很高啊,你的机器是不是中了病毒了?是不是有人攻击你?

abbass 发表于 2004-10-4 08:02:39

ROS会中病毒么?防火墙里面该加的我都加了,可是还没用。

ivanfeng 发表于 2004-10-4 10:43:10

带宽。CPU资源占用高。。。请立即查毒。。      不一定是服务器的。。居域网里的机器可能性大

abbass 发表于 2004-10-4 11:34:13

现在我把子网分成小段来查看流量。查出哪段流量突发后再细化到每一个IP一看流量。希望能找出来。各位还有何高见,谢谢谢谢。

liusimin 发表于 2004-10-4 12:51:31

先换成CL先顶着看看还死机不?说不定是硬件问题哦

独孤风行 发表于 2004-10-4 13:46:18

QUOTE (liusimin @ Oct 4 2004, 12:51 PM)
先换成CL先顶着看看还死机不?说不定是硬件问题哦   
CL是Coyote Linux 吗?好用吗?能做pppoe服务器吗?能加我的QQ吗?147193780

abbass 发表于 2004-10-4 15:02:45

同样的东西。在别人家用好久都没问题。可是在这里就不行。CPU100%的时候,拨掉外网口的网线马上就降回来了。应该是被人攻击。有好建议么?

abbass 发表于 2004-10-4 15:54:13

又有新情况了。流量不大,CPU100%。

liu00901 发表于 2004-10-4 19:44:38

1.正确设置防火墙,应该可以防疫。我有段时间遭攻击,只是连WINBOX会感到有点卡,其它无影响。。INPUT里最后一行:add action=drop log=yes comment="Log and drop everything else" disabled=no2.你的内网有机器中毒了,查杀吧。

liu00901 发表于 2004-10-4 19:48:21

我的设置:http://bbs.51758.com/viewthread.php?tid=47876&highlight=linuxip firewall rule input   !!防火墙!!!!add protocol=tcp tcp-options=no-sys-only connection-state=established action=accept comment="Established TCP connections" disabled=noadd connection-state=related action=accept comment="Related connections" disabled=noadd dst-address=:69 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:69 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:134-139 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:134-139 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:161-162 protocol=tcp action=drop comment="drop SNMP Trap" disabled=noadd dst-address=:161-162 protocol=udp action=drop comment="drop SNMP Trap" disabled=noadd dst-address=:445 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:445 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:554 protocol=tcp action=drop comment="drop blaster wrom" disabled=noadd dst-address=:554 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:593 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:593 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:1025 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:1025 protocol=udp action=drop comment="drop blaster worm" disabled=noadd det-address=:1068 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:1068 protocol=udp action=drop comment-"drop blaster worm" disabled=noadd dst-address=:2000 protocol=tcp action=drop comment="drop Millenium" disabled=noadd dst-address=:2000 protocol=udp action=drop comment="drop millenium" disabled=noadd dst-address=:3127-3198 protocol=tcp action=drop comment="drop proxy worm" disabled=noadd dst-address=:3127-3198 protocol=udp action=drop comment="drop proxy worm" disabled=noadd dst-address=:3389 protocol=tcp action=drop comment="drop windows supper clinet link" disabled=noadd dst-address=:3389 protocpl=udp action=drop comment="drop windows supper clinet link" disabled=noadd dst-address=:4444 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:4444 protocol=udp action=drop comment="drop blaster worm" disabled=noadd dst-address=:5554 protocol=tcp action=drop comment="drop blaster worm' disabled=noadd dst-address=:5554 protocol=udp action=drop comment="drop Bt download" disabled=noadd dst-address=:6881-6889 protocol=tcp action=drop comment="drop drop Bt download" disabled=noadd dst-address=:6881-6889 protocol=udp action=drop comment="drop drop Bt download" disabled=noadd dst-address=:8881-8889 protocol=tcp action=drop comment="drop drop Bt download" disabled=noadd dst-address=:8881-8889 protocol=udp action=drop comment="drop drop Bt download" disabled=noadd dst-address=:39213 protocol=tcp action=drop comment="drop worm" disabled=noadd dst-address=:39213 protocol=tcp action=drop comment="drop worm" disabled=noadd protocol=udp action=accept comment="udp" disabled=noadd dst-address=XXX.XXX.XXX.XXX/32 protocol=icmp action=dropadd protocol=icmp limit-count=50 limit-burst=2 limit-time=5s action=accept comment="allow limited pings" disabled=0 comment="dont ping me" disabled=noadd dst-address=!192.168.0.0/24:3987 protocol=tcp action=drop comment="dont link me" disabled=noadd src-address=192.168.0.0/24 dst-address=192.168.0.125/32 action=accept comment="from lan admin" disabled=noadd action=drop log=yes comment="Log and drop everything else" disabled=no ip firewall rule forward(禁止某些网站IP)add dst-address=:134-139 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=:134-139 protocol=tcp action=drop comment="drop blaster worm" disabled=noadd dst-address=61.240.246.41/32 action=DROP comment="DROP WWW. CY07.COM" disabled=noip service禁止外网控制路由set telent port=23 address=192.168.0.0/24 disabled=yesset ftp port=21 address=192.168.0.0/24 disabled=no   (把21端口改了)set www port=80 address=192.168.0.0/24 disabled=no(把80端口改了)set ssh port=22 address=192.168.0.0/24 disabled=yesuser管理员只能在内网登陆set 0 address=192.168.0.0/24

sblive 发表于 2004-10-4 20:59:40

请参照官方路由的演示设置,官方的设置非常合理。稍稍修改一下就可以了。楼上的设置不错,还有,可以规定各个帐号可以用什么IP登陆的,就在帐号设置里面,可以把所有帐号设置成从内网网段登陆更安全。

sunx990 发表于 2004-10-8 17:15:37

我不懂别骂我。我觉得正常。os服务器不会有问题但管理端打开firewall后CPU会占满。

suqunmu 发表于 2004-10-9 01:51:11

QUOTE (sunx990 @ Oct 8 2004, 05:15 PM)
我不懂别骂我。我觉得正常。os服务器不会有问题但管理端打开firewall后CPU会占满。
是的,打开firewall 从服务器端获取的资料太多了!

独孤风行 发表于 2004-10-19 13:58:56

QUOTE (sblive @ Oct 4 2004, 08:59 PM)
请参照官方路由的演示设置,官方的设置非常合理。稍稍修改一下就可以了。楼上的设置不错,还有,可以规定各个帐号可以用什么IP登陆的,就在帐号设置里面,可以把所有帐号设置成从内网网段登陆更安全。
那可是E文啊,有没有哪位兄台翻译过来了,好对照学习喔,也是学英语的实践嘛~!
页: [1]
查看完整版本: 完了。不知道ROS还有没有命在。