TL-SG108E V3 High RST TCP traffic trigger by nmap
This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
TL-SG108E V3 High RST TCP traffic trigger by nmap
I am getting high RST TCP traffic to the SG108E V3 when I ping it with the nmap command nmap -p 80 IP-of-the-switch. It seems to happen when the switch is busy doing something. In the screen shot below the RST TCP traffic is trigger when the nmap scan starts just after the switch responds to an ARP request. Once the traffic starts, the ping time to the switch goes from 2ms to 300ms and connectivity issues start to happen. Removing the ethernet cable from the test computer stops the traffic and restores connectivity.
Anyone else seeing this?