{"id":117,"date":"2017-08-16T21:51:57","date_gmt":"2017-08-16T16:51:57","guid":{"rendered":"http:\/\/blog.4sag.ru\/?p=117"},"modified":"2017-08-16T22:05:52","modified_gmt":"2017-08-16T17:05:52","slug":"zagruzka-protsessora-mikrotik-100","status":"publish","type":"post","link":"https:\/\/blog.4sag.ru\/?p=117","title":{"rendered":"\u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 mikrotik 100%"},"content":{"rendered":"<p>\u041a\u0430\u043a \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0442\u044c ?<br \/>\nTools &gt; Profile &gt; Start.<\/p>\n<p>\u0427\u0430\u0441\u0442\u044b\u0439 \u0432\u0438\u043d\u043e\u0432\u043d\u0438\u043a DNS \u0441\u043b\u0443\u0436\u0431\u0430 \u0432 \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0430\u0445 !<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\n&gt; \/ip firewall filter add action=drop chain=input comment=&quot;block DNS&quot; in-interface=\u0432\u0430\u0448 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 WAN protocol=udp src-address-list=&quot;dns spoofing&quot;\r\n&gt;\u00a0\/ip firewall filter add action=add-src-to-address-list address-list=&quot;dns spoofing&quot; address-list-timeout=1h chain=input in-interface=\u0432\u0430\u0448 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 WAN protocol=udp<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>\u041a\u0430\u043a \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0442\u044c ? Tools &gt; Profile &gt; Start. \u0427\u0430\u0441\u0442\u044b\u0439 \u0432\u0438\u043d\u043e\u0432\u043d\u0438\u043a DNS \u0441\u043b\u0443\u0436\u0431\u0430 \u0432 \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0430\u0445 ! &gt; \/ip firewall filter add action=drop chain=input comment=&quot;block DNS&quot; in-interface=\u0432\u0430\u0448 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 WAN protocol=udp src-address-list=&quot;dns spoofing&quot; &gt;\u00a0\/ip firewall filter add action=add-src-to-address-list address-list=&quot;dns spoofing&quot; address-list-timeout=1h chain=input in-interface=\u0432\u0430\u0448 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 WAN protocol=udp<\/p>\n","protected":false},"author":1,"featured_media":99,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[4],"tags":[16,5],"class_list":["post-117","post","type-post","status-publish","format-aside","has-post-thumbnail","hentry","category-routeros","tag-mikrotik","tag-routeros","post_format-post-format-aside"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=117"}],"version-history":[{"count":5,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":123,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/posts\/117\/revisions\/123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=\/wp\/v2\/media\/99"}],"wp:attachment":[{"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.4sag.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}