Комментарии:
tnx vai
ОтветитьThank you!
ОтветитьBang ijin tanya, mikrotik saya load cpu sampe 75% tinggi banget gara2 ramnya kecil atau storage kecil, atau apa ya bang, di tunggu responnya.
... mikrotik saya ramnya 256mb storage 128 mb
Спасибо помогли решить проблему, из за этого пропускная способность на бридже была 30-50 максимум, как только включил это правило, полетело под 200
ОтветитьManoooooo como assim ??? Muito obrigado cara eu te amo
Ответитьwhy do you have to masquerade the network
ОтветитьSorprendido!! Me Resulto Tu Video... Me Suscribo!
ОтветитьThank You
ОтветитьThank you. You saved my day. You king
ОтветитьLOL
ОтветитьGgkgkgk... i got LOL
Ответитьcon su huevada de gring0 solo genera perdida de paquetes, gring0 idiot4 es como su f35 q ni vuela
ОтветитьBy the way, this video SUCKS. You haven't got a goddamn clue what you're talking about, you're disabling the security features of the router, and you're bypassing all sorts of useful features.. Sure your CPU load is going down.. You've turned the router into a fucking switch..
Ответитьare you fucking serious? Christmas music on a goddamn video? Yeah, that'll be appropriate for 11 months of the year...
ОтветитьVc não vai poder mais colocar limite de banda vai liberar tudo para todos 😏
ОтветитьQos and firewall not working with fasttrack. Better buy hap ac2 or rb4011 or ccr for higher performance
ОтветитьThis will make all your queue disable.. Other words bypassing your limit queue..
ОтветитьWhat a horrible advise. This is how you get PWNED!
Ответитьaqui liberou a internet de todos os clientes
ОтветитьParabéns pela dica resolveu meu problema numa simples aula na pratica show!!
ОтветитьThank u so much
Ответитьbagus..tpi simple queues trafiknya kog kecil ya?
masalah apanya y bos
gracia por la ayuda
Ответитьyou'd by pass the qos by using the fast track...
Ответитьthanks
ОтветитьUpdate your Firmware of your Mikrotik. There was a vulnerability in that version
2CVE-2017-83383992017-05-182017-06-01
7.8
NoneRemoteLowNot requiredNoneNoneCompleteA vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.3CVE-2017-72854002017-03-292017-04-10
7.8
NoneRemoteLowNot requiredNoneNoneCompleteA vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.
Thanksss
ОтветитьEXCELENT!!!! THANKS VERY MUCH MATE
Ответитьnot working speed slow down
ОтветитьThanks A Lot brooooo :D
Ответитьthanx 4 u
Ответить