Community discussions

MikroTik App
 
User avatar
gabak
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 61
Joined: Fri Sep 01, 2006 7:10 am

high cpu usage 1 pc

Thu Oct 13, 2016 6:39 pm

hi everyone,
how can i solve this problem, i m getting high latency, when i ping or browse.


Imagefree image uploading

Image

here it is my configuration
# oct/13/2016 11:38:41 by RouterOS 6.37.1
# software id = 5XN3-0B5F
#
/interface ethernet
set [ find default-name=ether3 ] master-port=ether2
set [ find default-name=ether4 ] master-port=ether2
set [ find default-name=ether5 ] master-port=ether2
set [ find default-name=ether6 ] master-port=ether2
set [ find default-name=ether7 ] master-port=ether2
set [ find default-name=ether8 ] master-port=ether2
set [ find default-name=sfp1 ] auto-negotiation=no master-port=ether2
/interface wireless
set [ find default-name=wlan1 ] ssid=MikroTik
/interface pptp-client
add connect-to=96.228.33.58 mrru=1600 name=pptp-out1 password=****** user=\
gabak
/ip neighbor discovery
set ether1 discover=no
/interface vlan
add interface=ether2 name=vlan11-bearer vlan-id=11
add interface=ether2 name=vlan12-external vlan-id=12
add interface=ether2 name=vlan101-pdn vlan-id=101
add interface=ether2 name=vlan102 vlan-id=102
add interface=ether2 name=vlan201-layer2 vlan-id=201
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp_pool1 ranges=192.168.10.22-192.168.10.222
add name=dhcp_pool2 ranges=192.168.0.2-192.168.0.254
add name=dhcp_pool3 ranges=192.168.101.2-192.168.101.254
add name=dhcp_pool4 ranges=192.168.101.2-192.168.101.254
add name=dhcp_pool5 ranges=192.168.201.2-192.168.201.254
add name=dhcp_pool6 ranges=10.10.10.2-10.10.10.254
add name=vpn ranges=10.0.0.6-10.0.0.66
/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no interface=ether2 name=dhcp1
add address-pool=dhcp_pool2 disabled=no interface=vlan12-external name=dhcp2
add address-pool=dhcp_pool3 disabled=no interface=vlan11-bearer name=dhcp3
add address-pool=dhcp_pool4 disabled=no interface=vlan101-pdn name=dhcp4 \
relay=192.168.101.2
add address-pool=dhcp_pool5 disabled=no interface=vlan201-layer2 name=dhcp5
add address-pool=dhcp_pool6 disabled=no interface=vlan102 name=dhcp6
/ppp profile
add local-address=vpn name=vpn remote-address=vpn
/tool user-manager customer
set admin access=\
own-routers,own-users,own-profiles,own-limits,config-payment-gw
/interface pptp-server server
set enabled=yes
/ip address
add address=192.168.10.1/24 interface=ether2 network=192.168.10.0
add address=192.168.1.254/24 interface=vlan11-bearer network=192.168.1.0
add address=192.168.0.254/24 interface=vlan12-external network=192.168.0.0
add address=192.168.201.254/24 interface=vlan201-layer2 network=192.168.201.0
add address=192.168.101.254/24 interface=vlan101-pdn network=192.168.101.0
add address=10.10.10.254/24 interface=vlan102 network=10.10.10.0
add address=174.142.135.242/28 interface=ether1 network=174.142.135.240
/ip dhcp-server network
add address=10.10.10.0/24 gateway=10.10.10.1
add address=192.168.0.0/24 gateway=192.168.0.1
add address=192.168.10.0/24 gateway=192.168.10.1
add address=192.168.101.0/24 gateway=192.168.101.254
add address=192.168.201.0/24 dns-server=8.8.8.8,208.67.222.222 gateway=\
192.168.201.254
/ip dns
set allow-remote-requests=yes servers=209.18.46.62,8.8.8.8,209.18.47.61
/ip firewall filter
add action=accept chain=input disabled=yes dst-port=1723 protocol=tcp
add action=accept chain=forward disabled=yes protocol=gre
add action=drop chain=forward disabled=yes dst-port=53 out-interface=!ether1 \
protocol=udp
add action=drop chain=input disabled=yes dst-port=53 in-interface=ether1 \
protocol=udp
add action=drop chain=input disabled=yes dst-port=53 in-interface=ether1 \
protocol=tcp
add action=drop chain=forward disabled=yes dst-port=53 out-interface=!ether1 \
protocol=udp
add action=drop chain=forward disabled=yes dst-port=53 out-interface=!ether1 \
protocol=tcp
add action=fasttrack-connection chain=forward connection-state=\
established,related disabled=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
/ip route
add distance=1 gateway=174.142.135.241
/ip service
set telnet disabled=yes
set ssh disabled=yes
/lcd
set time-interval=daily
/lcd interface pages
set 0 interfaces=wlan1
/ppp secret
add name=123 password=13 profile=vpn
add name=Telrad password=LteAmin! profile=vpn
add name=mark password=mrk123 profile=vpn service=pptp
add name=david password=davi3 profile=vpn
/system clock
set time-zone-name=America/New_York
/system identity
set name=Telrad-TIK
/system lcd
set contrast=0 enabled=no port=parallel type=24x4
/system lcd page
set time disabled=yes display-time=5s
set resources disabled=yes display-time=5s
set uptime disabled=yes display-time=5s
set packets disabled=yes display-time=5s
set bits disabled=yes display-time=5s
set version disabled=yes display-time=5s
set identity disabled=yes display-time=5s
set vlan201-layer2 disabled=yes display-time=5s
set vlan102 disabled=yes display-time=5s
set vlan101-pdn disabled=yes display-time=5s
set vlan12-external disabled=yes display-time=5s
set wlan1 disabled=yes display-time=5s
set ether1 disabled=yes display-time=5s
set ether2 disabled=yes display-time=5s
set ether3 disabled=yes display-time=5s
set ether4 disabled=yes display-time=5s
set ether5 disabled=yes display-time=5s
set ether6 disabled=yes display-time=5s
set ether7 disabled=yes display-time=5s
set ether8 disabled=yes display-time=5s
set sfp1 disabled=yes display-time=5s
set vlan11-bearer disabled=yes display-time=5s
set pptp-out1 disabled=yes display-time=5s
/system routerboard settings
set protected-routerboot=disabled
/tool user-manager database
set db-path=user-manager
 
skuykend
Member Candidate
Member Candidate
Posts: 274
Joined: Tue Oct 06, 2015 7:28 am

Re: high cpu usage 1 pc

Thu Oct 13, 2016 9:28 pm

It seems you're part of a DNS DoS attack. You need to enable the firewall input chain drops for port 53 from the WAN or turn off DNS resolving.
 
User avatar
ZeroByte
Forum Guru
Forum Guru
Posts: 4047
Joined: Wed May 11, 2011 6:08 pm

Re: high cpu usage 1 pc

Thu Oct 13, 2016 9:30 pm

Your DNS filter rules in the input chain are disabled, and your router is being used as part of a DNS-amplifaction DDoS attack.
(note that DNS is using a lot of CPU in your screenshot)

Your firewall's input chain rules are as follows:
/ip firewall filter
add action=accept chain=input disabled=yes dst-port=1723 protocol=tcp
add action=drop chain=input disabled=yes dst-port=53 in-interface=ether1 protocol=udp
add action=drop chain=input disabled=yes dst-port=53 in-interface=ether1 protocol=tcp
I suggest you change them as follows:
/ip firewall filter
add action=accept chain=input connection-state=established,related
add action=drop chain=input in-interface=ether1

Who is online

Users browsing this forum: Valerio5000 and 61 guests