{"id":3706,"date":"2012-05-23T16:21:34","date_gmt":"2012-05-23T14:21:34","guid":{"rendered":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh.jpg"},"modified":"2012-05-23T16:21:34","modified_gmt":"2012-05-23T14:21:34","slug":"reglas-de-filtrado-creadas-para-ssh","status":"inherit","type":"attachment","link":"https:\/\/eltallerdelbit.com\/firewall-zentyal\/reglas-de-filtrado-creadas-para-ssh\/#main","title":{"rendered":"Reglas de filtrado creadas para ssh"},"author":1,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false},"aioseo_notices":[],"description":{"rendered":"

\"Reglas<\/a><\/p>\n

Finalmente , observamos todas las reglas de filtrado<\/strong> creadas para permitir el log y el acceso a las conexiones SSH<\/strong> en Zentyal.<\/p>\n\n

<\/div>"},"caption":{"rendered":"

Finalmente , observamos todas las reglas de filtrado creadas para permitir el log y el acceso a las conexiones SSH en Zentyal.<\/p>\n"},"alt_text":"Reglas Filtrado para permitir SSH","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":"784","height":"220","hwstring_small":"height='35' width='128'","file":"2012\/05\/Reglas-de-filtrado-creadas-para-ssh.jpg","sizes":{"thumbnail":{"file":"Reglas-de-filtrado-creadas-para-ssh-150x150.jpg","width":"150","height":"150","wp_smushit":"Reduced by 17.2% (743 B)","source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh-150x150.jpg"},"medium":{"file":"Reglas-de-filtrado-creadas-para-ssh-300x84.jpg","width":"300","height":"84","wp_smushit":"Reduced by 13.6% (981 B)","source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh-300x84.jpg"},"post-thumbnail":{"file":"Reglas-de-filtrado-creadas-para-ssh-150x100.jpg","width":"150","height":"100","wp_smushit":"Reduced by 15.7% (633 B)","source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh-150x100.jpg"},"featured":{"file":"Reglas-de-filtrado-creadas-para-ssh-300x200.jpg","width":"300","height":"200","wp_smushit":"Reduced by 18.1% (1.6 KB)","source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh-300x200.jpg"},"full":{"file":"Reglas-de-filtrado-creadas-para-ssh.jpg","width":784,"height":220,"mime_type":"image\/jpeg","source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":""},"wp_smushit":"Reduced by 18.0% (6.3 KB)"},"post":3657,"source_url":"https:\/\/eltallerdelbit.com\/wp-content\/uploads\/2012\/05\/Reglas-de-filtrado-creadas-para-ssh.jpg","_links":{"self":[{"href":"https:\/\/eltallerdelbit.com\/wp-json\/wp\/v2\/media\/3706"}],"collection":[{"href":"https:\/\/eltallerdelbit.com\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/eltallerdelbit.com\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/eltallerdelbit.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eltallerdelbit.com\/wp-json\/wp\/v2\/comments?post=3706"}]}}