Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UNTUK GAME ONLINE MASUK SINI !!!!!!!!!

    Scheduled Pinned Locked Moved Indonesian
    169 Posts 35 Posters 173.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      abnisrea
      last edited by

      Tambahan lagi … Untuk rekan2 newbie yg menggunakan squid transparent gagal patch crossfire atau ada error spt gmbr dibawah ini :
      harap dicoba cara ini menggunakan putty console

      squidclient -p 80 -m PURGE http://patch.crossfire.web.id/download/version.ini

      semoga bermanfaat
      suskes pfsense indonesia

      crossfire.JPG
      crossfire.JPG_thumb

      1 Reply Last reply Reply Quote 0
      • A
        abnisrea
        last edited by

        Tambahan lagi … Untuk rekan2 newbie yg menggunakan squid transparent gagal patch sealindo harap dicoba cara ini menggunakan putty console

        squidclient -p 80 -m PURGE http://patch.sealindo.com/patch/normal/version.ini

        semoga bermanfaat
        suskes pfsense indonesia

        1 Reply Last reply Reply Quote 0
        • Q
          queues
          last edited by

          bro… saya sdh ikutin settingan dari halaman pertama.. agar kita tau lusca sudah berjalan dengan baik, caranya bagaimana>

          Om_antoDIGIT tolong diterawang file /tmp/rules.debug saya doong.

          #System aliases
           
          loopback = "{ lo0 }"
          WAN = "{ pppoe0 }"
          LAN = "{ rl0 }"

          #SSH Lockout Table
          table <sshlockout>persist
          table <webconfiguratorlockout>persist
          #pfSnortSam tables
          table <snort2c>table <pfsnortsamout>table <pfsnortsamin>table <virusprot># User Aliases
          Port_game_TCP = "{  18900:18910  1818  39100:39220  49100  40000:40010  7777  19101  27780  29000  22100  5121  6000:6152  2001  9601:9602  8085  11011:11041  13413  19000  5105  10009  5340:5352  6000:6001  29200  10402  9600  15000:15002  16402:16502  3010  11031  4300  11005  6900  6112  14800  23800  13008:13009  16666  28012  5126  15001:15002  12011  12110  1202  7341:7350  7451  8421  6215:6217  12009  14004 }"
          Port_game_UDP = "{  40000:40010  9601:9602  11100:11125  11440:11460  12110  15002  7808:30000  12020:12080  13000:13080  42051:42052 }"

          Gateways

          GWwan = " route-to ( pppoe0 125.161.156.1 ) "

          set loginterface rl0
          set optimization normal
          set limit states 46000
          set limit src-nodes 46000

          set skip on pfsync0

          scrub in on $WAN all    fragment reassemble
          scrub in on $LAN all    fragment reassemble

          nat-anchor "natearly/"
          nat-anchor "natrules/
          "

          Outbound NAT rules

          Subnets to NAT

          tonatsubnets = "{ 192.168.222.0/29 127.0.0.0/8  }"
          nat on $WAN  from $tonatsubnets port 500 to any port 500 -> 125.161.159.233/32 port 500 
          nat on $WAN  from $tonatsubnets to any -> 125.161.159.233/32 port 1024:65535

          Load balancing anchor

          rdr-anchor "relayd/*"

          TFTP proxy

          rdr-anchor "tftp-proxy/*"
          table <direct_networks>{ 125.161.159.233/32 192.168.222.0/29 }

          Setup Squid proxy redirect

          rdr on rl0 proto tcp from any to !(rl0) port 80 -> 127.0.0.1 port 80

          UPnPd rdr anchor

          rdr-anchor "miniupnpd"

          anchor "relayd/*"
          #–-------------------------------------------------------------------------

          default deny rules

          #---------------------------------------------------------------------------
          block in log all label "Default deny rule"
          block out log all label "Default deny rule"

          We use the mighty pf, we cannot be fooled.

          block quick proto { tcp, udp } from any port = 0 to any
          block quick proto { tcp, udp } from any to any port = 0

          Block all IPv6

          block in quick inet6 all
          block out quick inet6 all

          pfSnortSam

          block quick from <snort2c>to any label "Block snort2c hosts"
          block quick from any to <snort2c>label "Block snort2c hosts"
          block quick from <pfsnortsamout>to any label "Block pfSnortSamOut hosts"
          block quick from any to <pfsnortsamin>label "Block pfSnortSamIn hosts"

          SSH lockout

          block in log quick proto tcp from <sshlockout>to any port 22 label "sshlockout"

          webConfigurator lockout

          block in log quick proto tcp from <webconfiguratorlockout>to any port 80 label "webConfiguratorlockout"
          block in quick from <virusprot>to any label "virusprot overload table"
          table <bogons>persist file "/etc/bogons"

          block bogon networks

          http://www.cymru.com/Documents/bogon-bn-nonagg.txt

          block in log quick on $WAN from <bogons>to any label "block bogon networks from WAN"
          antispoof for pppoe0

          block anything from private networks on interfaces with the option set

          antispoof for $WAN
          block in log quick on $WAN from 10.0.0.0/8 to any label "block private networks from wan block 10/8"
          block in log quick on $WAN from 127.0.0.0/8 to any label "block private networks from wan block 127/8"
          block in log quick on $WAN from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"
          block in log quick on $WAN from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
          antispoof for rl0

          loopback

          pass in on $loopback all label "pass loopback"
          pass out on $loopback all label "pass loopback"

          let out anything from the firewall host itself and decrypted IPsec traffic

          pass out all keep state allow-opts label "let out anything from firewall host itself"
          pass out route-to ( pppoe0 125.161.156.1 ) from 125.161.159.233 to !125.161.159.233/32 keep state allow-opts label "let out anything from firewall host itself"

          make sure the user cannot lock himself out of the webConfigurator or SSH

          pass in quick on rl0 proto tcp from any to (rl0) port { 80 22 } keep state label "anti-lockout rule"

          User-defined rules follow

          pass  out  proto udp  from any to any  queue (qVoIP)  label "USER_RULE: DiffServ/Lowdelay/Upload"
          pass  out  proto tcp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
          pass  out  proto udp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
          pass  out  proto tcp  from any to any port 3389  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSRDP outbound"
          pass  out  proto tcp  from any to any port 5899 >< 5931  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other VNC outbound"
          pass  out  proto tcp  from any to any port 3283  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop1 outbound"
          pass  out  proto tcp  from any to any port 5900  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop2 outbound"
          pass  out  proto udp  from any to any port 3283  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop3 outbound"
          pass  out  proto udp  from any to any port 5900  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop4 outbound"
          pass  out  proto tcp  from any to any port 5631  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other pcany1 outbound"
          pass  out  proto udp  from any to any port 5632  queue (qOthersDefault)  label "USER_RULE: m_Other pcany2 outbound"
          pass  out  proto tcp  from any to any port 6666 >< 6671  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
          pass  out  proto tcp  from any to any port 5222  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
          pass  out  proto tcp  from any to any port 5223  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
          pass  out  proto tcp  from any to any port 5269  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
          pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other ICQ1 outbound"
          pass  out  proto udp  from any to any port 5190  queue (qOthersDefault)  label "USER_RULE: m_Other ICQ2 outbound"
          pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AIM outbound"
          pass  out  proto tcp  from any to any port 1863  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN1 outbound"
          pass  out  proto tcp  from any to any port 6890 >< 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN2 outbound"
          pass  out  proto tcp  from any to any port 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN3 outbound"
          pass  out  proto udp  from any to any port 6901  queue (qOthersDefault)  label "USER_RULE: m_Other MSN4 outbound"
          pass  out  proto tcp  from any to any port 14534  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak1 outbound"
          pass  out  proto tcp  from any to any port 51234  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak2 outbound"
          pass  out  proto udp  from any to any port 8766 >< 8769  queue (qOthersDefault)  label "USER_RULE: m_Other teamspeak3 outbound"
          pass  out  proto tcp  from any to any port 1723  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other PPTP outbound"
          pass  out  proto gre  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other PPTPGRE outbound"
          pass  out  proto udp  from any to any port 500  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
          pass  out  proto ah  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
          pass  out  proto esp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
          pass  out  proto tcp  from any to any port 7999 >< 8101  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other STREAMINGMP3 outbound"
          pass  out  proto tcp  from any to any port 554  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other RTSP1 outbound"
          pass  out  proto tcp  from any to any port 80  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTP outbound"
          pass  out  proto tcp  from any to any port 443  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTPS outbound"
          pass  out  proto tcp  from any to any port 25  queue (qOthersLow,qACK)  label "USER_RULE: m_Other SMTP outbound"
          pass  out  proto tcp  from any to any port 110  queue (qOthersLow,qACK)  label "USER_RULE: m_Other POP3 outbound"
          pass  out  proto tcp  from any to any port 143  queue (qOthersLow,qACK)  label "USER_RULE: m_Other IMAP outbound"
          pass  out  proto tcp  from any to any port 1352  queue (qOthersLow,qACK)  label "USER_RULE: m_Other LotusNotes1 outbound"
          pass  out  proto udp  from any to any port 1352  queue (qOthersLow)  label "USER_RULE: m_Other LotusNotes2 outbound"
          pass  out  proto tcp  from any to any port 53  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other DNS1 outbound"
          pass  out  proto udp  from any to any port 53  queue (qOthersHigh)  label "USER_RULE: m_Other DNS2 outbound"
          pass  out  inet proto icmp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other ICMP outbound"
          pass  out  proto tcp  from any to any port 445  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB1 outbound"
          pass  out  proto tcp  from any to any port 136 >< 140  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB2 outbound"
          pass  out  proto tcp  from any to any port 161  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SNMP outbound"
          pass  out  proto udp  from any to any port 161  queue (qOthersDefault)  label "USER_RULE: m_Other SNMP2 outbound"
          pass  out  proto tcp  from any to any port 3306  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MySQL1 outbound"
          pass  out  proto tcp  from any to any port 119  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other NNTP1 outbound"
          pass  out  proto udp  from any to any port 119  queue (qOthersDefault)  label "USER_RULE: m_Other NNTP2 outbound"
          pass  out  proto tcp  from any to any port 5999  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other cvsup outbound"
          pass  out  proto tcp  from any to any port 5001  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other Slingbox1 outbound"
          pass  out  proto udp  from any to any port 5001  queue (qOthersDefault)  label "USER_RULE: m_Other Slingbox2 outbound"
          pass  out  proto tcp  from any to any port 3000  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other HBCI outbound"
          pass  in  quick  on $LAN  proto tcp  from any to any port 1972  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: e-trading"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 53  keep state  queue (qOthersHigh)  label "USER_RULE: dns"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5060  keep state  queue (qVoIP)  label "USER_RULE: nimbuzz"
          pass  in  quick  on $LAN  proto udp  from any to any port 4999 >< 5011  keep state  queue (qVoIP)  label "USER_RULE: Voice Chat "
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8877  keep state  queue (qVoIP)  label "USER_RULE: skype"
          pass  in  quick  on $LAN  proto tcp  from any to any port $Port_game_TCP  flags S/SA keep state  queue (qGames)  label "USER_RULE"
          pass  in  quick  on $LAN  proto udp  from any to any port $Port_game_UDP  keep state  queue (qGames)  label "USER_RULE"
          pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 80  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: http not hit s"
          pass  in  quick  on $LAN  inet proto icmp  from 192.168.222.0/29 to any keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 81  flags S/SA keep state  queue (qOthersDefault)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 20  keep state  queue (qOthersDefault)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 21  keep state  queue (qOthersHigh)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 22  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 23  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 25  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 465  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 587  keep state  queue (qOthersLow)  label "USER_RULE: smtp"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 110  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 443  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 143  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 1755  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 7000  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 123  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 161  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 3000  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5050  keep state  queue (qOthersDefault)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8000 >< 8003  keep state  queue (qOthersLow)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 4999 >< 5002  keep state  queue (qVoIP)  label "USER_RULE"
          pass  in  quick  on $LAN  proto tcp  from any to any port 5099 >< 5102  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
          pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 58999 >< 61000  keep state  queue (qP2P)  label "USER_RULE: alokasi port utk P2P"
          block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 9666  to any  label "USER_RULE"
          block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 8084  to any  label "USER_RULE"

          VPN Rules

          anchor "tftp-proxy/*"

          Setup squid pass rules for proxy

          pass in quick on rl0 proto tcp from any to !(rl0) port 80 flags S/SA keep state
          pass in quick on rl0 proto tcp from any to !(rl0) port 3128 flags S/SA keep state</bogons></bogons></virusprot></webconfiguratorlockout></sshlockout></pfsnortsamin></pfsnortsamout></snort2c></snort2c></direct_networks></virusprot></pfsnortsamin></pfsnortsamout></snort2c></webconfiguratorlockout></sshlockout>

          Mohon Pencerahannya
          tks…

          1 Reply Last reply Reply Quote 0
          • A
            abnisrea
            last edited by

            pake putty console
            login : root
            pass : suka-suka yg buat

            pilih no. 8 (shell) enter

            ketik deh salah satu dibawah ini

            1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
            2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

            1 Reply Last reply Reply Quote 0
            • Q
              queues
              last edited by

              @abnisrea:

              pake putty console
              login : root
              pass : suka-suka yg buat

              pilih no. 8 (shell) enter

              ketik deh salah satu dibawah ini

              1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
              2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

              yang no 1 hasilnya

              tail: /var/squid/logs/access.log: No such file or directory

              yang no 2 hasilnya :

              HTTP/1.1 200 OK
              Server: Lusca/LUSCA r14850 patched: chudy r14
              Date: Fri, 17 Jun 2011 16:28:58 GMT
              Content-Type: text/plain
              Expires: Fri, 17 Jun 2011 16:28:58 GMT
              X-Cache: MISS from localhost
              Transfer-Encoding: chunked
              Via: 1.0 localhost:3128 (Lusca/LUSCA r14850 patched: chudy r14)
              Connection: close

              854
              Squid Object Cache: Version LUSCA r14850 patched: chudy r14
              Start Time:    Fri, 17 Jun 2011 02:36:21 GMT
              Current Time:  Fri, 17 Jun 2011 16:28:58 GMT
              Connection information for squid:
                      Number of clients accessing cache:      3
                      Number of HTTP requests received:      20749
                      Number of ICP messages received:        0
                      Number of ICP messages sent:    0
                      Number of queued ICP replies:  0
                      Request failure ratio:  0.00
                      Average HTTP requests per minute since start:  24.9
                      Average ICP messages per minute since start:    0.0
                      Select loop called: 2862271 times, 17.453 ms avg
              Cache information for squid:
                      Request Hit Ratios:    5min: 22.9%, 60min: 13.5%
                      Byte Hit Ratios:        5min: 7.0%, 60min: 3.5%
                      Request Memory Hit Ratios:      5min: 5.1%, 60min: 26.4%
                      Request Disk Hit Ratios:        5min: 17.9%, 60min: 22.1%
                      Storage Swap size:      281228 KB
                      Storage Mem size:      85012 KB
                      Mean Object Size:      20.76 KB
                      Requests given to unlinkd:      0
              Median Service Times (seconds)  5 min    60 min:
                      HTTP Requests (All):  0.14252  0.37825
                      Cache Misses:          0.35832  0.52331
                      Cache Hits:            0.00194  0.00179
                      Near Hits:            2.25116  0.15888
                      Not-Modified Replies:  0.00000  0.00000
                      DNS Lookups:          0.00000  0.00000
                      ICP Queries:          0.00000  0.00000
              Resource usage for squid:
                      UP Time:        49956.441 seconds
                      CPU Time:      164.668 seconds
                      CPU Usage:      0.33%
                      CPU Usage, 5 minute avg:        0.49%
                      CPU Usage, 60 minute avg:      0.48%
                      Process Data Segment Size via sbrk(): 0 KB
                      Maximum Resident Size: 194880 KB
                      Page faults with physical i/o: 1
              Memory accounted for:
                      Total accounted:        96820 KB
                      memPoolAlloc calls: 4545054
                      memPoolFree calls: 4248515
              File descriptor usage for squid:
                      Maximum number of file descriptors:  58982
                      Largest file desc currently in use:    162
                      Number of file desc currently in use:  28
                      Files queued for open:                  0
                      Available number of file descriptors: 58954
                      Reserved number of file descriptors:  100
                      Store Disk files open:                  3
                      IO loop method:                    kqueue
              Internal Data Structures:
                      13709 StoreEntries
                      11173 StoreEntries with MemObjects
                      11167 Hot Object Cache Items
                      13548 on-disk objects

              0

              berjalan gak ya luscanya?

              1 Reply Last reply Reply Quote 0
              • A
                abnisrea
                last edited by

                Udah jalan Lusca nya

                mungkin harus pake

                tail -f /var/squid/log/access.log –> tuk liat aktivitas squid

                (settingan om anto_digit ya) dicoba ya..

                1 Reply Last reply Reply Quote 0
                • Q
                  queues
                  last edited by

                  pak abnisrea dan rekan2 disini, sdh pernah ada yang create server games DOTA di PfSense?

                  1 Reply Last reply Reply Quote 0
                  • D
                    detrackmx
                    last edited by

                    @romee13:

                    gan, di warnet ane banyak yang main seafight, biar loadingnya cepet gmn ngaturnya ya? lusca g bisa neg cache seafight ya? kl youtube bisa di cache.

                    bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                    1 Reply Last reply Reply Quote 0
                    • Q
                      queues
                      last edited by

                      @detrackmx:

                      bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                      kalau untuk create server DOTA bisa pak?

                      1 Reply Last reply Reply Quote 0
                      • A
                        abnisrea
                        last edited by

                        Memperlambat Laju Video pada PfSense bagi yg kekurangan bandwith

                        Untuk memperlambat laju Video baik dari Youtub dan lainnya adalah dengan cara menambahkan delay pool pada custom option. contoh

                        acl bad_sites url_regex -i youtube.com redtube.com porn.com –> masukkan link yg akan di perlambat
                        delay_pools 1
                        delay_class 1 1
                        delay_access 1 allow bad_sites
                        delay_parameters 1 64000/8192

                        1 Reply Last reply Reply Quote 0
                        • A
                          abnisrea
                          last edited by

                          Proxy server: General settings

                          Custom Options

                          Custom Option ku pd pfsense
                          Karena bandwidth aku prihatin aku coba-coba rubah PpSense kesayanganku Custom Option di Lusca ku
                          dan hasilnya cukup memuaskan dmana dengan Bandwidth 1M dari Spidol dapat dibagi untuk 20 Unit Client..

                          acl admin src 192.168.1.2/255.255.255.255;
                          acl throttle_exts urlpath_regex -i "/var/squid/acl/throttle_exts.acl";
                          acl bad_sites url_regex -i youtube.com porn.com;
                          delay_pools 3;
                          delay_class 1 1;
                          delay_parameters 1 -1/-1;
                          delay_access 1 allow admin;
                          delay_access 1 deny all;
                          delay_class 2 1;
                          delay_parameters 2 49152/16384;
                          delay_access 2 allow bad_sites;
                          delay_access 2 deny all;
                          delay_class 3 1;
                          delay_parameters 3 12288/8192;
                          delay_initial_bucket_level 100;
                          delay_access 3 allow throttle_exts;
                          delay_access 3 deny all;
                          #zph_mode tos;
                          #zph_local 0x04;
                          #zph_parent 0;
                          #zph_option 136;
                          acl HTML url_regex .ini$;
                          no_cache deny HTML;
                          acl XYZZY url_regex ^http://122.102.49.132/audition/Update.ini$;
                          acl XYZZY url_regex ^http://patch.crossfire.web.id/download/version.ini$;
                          acl XYZZY url_regex ^http://patch.sealindo.com/patch/normal/version.ini$;

                          1 Reply Last reply Reply Quote 0
                          • A
                            anto_DIGIT
                            last edited by

                            Rekan2 ada yang tahu port utk game Ayodance ?  ;D
                            selain TCP 18900:18909

                            1 Reply Last reply Reply Quote 0
                            • P
                              poscom
                              last edited by

                              sma tolong di share port PB thailand, nuhun

                              1 Reply Last reply Reply Quote 0
                              • P
                                poscom
                                last edited by

                                nyobain PB thailand katanyasih lebih bagus gambarnya dan jelas (pake proxy lusca bukan di IE internet explorer)

                                ![PB_thai1 Patch.JPG](/public/imported_attachments/1/PB_thai1 Patch.JPG)
                                ![PB_thai1 Patch.JPG_thumb](/public/imported_attachments/1/PB_thai1 Patch.JPG_thumb)
                                ![PB_thai2 Luscahed.JPG](/public/imported_attachments/1/PB_thai2 Luscahed.JPG)
                                ![PB_thai2 Luscahed.JPG_thumb](/public/imported_attachments/1/PB_thai2 Luscahed.JPG_thumb)

                                1 Reply Last reply Reply Quote 0
                                • A
                                  abnisrea
                                  last edited by

                                  PB Thailanthung..

                                  http://pointblank.hitsplay.com/GameInfo/weapon2.aspx
                                  http://pointblank.hitsplay.com/download/client.aspx

                                  Untuk Info lainnya

                                  http://www.kaskus.us/showthread.php?t=3190237

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    abnisrea
                                    last edited by

                                    Untuk Game PB yg gagal jalan atau security error dicoba melalui putty console

                                    squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/afs.dat
                                    squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/noupdate.ui
                                    squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahn.ui
                                    squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/patch/39/ahn.ui
                                    squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahni2.dll

                                    1 Reply Last reply Reply Quote 0
                                    • R
                                      RudyPr1y4tn4
                                      last edited by

                                      Mohon bantuan untuk kanda" sekalian yang master dari pfsense…

                                      saya sudah install pfsense dan berjalan normal... yang ingin saya tanyakan apakah ada settingan khusus agar patch game dari Cross Fire & GrandChase tercache??? soalnya kedua game tersebut ketika saya jalankan patchnya tidak tercache sehingga saya harus patch manual untuk setiap komputer client...

                                      Untuk game lainnya seperti PB, Audition/AyoDance, Dan lain-lainnya gak ada masalah... semuanya bisa tercache dengan baik...

                                      Mohon dibantu oleh para sesepuh disini agar bisa memecahkan masalah saya tersebut... terima kasih....

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jundi49
                                        last edited by

                                        Numpang nanya gan,

                                        Kalau game via facebook ato game berbasis web/http, masuk ke port mana itu ?
                                        Apakah masuk ke port game ato port http ?
                                        Jadi misalnya kita pake Dual Wan, 1 WAN 1 OPT, game ke OPT dan lainnya WAN.
                                        Jadi game fb ato web tersebut mengambil akses internet yang mana ?
                                        Dan bagaimana jika berjalan bersamaan, gamenya ?
                                        terima kasih.
                                        Mohon bantuannya.

                                        1 Reply Last reply Reply Quote 0
                                        • N
                                          netcraft
                                          last edited by

                                          Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                          1 Reply Last reply Reply Quote 0
                                          • J
                                            jundi49
                                            last edited by

                                            @netcraft:

                                            Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                            ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
                                            apakah game fb itu masuk ke dalam port game online ?
                                            apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.