Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UNTUK GAME ONLINE MASUK SINI !!!!!!!!!

    Scheduled Pinned Locked Moved Indonesian
    169 Posts 35 Posters 179.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      abnisrea
      last edited by

      Tambahan lagi … Untuk rekan2 newbie yg menggunakan squid transparent gagal patch sealindo harap dicoba cara ini menggunakan putty console

      squidclient -p 80 -m PURGE http://patch.sealindo.com/patch/normal/version.ini

      semoga bermanfaat
      suskes pfsense indonesia

      1 Reply Last reply Reply Quote 0
      • Q
        queues
        last edited by

        bro… saya sdh ikutin settingan dari halaman pertama.. agar kita tau lusca sudah berjalan dengan baik, caranya bagaimana>

        Om_antoDIGIT tolong diterawang file /tmp/rules.debug saya doong.

        #System aliases
         
        loopback = "{ lo0 }"
        WAN = "{ pppoe0 }"
        LAN = "{ rl0 }"

        #SSH Lockout Table
        table <sshlockout>persist
        table <webconfiguratorlockout>persist
        #pfSnortSam tables
        table <snort2c>table <pfsnortsamout>table <pfsnortsamin>table <virusprot># User Aliases
        Port_game_TCP = "{  18900:18910  1818  39100:39220  49100  40000:40010  7777  19101  27780  29000  22100  5121  6000:6152  2001  9601:9602  8085  11011:11041  13413  19000  5105  10009  5340:5352  6000:6001  29200  10402  9600  15000:15002  16402:16502  3010  11031  4300  11005  6900  6112  14800  23800  13008:13009  16666  28012  5126  15001:15002  12011  12110  1202  7341:7350  7451  8421  6215:6217  12009  14004 }"
        Port_game_UDP = "{  40000:40010  9601:9602  11100:11125  11440:11460  12110  15002  7808:30000  12020:12080  13000:13080  42051:42052 }"

        Gateways

        GWwan = " route-to ( pppoe0 125.161.156.1 ) "

        set loginterface rl0
        set optimization normal
        set limit states 46000
        set limit src-nodes 46000

        set skip on pfsync0

        scrub in on $WAN all    fragment reassemble
        scrub in on $LAN all    fragment reassemble

        nat-anchor "natearly/"
        nat-anchor "natrules/
        "

        Outbound NAT rules

        Subnets to NAT

        tonatsubnets = "{ 192.168.222.0/29 127.0.0.0/8  }"
        nat on $WAN  from $tonatsubnets port 500 to any port 500 -> 125.161.159.233/32 port 500 
        nat on $WAN  from $tonatsubnets to any -> 125.161.159.233/32 port 1024:65535

        Load balancing anchor

        rdr-anchor "relayd/*"

        TFTP proxy

        rdr-anchor "tftp-proxy/*"
        table <direct_networks>{ 125.161.159.233/32 192.168.222.0/29 }

        Setup Squid proxy redirect

        rdr on rl0 proto tcp from any to !(rl0) port 80 -> 127.0.0.1 port 80

        UPnPd rdr anchor

        rdr-anchor "miniupnpd"

        anchor "relayd/*"
        #–-------------------------------------------------------------------------

        default deny rules

        #---------------------------------------------------------------------------
        block in log all label "Default deny rule"
        block out log all label "Default deny rule"

        We use the mighty pf, we cannot be fooled.

        block quick proto { tcp, udp } from any port = 0 to any
        block quick proto { tcp, udp } from any to any port = 0

        Block all IPv6

        block in quick inet6 all
        block out quick inet6 all

        pfSnortSam

        block quick from <snort2c>to any label "Block snort2c hosts"
        block quick from any to <snort2c>label "Block snort2c hosts"
        block quick from <pfsnortsamout>to any label "Block pfSnortSamOut hosts"
        block quick from any to <pfsnortsamin>label "Block pfSnortSamIn hosts"

        SSH lockout

        block in log quick proto tcp from <sshlockout>to any port 22 label "sshlockout"

        webConfigurator lockout

        block in log quick proto tcp from <webconfiguratorlockout>to any port 80 label "webConfiguratorlockout"
        block in quick from <virusprot>to any label "virusprot overload table"
        table <bogons>persist file "/etc/bogons"

        block bogon networks

        http://www.cymru.com/Documents/bogon-bn-nonagg.txt

        block in log quick on $WAN from <bogons>to any label "block bogon networks from WAN"
        antispoof for pppoe0

        block anything from private networks on interfaces with the option set

        antispoof for $WAN
        block in log quick on $WAN from 10.0.0.0/8 to any label "block private networks from wan block 10/8"
        block in log quick on $WAN from 127.0.0.0/8 to any label "block private networks from wan block 127/8"
        block in log quick on $WAN from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"
        block in log quick on $WAN from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
        antispoof for rl0

        loopback

        pass in on $loopback all label "pass loopback"
        pass out on $loopback all label "pass loopback"

        let out anything from the firewall host itself and decrypted IPsec traffic

        pass out all keep state allow-opts label "let out anything from firewall host itself"
        pass out route-to ( pppoe0 125.161.156.1 ) from 125.161.159.233 to !125.161.159.233/32 keep state allow-opts label "let out anything from firewall host itself"

        make sure the user cannot lock himself out of the webConfigurator or SSH

        pass in quick on rl0 proto tcp from any to (rl0) port { 80 22 } keep state label "anti-lockout rule"

        User-defined rules follow

        pass  out  proto udp  from any to any  queue (qVoIP)  label "USER_RULE: DiffServ/Lowdelay/Upload"
        pass  out  proto tcp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
        pass  out  proto udp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
        pass  out  proto tcp  from any to any port 3389  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSRDP outbound"
        pass  out  proto tcp  from any to any port 5899 >< 5931  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other VNC outbound"
        pass  out  proto tcp  from any to any port 3283  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop1 outbound"
        pass  out  proto tcp  from any to any port 5900  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop2 outbound"
        pass  out  proto udp  from any to any port 3283  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop3 outbound"
        pass  out  proto udp  from any to any port 5900  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop4 outbound"
        pass  out  proto tcp  from any to any port 5631  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other pcany1 outbound"
        pass  out  proto udp  from any to any port 5632  queue (qOthersDefault)  label "USER_RULE: m_Other pcany2 outbound"
        pass  out  proto tcp  from any to any port 6666 >< 6671  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
        pass  out  proto tcp  from any to any port 5222  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
        pass  out  proto tcp  from any to any port 5223  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
        pass  out  proto tcp  from any to any port 5269  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
        pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other ICQ1 outbound"
        pass  out  proto udp  from any to any port 5190  queue (qOthersDefault)  label "USER_RULE: m_Other ICQ2 outbound"
        pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AIM outbound"
        pass  out  proto tcp  from any to any port 1863  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN1 outbound"
        pass  out  proto tcp  from any to any port 6890 >< 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN2 outbound"
        pass  out  proto tcp  from any to any port 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN3 outbound"
        pass  out  proto udp  from any to any port 6901  queue (qOthersDefault)  label "USER_RULE: m_Other MSN4 outbound"
        pass  out  proto tcp  from any to any port 14534  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak1 outbound"
        pass  out  proto tcp  from any to any port 51234  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak2 outbound"
        pass  out  proto udp  from any to any port 8766 >< 8769  queue (qOthersDefault)  label "USER_RULE: m_Other teamspeak3 outbound"
        pass  out  proto tcp  from any to any port 1723  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other PPTP outbound"
        pass  out  proto gre  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other PPTPGRE outbound"
        pass  out  proto udp  from any to any port 500  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
        pass  out  proto ah  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
        pass  out  proto esp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
        pass  out  proto tcp  from any to any port 7999 >< 8101  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other STREAMINGMP3 outbound"
        pass  out  proto tcp  from any to any port 554  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other RTSP1 outbound"
        pass  out  proto tcp  from any to any port 80  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTP outbound"
        pass  out  proto tcp  from any to any port 443  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTPS outbound"
        pass  out  proto tcp  from any to any port 25  queue (qOthersLow,qACK)  label "USER_RULE: m_Other SMTP outbound"
        pass  out  proto tcp  from any to any port 110  queue (qOthersLow,qACK)  label "USER_RULE: m_Other POP3 outbound"
        pass  out  proto tcp  from any to any port 143  queue (qOthersLow,qACK)  label "USER_RULE: m_Other IMAP outbound"
        pass  out  proto tcp  from any to any port 1352  queue (qOthersLow,qACK)  label "USER_RULE: m_Other LotusNotes1 outbound"
        pass  out  proto udp  from any to any port 1352  queue (qOthersLow)  label "USER_RULE: m_Other LotusNotes2 outbound"
        pass  out  proto tcp  from any to any port 53  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other DNS1 outbound"
        pass  out  proto udp  from any to any port 53  queue (qOthersHigh)  label "USER_RULE: m_Other DNS2 outbound"
        pass  out  inet proto icmp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other ICMP outbound"
        pass  out  proto tcp  from any to any port 445  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB1 outbound"
        pass  out  proto tcp  from any to any port 136 >< 140  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB2 outbound"
        pass  out  proto tcp  from any to any port 161  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SNMP outbound"
        pass  out  proto udp  from any to any port 161  queue (qOthersDefault)  label "USER_RULE: m_Other SNMP2 outbound"
        pass  out  proto tcp  from any to any port 3306  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MySQL1 outbound"
        pass  out  proto tcp  from any to any port 119  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other NNTP1 outbound"
        pass  out  proto udp  from any to any port 119  queue (qOthersDefault)  label "USER_RULE: m_Other NNTP2 outbound"
        pass  out  proto tcp  from any to any port 5999  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other cvsup outbound"
        pass  out  proto tcp  from any to any port 5001  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other Slingbox1 outbound"
        pass  out  proto udp  from any to any port 5001  queue (qOthersDefault)  label "USER_RULE: m_Other Slingbox2 outbound"
        pass  out  proto tcp  from any to any port 3000  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other HBCI outbound"
        pass  in  quick  on $LAN  proto tcp  from any to any port 1972  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: e-trading"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 53  keep state  queue (qOthersHigh)  label "USER_RULE: dns"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5060  keep state  queue (qVoIP)  label "USER_RULE: nimbuzz"
        pass  in  quick  on $LAN  proto udp  from any to any port 4999 >< 5011  keep state  queue (qVoIP)  label "USER_RULE: Voice Chat "
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8877  keep state  queue (qVoIP)  label "USER_RULE: skype"
        pass  in  quick  on $LAN  proto tcp  from any to any port $Port_game_TCP  flags S/SA keep state  queue (qGames)  label "USER_RULE"
        pass  in  quick  on $LAN  proto udp  from any to any port $Port_game_UDP  keep state  queue (qGames)  label "USER_RULE"
        pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 80  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: http not hit s"
        pass  in  quick  on $LAN  inet proto icmp  from 192.168.222.0/29 to any keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 81  flags S/SA keep state  queue (qOthersDefault)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 20  keep state  queue (qOthersDefault)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 21  keep state  queue (qOthersHigh)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 22  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 23  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 25  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 465  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 587  keep state  queue (qOthersLow)  label "USER_RULE: smtp"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 110  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 443  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 143  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 1755  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 7000  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 123  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 161  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 3000  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5050  keep state  queue (qOthersDefault)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8000 >< 8003  keep state  queue (qOthersLow)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 4999 >< 5002  keep state  queue (qVoIP)  label "USER_RULE"
        pass  in  quick  on $LAN  proto tcp  from any to any port 5099 >< 5102  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
        pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 58999 >< 61000  keep state  queue (qP2P)  label "USER_RULE: alokasi port utk P2P"
        block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 9666  to any  label "USER_RULE"
        block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 8084  to any  label "USER_RULE"

        VPN Rules

        anchor "tftp-proxy/*"

        Setup squid pass rules for proxy

        pass in quick on rl0 proto tcp from any to !(rl0) port 80 flags S/SA keep state
        pass in quick on rl0 proto tcp from any to !(rl0) port 3128 flags S/SA keep state</bogons></bogons></virusprot></webconfiguratorlockout></sshlockout></pfsnortsamin></pfsnortsamout></snort2c></snort2c></direct_networks></virusprot></pfsnortsamin></pfsnortsamout></snort2c></webconfiguratorlockout></sshlockout>

        Mohon Pencerahannya
        tks…

        1 Reply Last reply Reply Quote 0
        • A
          abnisrea
          last edited by

          pake putty console
          login : root
          pass : suka-suka yg buat

          pilih no. 8 (shell) enter

          ketik deh salah satu dibawah ini

          1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
          2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

          1 Reply Last reply Reply Quote 0
          • Q
            queues
            last edited by

            @abnisrea:

            pake putty console
            login : root
            pass : suka-suka yg buat

            pilih no. 8 (shell) enter

            ketik deh salah satu dibawah ini

            1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
            2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

            yang no 1 hasilnya

            tail: /var/squid/logs/access.log: No such file or directory

            yang no 2 hasilnya :

            HTTP/1.1 200 OK
            Server: Lusca/LUSCA r14850 patched: chudy r14
            Date: Fri, 17 Jun 2011 16:28:58 GMT
            Content-Type: text/plain
            Expires: Fri, 17 Jun 2011 16:28:58 GMT
            X-Cache: MISS from localhost
            Transfer-Encoding: chunked
            Via: 1.0 localhost:3128 (Lusca/LUSCA r14850 patched: chudy r14)
            Connection: close

            854
            Squid Object Cache: Version LUSCA r14850 patched: chudy r14
            Start Time:    Fri, 17 Jun 2011 02:36:21 GMT
            Current Time:  Fri, 17 Jun 2011 16:28:58 GMT
            Connection information for squid:
                    Number of clients accessing cache:      3
                    Number of HTTP requests received:      20749
                    Number of ICP messages received:        0
                    Number of ICP messages sent:    0
                    Number of queued ICP replies:  0
                    Request failure ratio:  0.00
                    Average HTTP requests per minute since start:  24.9
                    Average ICP messages per minute since start:    0.0
                    Select loop called: 2862271 times, 17.453 ms avg
            Cache information for squid:
                    Request Hit Ratios:    5min: 22.9%, 60min: 13.5%
                    Byte Hit Ratios:        5min: 7.0%, 60min: 3.5%
                    Request Memory Hit Ratios:      5min: 5.1%, 60min: 26.4%
                    Request Disk Hit Ratios:        5min: 17.9%, 60min: 22.1%
                    Storage Swap size:      281228 KB
                    Storage Mem size:      85012 KB
                    Mean Object Size:      20.76 KB
                    Requests given to unlinkd:      0
            Median Service Times (seconds)  5 min    60 min:
                    HTTP Requests (All):  0.14252  0.37825
                    Cache Misses:          0.35832  0.52331
                    Cache Hits:            0.00194  0.00179
                    Near Hits:            2.25116  0.15888
                    Not-Modified Replies:  0.00000  0.00000
                    DNS Lookups:          0.00000  0.00000
                    ICP Queries:          0.00000  0.00000
            Resource usage for squid:
                    UP Time:        49956.441 seconds
                    CPU Time:      164.668 seconds
                    CPU Usage:      0.33%
                    CPU Usage, 5 minute avg:        0.49%
                    CPU Usage, 60 minute avg:      0.48%
                    Process Data Segment Size via sbrk(): 0 KB
                    Maximum Resident Size: 194880 KB
                    Page faults with physical i/o: 1
            Memory accounted for:
                    Total accounted:        96820 KB
                    memPoolAlloc calls: 4545054
                    memPoolFree calls: 4248515
            File descriptor usage for squid:
                    Maximum number of file descriptors:  58982
                    Largest file desc currently in use:    162
                    Number of file desc currently in use:  28
                    Files queued for open:                  0
                    Available number of file descriptors: 58954
                    Reserved number of file descriptors:  100
                    Store Disk files open:                  3
                    IO loop method:                    kqueue
            Internal Data Structures:
                    13709 StoreEntries
                    11173 StoreEntries with MemObjects
                    11167 Hot Object Cache Items
                    13548 on-disk objects

            0

            berjalan gak ya luscanya?

            1 Reply Last reply Reply Quote 0
            • A
              abnisrea
              last edited by

              Udah jalan Lusca nya

              mungkin harus pake

              tail -f /var/squid/log/access.log –> tuk liat aktivitas squid

              (settingan om anto_digit ya) dicoba ya..

              1 Reply Last reply Reply Quote 0
              • Q
                queues
                last edited by

                pak abnisrea dan rekan2 disini, sdh pernah ada yang create server games DOTA di PfSense?

                1 Reply Last reply Reply Quote 0
                • D
                  detrackmx
                  last edited by

                  @romee13:

                  gan, di warnet ane banyak yang main seafight, biar loadingnya cepet gmn ngaturnya ya? lusca g bisa neg cache seafight ya? kl youtube bisa di cache.

                  bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                  1 Reply Last reply Reply Quote 0
                  • Q
                    queues
                    last edited by

                    @detrackmx:

                    bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                    kalau untuk create server DOTA bisa pak?

                    1 Reply Last reply Reply Quote 0
                    • A
                      abnisrea
                      last edited by

                      Memperlambat Laju Video pada PfSense bagi yg kekurangan bandwith

                      Untuk memperlambat laju Video baik dari Youtub dan lainnya adalah dengan cara menambahkan delay pool pada custom option. contoh

                      acl bad_sites url_regex -i youtube.com redtube.com porn.com –> masukkan link yg akan di perlambat
                      delay_pools 1
                      delay_class 1 1
                      delay_access 1 allow bad_sites
                      delay_parameters 1 64000/8192

                      1 Reply Last reply Reply Quote 0
                      • A
                        abnisrea
                        last edited by

                        Proxy server: General settings

                        Custom Options

                        Custom Option ku pd pfsense
                        Karena bandwidth aku prihatin aku coba-coba rubah PpSense kesayanganku Custom Option di Lusca ku
                        dan hasilnya cukup memuaskan dmana dengan Bandwidth 1M dari Spidol dapat dibagi untuk 20 Unit Client..

                        acl admin src 192.168.1.2/255.255.255.255;
                        acl throttle_exts urlpath_regex -i "/var/squid/acl/throttle_exts.acl";
                        acl bad_sites url_regex -i youtube.com porn.com;
                        delay_pools 3;
                        delay_class 1 1;
                        delay_parameters 1 -1/-1;
                        delay_access 1 allow admin;
                        delay_access 1 deny all;
                        delay_class 2 1;
                        delay_parameters 2 49152/16384;
                        delay_access 2 allow bad_sites;
                        delay_access 2 deny all;
                        delay_class 3 1;
                        delay_parameters 3 12288/8192;
                        delay_initial_bucket_level 100;
                        delay_access 3 allow throttle_exts;
                        delay_access 3 deny all;
                        #zph_mode tos;
                        #zph_local 0x04;
                        #zph_parent 0;
                        #zph_option 136;
                        acl HTML url_regex .ini$;
                        no_cache deny HTML;
                        acl XYZZY url_regex ^http://122.102.49.132/audition/Update.ini$;
                        acl XYZZY url_regex ^http://patch.crossfire.web.id/download/version.ini$;
                        acl XYZZY url_regex ^http://patch.sealindo.com/patch/normal/version.ini$;

                        1 Reply Last reply Reply Quote 0
                        • A
                          anto_DIGIT
                          last edited by

                          Rekan2 ada yang tahu port utk game Ayodance ?  ;D
                          selain TCP 18900:18909

                          1 Reply Last reply Reply Quote 0
                          • P
                            poscom
                            last edited by

                            sma tolong di share port PB thailand, nuhun

                            1 Reply Last reply Reply Quote 0
                            • P
                              poscom
                              last edited by

                              nyobain PB thailand katanyasih lebih bagus gambarnya dan jelas (pake proxy lusca bukan di IE internet explorer)

                              ![PB_thai1 Patch.JPG](/public/imported_attachments/1/PB_thai1 Patch.JPG)
                              ![PB_thai1 Patch.JPG_thumb](/public/imported_attachments/1/PB_thai1 Patch.JPG_thumb)
                              ![PB_thai2 Luscahed.JPG](/public/imported_attachments/1/PB_thai2 Luscahed.JPG)
                              ![PB_thai2 Luscahed.JPG_thumb](/public/imported_attachments/1/PB_thai2 Luscahed.JPG_thumb)

                              1 Reply Last reply Reply Quote 0
                              • A
                                abnisrea
                                last edited by

                                PB Thailanthung..

                                http://pointblank.hitsplay.com/GameInfo/weapon2.aspx
                                http://pointblank.hitsplay.com/download/client.aspx

                                Untuk Info lainnya

                                http://www.kaskus.us/showthread.php?t=3190237

                                1 Reply Last reply Reply Quote 0
                                • A
                                  abnisrea
                                  last edited by

                                  Untuk Game PB yg gagal jalan atau security error dicoba melalui putty console

                                  squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/afs.dat
                                  squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/noupdate.ui
                                  squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahn.ui
                                  squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/patch/39/ahn.ui
                                  squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahni2.dll

                                  1 Reply Last reply Reply Quote 0
                                  • R
                                    RudyPr1y4tn4
                                    last edited by

                                    Mohon bantuan untuk kanda" sekalian yang master dari pfsense…

                                    saya sudah install pfsense dan berjalan normal... yang ingin saya tanyakan apakah ada settingan khusus agar patch game dari Cross Fire & GrandChase tercache??? soalnya kedua game tersebut ketika saya jalankan patchnya tidak tercache sehingga saya harus patch manual untuk setiap komputer client...

                                    Untuk game lainnya seperti PB, Audition/AyoDance, Dan lain-lainnya gak ada masalah... semuanya bisa tercache dengan baik...

                                    Mohon dibantu oleh para sesepuh disini agar bisa memecahkan masalah saya tersebut... terima kasih....

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      jundi49
                                      last edited by

                                      Numpang nanya gan,

                                      Kalau game via facebook ato game berbasis web/http, masuk ke port mana itu ?
                                      Apakah masuk ke port game ato port http ?
                                      Jadi misalnya kita pake Dual Wan, 1 WAN 1 OPT, game ke OPT dan lainnya WAN.
                                      Jadi game fb ato web tersebut mengambil akses internet yang mana ?
                                      Dan bagaimana jika berjalan bersamaan, gamenya ?
                                      terima kasih.
                                      Mohon bantuannya.

                                      1 Reply Last reply Reply Quote 0
                                      • N
                                        netcraft
                                        last edited by

                                        Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          jundi49
                                          last edited by

                                          @netcraft:

                                          Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                          ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
                                          apakah game fb itu masuk ke dalam port game online ?
                                          apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?

                                          1 Reply Last reply Reply Quote 0
                                          • C
                                            chiboik
                                            last edited by

                                            @jundi49:

                                            @netcraft:

                                            Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                            ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
                                            apakah game fb itu masuk ke dalam port game online ?
                                            apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?

                                            bikin rule di firewall rules nya aja mas, TCP/UDP source addr > LAN subnet,  Destination port > http/80,  Gateway > WAN
                                            untuk port game nya pake config aliase game online Gateway nya ke OPT

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.