• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Trying to resolve problem with traffic shaper wizard rules

2.4 Development Snapshots
4
11
1.7k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    chrcoluk
    last edited by Jan 10, 2017, 4:33 PM

    Ok guys, following some good advice from dotdash, here is a clean thread on an issue I am having with pfSense.

    Information is this.

    pfSense version is 2.4 using early Jan snapshot.
    Isp is sky UK who I connect via WAN_DHCP and WAN_DHCP6 for ipv6.
    I have one WAN interface, and one LAN interface, there is also a openvpn interface.
    Hardware is 2 x intel i350 network ports, and a braswell chipset.

    The problem is when I run through the wizard and select the options for my need's the traffic is not correctly going to the right queues.

    I have tried both wizard's one for dedicated link and the for multi wan/lan.
    To try and keep diagnosis simple I am sticking to HSFC queues and not adjusting to FAIRQ after the wizard has ran for this issue.

    The queue status screen shows the vast majority of traffic on the default queue with a small amount of packets in the qACK queue.  All other queues remain hard fixed at 0.

    The options passed onto the wizard are.

    HSFC for LAN and WAN, speed of internet connection, and priorities as follows, priorities not mentioned mean they disabled/default.

    msn, git, irc, dns, remote desktop, ntp, vnc, icmp high priority
    http, steam downloads, battlenet downloads low priority.

    Tests  have run include httpd downloads, steam downloads, dns benchmarks (to flood connection with dns queries).
    I disabled my nat rule to force dns connections to the local resolver so dns tests are actually using external dns connections.

    The results I see are as follows.

    A small amount of traffic registered as qACK it is definitely less than the actual ack traffic as measured by other means.
    HTTP traffic is all in the default queues for both up and down.
    DNS traffic is also all in default.

    If I examine the counters on the rule page for the individual rules added by the wizard, the TCP based rules appear to increase slightly when a connection is initiated (syn process) but then do not budge during the download.
    UDP based DNS rule doesnt match anything at all, it remains fixed on 0.
    floating1.png
    floating1.png_thumb
    floating2.png
    floating2.png_thumb

    pfSense CE 2.7.2

    1 Reply Last reply Reply Quote 0
    • A
      athurdent
      last edited by Jan 10, 2017, 5:09 PM Jan 10, 2017, 4:51 PM

      Quite a few rules there. I'd keep it simple. In order to troubleshoot you should only create one rule, SSH for example. Flush your state table. Then SSH to a IPv4 IP (your match rules are IPV4 only, maybe your LAN client uses IPv6) and see if it gets hit.

      Edit: also set the logging option for that rule and check the log if it gets hit

      1 Reply Last reply Reply Quote 0
      • C
        chrcoluk
        last edited by Jan 10, 2017, 6:41 PM

        The rules were created by the wizard not me. Except that top one which is not related to the wizard at all.

        pfSense CE 2.7.2

        1 Reply Last reply Reply Quote 0
        • N
          Nullity
          last edited by Jan 10, 2017, 11:26 PM

          Sorry if I missed it but why aren't you using a stable release?

          Like @athurdent said, you should trouble-shoot firewall rules first and confirm that they are catching the proper traffic then once that is confirmed you can move on to assigned that traffic to the proper queues.

          Your top rule, do you have "Quick" toggled?

          Please correct any obvious misinformation in my posts.
          -Not a professional; an arrogant ignoramous.

          1 Reply Last reply Reply Quote 0
          • C
            chrcoluk
            last edited by Jan 11, 2017, 5:30 PM

            I am not using 2.2 because there is fixes in 2.4 for my isp, so I had to upgrade.

            I troubleshooted the rules by watching the hit counters for the rules.  I already did this.

            This is how I determined that the match rules are only matching the initial setup packets, and not the data after it, it is as if the keep state part of the rule is not working, as its the same behaviour one would see if keep state was missing.

            pfSense CE 2.7.2

            1 Reply Last reply Reply Quote 0
            • A
              athurdent
              last edited by Jan 11, 2017, 5:51 PM

              Like I said, please turn on logging for the rules you need to debug. Just because the state counter goes up by one it does not mean that the packet you thought was matched. And try with just one rule for a start and choose something easy to track like SSH.
              Also consider that you might be using IPv6 for some connections and your IPv4 rules would never get hit, we don't know about your network setup to be sure.

              1 Reply Last reply Reply Quote 0
              • C
                chrcoluk
                last edited by Jan 11, 2017, 7:48 PM

                @athurdent:

                Like I said, please turn on logging for the rules you need to debug. Just because the state counter goes up by one it does not mean that the packet you thought was matched. And try with just one rule for a start and choose something easy to track like SSH.
                Also consider that you might be using IPv6 for some connections and your IPv4 rules would never get hit, we don't know about your network setup to be sure.

                I am knowledgeable enough to know if I am going over ipv4 or ipv6 for a specific connection :)

                I have already done the logging test, so can tell you the result.

                It logs to the log when the connection is setup.  So as determined by checking the packet counters the initial connection is matched up, however it then behaves as if keep state was turned off.  No further packets get logged or tallied for the duration of the connection.

                I cannot put a time on when I will do the specific test you requested which is one rule for ssh only with logging enabled, but I will report back here when I have done that test.  I connect to ssh directly over ip, so there is zero chance of it going over ipv6 as the actual ipv4 address is specified in the settings.  I never use hostnames for ssh.

                Also iftop and pftop confirm this as well.

                pfSense CE 2.7.2

                1 Reply Last reply Reply Quote 0
                • A
                  athurdent
                  last edited by Jan 12, 2017, 7:52 AM

                  @chrcoluk: Had half an hour to test this myself. Opened a new thread for this as it might be ICMP specific.

                  https://forum.pfsense.org/index.php?topic=123854.0

                  1 Reply Last reply Reply Quote 0
                  • C
                    chrcoluk
                    last edited by Jan 12, 2017, 5:18 PM

                    yeah, I replied there :)

                    In my case its not icmp specific tho.

                    pfSense CE 2.7.2

                    1 Reply Last reply Reply Quote 0
                    • P
                      PiBa
                      last edited by Jan 12, 2017, 10:06 PM

                      FYI, ive tried reproducing the issue and diagnosing it a little. And it seems 'match' rules don't work on 2.4 'pass quick' rules do successfully shape my test traffic. But that should not be required.. (I did not use the wizard to setup the rules but that shouldnt make a difference, i do have working shapers on my 2.3.2 box.. I did not check counters on the rules, but did check what status/queues shows while traffic is passing.. With match rules counters stay on 0 except for the default queue..
                      Ive filed a bug for it on redmine: https://redmine.pfsense.org/issues/7116

                      1 Reply Last reply Reply Quote 0
                      • C
                        chrcoluk
                        last edited by Jan 12, 2017, 10:34 PM

                        thanks for your testing PiBa is appreciated.

                        pfSense CE 2.7.2

                        1 Reply Last reply Reply Quote 0
                        9 out of 11
                        • First post
                          9/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.