Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Crashplan Traffic Shaping

    Scheduled Pinned Locked Moved Traffic Shaping
    14 Posts 3 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      Harvy66
      last edited by

      I find it interesting that you use DSCP 56, which is CS7 and is the highest priority of the "Class Selector" tags. Why not use CS1(8 (Scavenger: YouTube, Gaming, P2P))? Not that it really matters because you can manually assign any DSCP to any queue.

      1 Reply Last reply Reply Quote 0
      • T
        thezfunk
        last edited by

        @Harvy66:

        I find it interesting that you use DSCP 56, which is CS7 and is the highest priority of the "Class Selector" tags. Why not use CS1(8 (Scavenger: YouTube, Gaming, P2P))? Not that it really matters because you can manually assign any DSCP to any queue.

        Only because I don't know any better.

        I see your point but if I am manually limiting it to a lower queue it shouldn't really matter?  Point being, it doesn't seem to change anything one way or another.

        1 Reply Last reply Reply Quote 0
        • T
          thezfunk
          last edited by

          @Animosity022:

          There is a good link here on floating rules and why to use them:

          https://doc.pfsense.org/index.php/What_are_Floating_Rules

          I do a very simplistic set of queues with a high/default/low and my floats look like this:

          They match last wins, so you have to have them in the right order to work. If I recall, does Crashplan do UPNP for the port mappings or do you have just a single NAT configured per internal host? I know UPNP shaping is more annoying as my crashplans are configured like this and you can see the UPNP mapping:

          I personally just limit crashplan and do backups over night.

          Your queues are much simpler than mine.  I used the wizard and that's why I came up with so many different ones.  I have a huge floating rules list.  It is mostly for all the different gaming systems (xbox, playstation, steam, riot, etc).

          I know Crashplan is using HTTPS (443) to upload.  I don't understand why or how that got into the qGames though.  There might be a rule buried in my floating rules that puts 443 in that queue?  Maybe, I should start over my traffic shaping and start simpler to help track this down.

          Right now I am uploading 1.2GB to Wetransfer for work.  That is getting lumped into qOthersDefault.  So, I need to track down whatever it is that is (a rule?) that is putting Crashplan traffic into a higher priority.

          1 Reply Last reply Reply Quote 0
          • A
            Animosity022
            last edited by

            So on your floating rules, if you enter in a description and than turn on the logging for that rule, you can see in the Status->System Logs-> Firewall. The description is shown there.

            That will tell you what rule it's matching to help figure out what's going on.

            I can see my VOIP device is matching my VIP and my default rule is working as expected:

            My thought process with the 'last match' concept is I put my default at the top, my low rules and and than I put all my high priority rules.

            Usually if something isn't matching, it's due to a source or protocol that I messed up defining along the way, which is why my rules and queues are really simple, but that's all I need for my use case I as I only want to lower my Plex server for downloads and such from my seedbed and prioritize my gaming boxes/VOIP. Everything else just falls into my default.

            This post is also helpful on floating rules and using 'match' and 'quick'.

            https://forum.pfsense.org/index.php?topic=112337.msg625358#msg625358

            1 Reply Last reply Reply Quote 0
            • T
              thezfunk
              last edited by

              So…it looks like I fixed it.  I felt that something was really not setup properly so I redid the wizard.  I saw that since I last did the wizard there had been a few changes.  I still had my QoS rule in when I finished the wizard and, as if my magic, my Crashplan traffic is now relegated to the lowest queue.  I am not sure what fixed it but over the last two days it is performing correctly from what I can tell.

              1 Reply Last reply Reply Quote 0
              • H
                Harvy66
                last edited by

                I only used the wizard once. After that, I just looked at what the wizard was trying to do, then did everything manually.

                1 Reply Last reply Reply Quote 0
                • T
                  thezfunk
                  last edited by

                  Ok, I lied, I didn't fix it.  Now the traffic is going through the default queue.  I think I figured out why.

                  There is a floating rule for 443 traffic to throw it all in the default queue.  When I disable that rule it goes back to the qP2P queue.  How do I craft a rule that does that but excludes my NAS?

                  Or where do I put my QoS tag rule to get to overrule the 443 rule?

                  1 Reply Last reply Reply Quote 0
                  • H
                    Harvy66
                    last edited by

                    Why not create an extra rule that takes priority over your 443 traffic rule for your NAS?

                    1 Reply Last reply Reply Quote 0
                    • T
                      thezfunk
                      last edited by

                      @Harvy66:

                      Why not create an extra rule that takes priority over your 443 traffic rule for your NAS?

                      That's exactly what I am thinking…but what should it look like?

                      1 Reply Last reply Reply Quote 0
                      • H
                        Harvy66
                        last edited by

                        Like one that matches your NAS traffic? I would guess a floating rule at the end of your rules for outgoing where the source IP if your NAS and the destination port is 443?

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.