Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Playing with fq_codel in 2.4

    Scheduled Pinned Locked Moved Traffic Shaping
    1.1k Posts 123 Posters 1.6m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Q
      q54e3w
      last edited by q54e3w

      Ive noticed my internally hosted services (matrix synapse, seafile etc) that sit behind Traffic reverse proxy have stopped working since implementing traffic shaping as per the recommendations in this thread.
      I narrowed the cause down to the application of queues to my inbound WAN port forwards
      Clients connecting inbound via Cloudflare report a '522' error (unable to reach the origin web server and the request times out).
      I've checked the in/out limiters are applied to the relevant in/out pipe and they appear correct, as in a mirror of the regular outbound rules on internal subnets
      The only noticeable difference is my firewall rule is applied on the WAN interface, not the floating rules as per @uptownVagrant
      Would be happy to receive guidance on how to debug this issue.

      EDIT: With no limiters applied I see traffic hitting my Traefik proxy

      176.126.xxx.xxx - - [28/May/2020:14:07:06 +0000] "PUT /_matrix/federation/v1/send/159066 HTTP/1.1" 200 12 "-" "-" 33895 "matrix@file" "http://192.168.90.20:80" 19ms
      

      with limiters applied, these accesses aren't visible so it appears that pfSense isn't actually forwarding the request.

      1 Reply Last reply Reply Quote 0
      • D
        daemonix
        last edited by daemonix

        Following the steps below I have a question!

        1. Whats the difference between Queue Management Algorithm = Tail Drop vs CoDel?
        2. Even though on the limiter with "Tail Drop" its allowed to have active ECN. On the queue with Tail Drop its not allowed to use ECN. Is generally Tail Drop better? With or without ENC? I could not find anything in the pfsense book.

        Thanks!

        1.) Create "Out" limiter
        
        Tick "Enable"
        Name: FQ_CODEL_OUT
        Bandwidth: 96907 Kbit/s
        Mask: None
        Queue Management Algorithm: Tail Drop
        Scheduler: FQ_CODEL
        target: 5
        interval: 100
        quantum: 300
        limit: 10240
        flows: 20480 
        Click Save/Apply Changes
        2.) Add "Out" queue
        
        Tick "Enable"
        Name: fq_codel_out_q
        Mask: None
        Queue Management Algorithm: Tail Drop
        Click Save/Apply Changes
        3.) Create "In" limiter
        
        Tick "Enable"
        Name: FQ_CODEL_IN
        Bandwidth: 83886 Kbit/s
        Mask: None
        Queue Management Algorithm: Tail Drop
        Scheduler: FQ_CODEL
        target: 5
        interval: 100
        quantum: 300
        limit: 10240
        flows: 20480 
        Click Save/Apply Changes
        4.) Add "In" queue
        
        Tick "Enable"
        Name: fq_codel_in_q
        Mask: None
        Queue Management Algorithm: Tail Drop
        Click Save/Apply Changes
        
        provelsP 1 Reply Last reply Reply Quote 0
        • provelsP
          provels @daemonix
          last edited by

          @daemonix I don't really know but I tried both and neither helped me any so I gave up. So just try and test and try again.

          Peder

          MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
          BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

          D 1 Reply Last reply Reply Quote 0
          • D
            daemonix @provels
            last edited by daemonix

            @provels for me tail drop seems to give me stable low RRT.... CoDel is a bit erratic... this is weird as reading this paper makes me think different. Evaluation of the Impact of Packet Drops due to AQM over Capacity Limited Paths

            Any ideas from the experts?

            B 1 Reply Last reply Reply Quote 0
            • B
              bobbenheim @daemonix
              last edited by

              @daemonix that paper has no relation to queue management with fq-codel in Pfsense, it compares different algorithms.
              I have no clue what codel does if chosen as queue management under fq-codel, but i would just use drop tail as that is how fq-codel should react when latency increases, i.e. it should drop packets in large queues to keep latency low.

              D 1 Reply Last reply Reply Quote 1
              • D
                daemonix @bobbenheim
                last edited by

                @bobbenheim fair enough :) that indeed keeps the RRT from moving... so Im happy :)

                1 Reply Last reply Reply Quote 0
                • D
                  daemonix
                  last edited by daemonix

                  is there a reason why a basic fq_codel is behaving perfect with 20 parallel iperf uploads another 20 down (all together)... but then a "speedtest.net" test or google test sends the RTT up?!
                  Or a full torrent ubuntu alternative. Full download... no problem.

                  Is like some packets dont follow the rules...

                  1 Reply Last reply Reply Quote 0
                  • D
                    daemonix
                    last edited by

                    Hi, I have the floating rule and quick but Im getting problems with traceroute from Lan (not from the pfsense box). Am I missing something in my rules?!

                    5f123352-ab82-41cc-89ba-561290f487e1-Screenshot 2020-06-13 09.27.31.png

                    traceroute www.ntua.gr
                    traceroute to www.ntua.gr (147.102.224.101), 64 hops max, 52 byte packets
                     1  XX (X)  4.054 ms  1.243 ms  1.275 ms
                     2  www.ntua.gr (147.102.224.101)  8.807 ms  9.811 ms  10.076 ms
                     3  www.ntua.gr (147.102.224.101)  15.286 ms  9.946 ms  9.692 ms
                     4  * * *
                     5  www.ntua.gr (147.102.224.101)  14.548 ms  13.996 ms  13.006 ms
                     6  www.ntua.gr (147.102.224.101)  13.220 ms  15.703 ms  13.044 ms
                     7  * www.ntua.gr (147.102.224.101)  45.182 ms  43.441 ms
                     8  www.ntua.gr (147.102.224.101)  44.675 ms  44.498 ms  47.619 ms
                    
                    B uptownVagrantU 2 Replies Last reply Reply Quote 0
                    • B
                      bobbenheim @daemonix
                      last edited by

                      @daemonix what settings have you made within the floating rule?

                      D 1 Reply Last reply Reply Quote 0
                      • uptownVagrantU
                        uptownVagrant @daemonix
                        last edited by

                        @daemonix keep in mind that the traceroute program is likely using UDP unless you are instructing it to use ICMP.

                        1 Reply Last reply Reply Quote 0
                        • D
                          daemonix @bobbenheim
                          last edited by

                          @bobbenheim @uptownVagrant

                          I updated the rule to take all ICMP. I dont have any block rule for UDP or TCP from LAN.
                          One thing I see in my WAN CODEL IN/OUT rule is that is "matching" very little numbers of packages or data. On the LAN site the main pass rule has gigabytes.
                          Maybe my problems start elsewhere?

                          Are floating matching rules for CODEL mirroring the LAN stats?

                          Screenshot 2020-06-15 10.21.47.png

                          B 1 Reply Last reply Reply Quote 0
                          • B
                            bobbenheim @daemonix
                            last edited by

                            @daemonix have you set anything under in/out pipe in advanced options within your ICMP rule?

                            D 1 Reply Last reply Reply Quote 0
                            • D
                              daemonix @bobbenheim
                              last edited by

                              @bobbenheim no no, only the gateway as I have a VPN out for some clients.

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                sikita
                                last edited by

                                I read this thread and still I am not sure if floating rule for limiters shoud be "quick pass" or "match". Could someone explain which one is correct or if there is difference in use? Thanks

                                B 1 Reply Last reply Reply Quote 0
                                • B
                                  bobbenheim @sikita
                                  last edited by

                                  @sikita pass rule is first match wins, match rules is last match wins, other than that you get the same result with both if setup correctly :)

                                  1 Reply Last reply Reply Quote 1
                                  • D
                                    daemonix
                                    last edited by

                                    the weird thing is that with huge uploads or download (and torrents, iperf, rsync... for example) everything seems ok. RTT etc.

                                    When Mac/Apple processes try to upload photos for example... then RTT goes way up. As if some packets dont go through the pipe.

                                    How can I debug it better?

                                    1 Reply Last reply Reply Quote 0
                                    • F
                                      fabrizior
                                      last edited by

                                      Just getting started with implementing an fq_codel limiter... could use some advise on how to interpret what's going on and how to tune if necessary please.

                                      What might cause Ookla SpeedTest to only get 159 Mbps download when other speed tests are resulting in 320Mbps? Limiter info shows only one bucket, so why limited to ~<50% bandwidth in this particular app but not the web-based speed test?

                                      When running the Ookla SpeedTest app from the same host (with 2x1gbps bonded eth, 24-core, 64GB RAM) as the dslreports web-based test, I'm only getting ~160/20Mbps results.

                                      Limiter Info while running Ookla speedtest download:

                                      Limiters:
                                      00001: 350.000 Mbit/s    0 ms burst 0 
                                      q131073 1000 sl. 0 flows (1 buckets) sched 65537 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                       sched 65537 type FIFO flags 0x0 0 buckets 0 active
                                      00002:  25.000 Mbit/s    0 ms burst 0 
                                      q131074 1000 sl. 0 flows (1 buckets) sched 65538 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                       sched 65538 type FIFO flags 0x0 0 buckets 0 active
                                      
                                      
                                      Schedulers:
                                      00001: 350.000 Mbit/s    0 ms burst 0 
                                      q65537  50 sl. 0 flows (1 buckets) sched 1 weight 0 lmax 0 pri 0 droptail
                                       sched 1 type FQ_CODEL flags 0x0 0 buckets 1 active
                                       FQ_CODEL target 5ms interval 100ms quantum 1514 limit 10240 flows 1024 ECN
                                         Children flowsets: 1 
                                      BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
                                        0 ip           0.0.0.0/0             0.0.0.0/0      101   151500  0    0   0
                                      00002:  25.000 Mbit/s    0 ms burst 0 
                                      q65538  50 sl. 0 flows (1 buckets) sched 2 weight 0 lmax 0 pri 0 droptail
                                       sched 2 type FQ_CODEL flags 0x0 0 buckets 1 active
                                       FQ_CODEL target 5ms interval 100ms quantum 1514 limit 10240 flows 1024 ECN
                                         Children flowsets: 2 
                                        0 ip           0.0.0.0/0             0.0.0.0/0       65     3380  0    0   0
                                      
                                      
                                      Queues:
                                      q00001 1000 sl. 0 flows (1 buckets) sched 1 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                      q00002 1000 sl. 0 flows (1 buckets) sched 2 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                      

                                      Limiter Info while running dslreports speedtest download:

                                      Limiters:
                                      00001: 350.000 Mbit/s    0 ms burst 0 
                                      q131073 1000 sl. 0 flows (1 buckets) sched 65537 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                       sched 65537 type FIFO flags 0x0 0 buckets 0 active
                                      00002:  25.000 Mbit/s    0 ms burst 0 
                                      q131074 1000 sl. 0 flows (1 buckets) sched 65538 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                       sched 65538 type FIFO flags 0x0 0 buckets 0 active
                                      
                                      
                                      Schedulers:
                                      00001: 350.000 Mbit/s    0 ms burst 0 
                                      q65537  50 sl. 0 flows (1 buckets) sched 1 weight 0 lmax 0 pri 0 droptail
                                       sched 1 type FQ_CODEL flags 0x0 0 buckets 1 active
                                       FQ_CODEL target 5ms interval 100ms quantum 1514 limit 10240 flows 1024 ECN
                                         Children flowsets: 1 
                                      BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
                                        0 ip           0.0.0.0/0             0.0.0.0/0     16992 25461976 201 301500   2
                                      00002:  25.000 Mbit/s    0 ms burst 0 
                                      q65538  50 sl. 0 flows (1 buckets) sched 2 weight 0 lmax 0 pri 0 droptail
                                       sched 2 type FQ_CODEL flags 0x0 0 buckets 1 active
                                       FQ_CODEL target 5ms interval 100ms quantum 1514 limit 10240 flows 1024 ECN
                                         Children flowsets: 2 
                                        0 ip           0.0.0.0/0             0.0.0.0/0       57     2983  0    0   0
                                      
                                      
                                      Queues:
                                      q00001 1000 sl. 0 flows (1 buckets) sched 1 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                      q00002 1000 sl. 0 flows (1 buckets) sched 2 weight 0 lmax 0 pri 0  AQM CoDel target 5ms interval 100ms ECN
                                      

                                      Have followed these slides/video advise. Set queue length to 10000 rather than default. No other additional configuration of limiters/queues, etc...

                                      Setup Slides: https://www.slideshare.net/NetgateUSA/pfsense-244-short-topic-miscellany-pfsense-hangout-august-2018
                                      Setup Walkthrough: https://www.youtube.com/watch?v=o8nL81DzTlU&feature=youtu.be&t=377

                                      Limits set up for 350/25 Mbps for starters with a single WAN to a Comcast Arris TG1682G in bridge mode.

                                      When running https://dslreports.com/speedtest, I'm seeing the following:

                                      Before configuration:
                                      Speed Profile Mbs.png

                                      After configuration:
                                      Speed Profile Mbs.png

                                      Floating Rules:
                                      36331011-7f6d-461a-8f0e-99b974bfa8ad-image.png

                                      HW:
                                      pfSense 2.4.5-RELEASE-p1 (amd64)
                                      ProtectLI FW6 Vault, i5-7200U CPU @ 2.50GHz, 8GB , AES-NI CPU Crypto: Yes (active)
                                      Packages Installed: pfBlockerNG-devel, ntopng, telegraf
                                      Packages To-Do: suricata (not yet configured)
                                      Outbound IPSec VPN (Oracle private cloud VCN interconnect configured, disabled)
                                      OpenVPN inbound clients: no-connections

                                      1 Reply Last reply Reply Quote 0
                                      • R
                                        Ricardox
                                        last edited by

                                        1.jpg
                                        2.jpg
                                        3.jpg

                                        F 1 Reply Last reply Reply Quote 0
                                        • F
                                          fabrizior @Ricardox
                                          last edited by

                                          @Ricardox Not sure I understand the details in your post... the slide deck clearly says floating rule on WAN, not LAN.

                                          What details / instructions am I missing?

                                          Any ideas about the bandwidth limit difference between a web-based dslreports speedtest versus the Ookla speed test app?

                                          1 Reply Last reply Reply Quote 0
                                          • R
                                            Ricardox
                                            last edited by Ricardox

                                            This post is deleted!
                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.