Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Playing with fq_codel in 2.4

    Traffic Shaping
    123
    1.1k
    1.4m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      thiasaef @q54e3w
      last edited by thiasaef

      @q54e3w

      I have multiple lan interfaces (so I thought it would be a bad idea to try that). And I don't understand why the guide does not work (I'm still on 2.4.5-RELEASE-p1).

      B 1 Reply Last reply Reply Quote 0
      • B
        bartkowski @thiasaef
        last edited by

        @thiasaef I have mine on the Floating (with Quick checked) applied to WAN. May that can work for you?

        T 1 Reply Last reply Reply Quote 0
        • T
          thiasaef @bartkowski
          last edited by thiasaef

          @bartkowski, my floating rules look like this:
          fq_codel_floating_rules.png
          Traceroute output:

          traceroute netgate.com
          traceroute to netgate.com (208.123.73.73), 30 hops max, 60 byte packets
           1  _gateway (192.168.20.1)  0.098 ms  0.138 ms  0.080 ms
           2  208.123.73.73 (208.123.73.73)  2.615 ms  2.822 ms  4.052 ms
           3  * * * 
           4  208.123.73.73 (208.123.73.73)  22.185 ms  17.234 ms  17.226 ms
          ...
           8  208.123.73.73 (208.123.73.73)  18.800 ms  18.792 ms  21.285 ms
           9  * * * 
          10  * * * 
          11  208.123.73.73 (208.123.73.73)  167.760 ms  169.189 ms  169.182 ms
          ...
          15  208.123.73.73 (208.123.73.73)  167.513 ms *  164.364 ms
          
          T 1 Reply Last reply Reply Quote 0
          • T
            thiasaef @thiasaef
            last edited by

            I'm stupid 🤦 ... all I had to do to make it work was to enable the --icmp option in traceroute, since traceroute uses udp by default on linux.

            PS: Could someone explain me why fq_codel still works in both directions when I disable the 3rd floating rule (WAN-In FQ-CoDel queue).

            M 1 Reply Last reply Reply Quote 0
            • M
              mind12 @thiasaef
              last edited by

              @thiasaef Are you really sure that it works?
              I made the same mistake before that the states were not cleared to the test IPs and resulted the same as before. Make sure to kill all states to the testing server before testing again.

              T 1 Reply Last reply Reply Quote 0
              • T
                thiasaef @mind12
                last edited by thiasaef

                @mind12 it definitely works if I add the -I flag to the traceroute command, but the 1st floating rule (policy routing traceroute workaround) seems to have nothing to do with it.

                I logged the outgoing traceroute traffic both with and without the -I flag using Wireshark, but I could not find any packets of the ICMP subtype: Traceroute.

                I would be glad if someone with more expertise than us would chime in on this.

                M 1 Reply Last reply Reply Quote 0
                • M
                  mind12 @thiasaef
                  last edited by

                  @thiasaef I replied to this I'm sorry, not the traceroute part

                  "PS: Could someone explain me why fq_codel still works in both directions when I disable the 3rd floating rule (WAN-In FQ-CoDel queue)."

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    thiasaef @mind12
                    last edited by

                    @mind12 if I disable the 3rd floating rule, reset the firewall state table and then run the waveform bufferbloat test, I get the following result: https://www.waveform.com/tools/bufferbloat?test-id=9cced6ab-e6a9-48b9-a7a5-c562dc7df528, my limiter is set to (96, 36).

                    T 1 Reply Last reply Reply Quote 0
                    • T
                      tomashk @thiasaef
                      last edited by

                      @thiasaef

                      I believe you need third rule (WAN in) only if somebody initialize connection from "internet" and connects to your WAN (so you also need some other rule to allow connection from "internet" to your WAN)

                      Your WAN out rule makes almost all work because it is working with traffic from your LAN going to internet and all responses (matching response is like the same traffic as your WAN out).

                      Because of that for fq_codel I have only one rule (but I also use different approach - when you have rule on "LAN in" there is no problem with ping and traceroute)

                      I hope it makes sense and I'm not wrong :)

                      T 1 Reply Last reply Reply Quote 1
                      • T
                        thiasaef @tomashk
                        last edited by thiasaef

                        Flent is amazing - simple yet incredibly powerful! The result after optimizing my VVDSL line:

                        Before:
                        68284242.png
                        11386787034.png
                        https://www.waveform.com/tools/bufferbloat?test-id=9bee8331-5e7f-4503-a74d-d146ab511ab9

                        vvdsl_native.png
                        rrul-2021-05-07T200244.228034.vvdsl_native.flent.gz

                        After:
                        68284255.png
                        11386831582.png
                        https://www.waveform.com/tools/bufferbloat?test-id=1ccd779a-c3f3-4b0f-be46-22638b446d96

                        vvdsl_fq_codel.png
                        rrul-2021-05-07T200823.580873.vvdsl_fq_codel.flent.gz

                        1 Reply Last reply Reply Quote 0
                        • S
                          sikita
                          last edited by sikita

                          Hi, what about "hn ALTQ support" setting? Is it recommended enabled or disabled in 2.5.1? altq_supp.png

                          T 1 Reply Last reply Reply Quote 1
                          • T
                            thiasaef @sikita
                            last edited by

                            Is there a recommended strategy for when the WAN speed fluctuates significantly, such as with a cellular connection (e.g., LTE)?

                            R 1 Reply Last reply Reply Quote 0
                            • R
                              robnitro @thiasaef
                              last edited by

                              @thiasaef
                              Not that I know of. If you can change the settings via a script, perhaps you can run a loop that runs a ping and when its high, drops the speed and checks again

                              Gargoyle router which is a version of openwrt does it well though, auto speed adjust.

                              Z 1 Reply Last reply Reply Quote 0
                              • U
                                user7364
                                last edited by

                                Hi guys,

                                just want to ask how to add a 1mbit guarantee to a voice vlan on the limiter? I am a bit scared that voip does not work if someone in the network max out upload/download ... i already use QoS as best i can, but i think reserved bandwith for the vlan is maybe safer?

                                1 Reply Last reply Reply Quote 0
                                • Z
                                  Zeny001 @robnitro
                                  last edited by

                                  @robnitro That sounds really good.

                                  1 Reply Last reply Reply Quote 0
                                  • B bartkowski referenced this topic on
                                  • B bartkowski referenced this topic on
                                  • B bartkowski referenced this topic on
                                  • GertjanG Gertjan referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T tman222 referenced this topic on
                                  • T tman222 referenced this topic on
                                  • T tman222 referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • m0njiM m0nji referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T thiasaef referenced this topic on
                                  • T tman222 referenced this topic on
                                  • T tman222 referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M Mixka referenced this topic on
                                  • M mkcharlie referenced this topic on
                                  • M mkcharlie referenced this topic on
                                  • M mkcharlie referenced this topic on
                                  • M mkcharlie referenced this topic on
                                  • M mkcharlie referenced this topic on
                                  • HLPPCH HLPPC referenced this topic on
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.