<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Traffic Shapper]]></title><description><![CDATA[<p dir="auto">Hallo Forum</p>
<p dir="auto">als ich den Traffic Shapper dsa erstemal einegrichtet habe scheinte auf den ertsen blick alles ok zu sein</p>
<p dir="auto">nachdem ich auf die idee kam den wert kbps auf mb umzustellen (wert 2000 auf 2 geändert) bringt er mir die folgende meldung</p>
<p dir="auto">There were error(s) loading the rules: pfctl: upper-limit larger than interface bandwidth/tmp/rules.debug:30: errors in queue definition pfctl: Syntax error in config file: pf rules not loaded - The line in question reads [ upper-limit larger than interface bandwidth /tmp/rules.debug]: …</p>
<p dir="auto">über den wizard ging das ganz gut</p>
<p dir="auto">ich werde versuchen das ganze wieder einzurichten ..... intressieren würde es mich aber doch .... bis zum nächstenmal (regelverletzung)</p>
<p dir="auto">danke</p>
]]></description><link>https://forum.netgate.com/topic/12175/traffic-shapper</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 09:27:38 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/12175.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 02 Dec 2008 21:01:47 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Traffic Shapper on Tue, 27 Jan 2009 15:00:03 GMT]]></title><description><![CDATA[<p dir="auto">Hat da jemand Kilobit und Megabyte durcheinanderbekommen? Nach 8Bit meine ich zumindest auch, ich wär breit wie ein Byte.. ;)</p>
]]></description><link>https://forum.netgate.com/post/189300</link><guid isPermaLink="true">https://forum.netgate.com/post/189300</guid><dc:creator><![CDATA[JeGr]]></dc:creator><pubDate>Tue, 27 Jan 2009 15:00:03 GMT</pubDate></item><item><title><![CDATA[Reply to Traffic Shapper on Thu, 04 Dec 2008 01:08:16 GMT]]></title><description><![CDATA[<p dir="auto">Hallo Leute</p>
<p dir="auto">ich habe nach wie vor das Prob mit dem Traffic Shapper</p>
<p dir="auto">Dec 4 01:53:18 php: : There were error(s) loading the rules: pfctl: upper-limit larger than interface bandwidth /tmp/rules.debug:30: errors in queue definition pfctl: upper-limit larger than interface bandwidth /tmp/rules.debug:31: errors in queue definition pfctl: upper-limit larger than interface bandwidth /tmp/rules.debug:32: errors in queue definition pfctl: Syntax error in config file: pf rules not loaded - The line in question reads [ upper-limit larger than interface bandwidth /tmp/rules.debug]:</p>
<p dir="auto">Hier mal das Regelwerk</p>
<p dir="auto">Diagnostics: Execute command</p>
<p dir="auto">$ less /tmp/rules.debug</p>
<h1><a class="anchor-offset" name="system-aliases"></a>System Aliases</h1>
<p dir="auto">loopback = "{ lo0 }"<br />
lan = "{ sis0  }"<br />
wan = "{ sis1  }"<br />
enc0 = "{ enc0 }"<br />
DMZ = "{ sis2 }"<br />
WLAN = "{ ath0 }"</p>
<h1><a class="anchor-offset" name="user-aliases"></a>User Aliases</h1>
<p dir="auto">NB_test = "{ 192.168.100.245 }"</p>
<p dir="auto">set loginterface sis1<br />
set loginterface sis0<br />
set loginterface sis2<br />
set loginterface ath0<br />
set optimization normal</p>
<p dir="auto">scrub all random-id  fragment reassemble<br />
altq on sis1 hfsc bandwidth 1024Kb queue { qwanRoot }</p>
<p dir="auto">altq on sis2 hfsc bandwidth 256Kb queue { qDMZRoot }</p>
<p dir="auto">queue qDMZRoot bandwidth 256Kb priority 0 hfsc { qDMZdef, qDMZacks, qPenaltyDown, qP2PDown }<br />
queue qwanRoot bandwidth 1024Kb priority 0 hfsc { qwandef, qwanacks, qPenaltyUp, qP2PUp }<br />
queue qwandef bandwidth 1% priority 1 qlimit 500 hfsc (  default realtime 1% )<br />
queue qDMZdef bandwidth 1% priority 1 qlimit 500 hfsc (  default realtime 1% )<br />
queue qwanacks bandwidth 20% priority 7 hfsc (  realtime 10% )<br />
queue qDMZacks bandwidth 20% priority 7 hfsc (  realtime 10% )<br />
queue qPenaltyUp bandwidth 1% priority 2 qlimit 500 hfsc (  red ecn upperlimit 340Kb )<br />
queue qPenaltyDown bandwidth 1% priority 2 qlimit 500 hfsc (  red ecn upperlimit 2300Kb )<br />
queue qP2PUp bandwidth 1% priority 1 qlimit 500 hfsc (  red ecn upperlimit 2000Kb realtime 1Kb )<br />
queue qP2PDown bandwidth 1% priority 1 qlimit 500 hfsc (  red ecn upperlimit 300Kb realtime 1Kb )</p>
<p dir="auto">nat-anchor "pftpx/<em>"<br />
nat-anchor "natearly/</em>"<br />
nat-anchor "natrules/*"</p>
<h1><a class="anchor-offset" name="ftp-proxy"></a>FTP proxy</h1>
<p dir="auto">rdr-anchor "pftpx/*"</p>
<h1><a class="anchor-offset" name="outbound-nat-rules"></a>Outbound NAT rules</h1>
<p dir="auto">nat on $wan from 192.168.10.0/24 to any -&gt; (sis1)<br />
nat on $wan from 192.168.100.0/24 to any -&gt; (sis1)<br />
nat on $wan from 192.168.30.0/24 to any -&gt; (sis1)</p>
<p dir="auto">#SSH Lockout Table<br />
table &lt;sshlockout&gt;persist</p>
<h1><a class="anchor-offset" name="load-balancing-anchor-slbd-updates"></a>Load balancing anchor - slbd updates</h1>
<p dir="auto">rdr-anchor "slb"</p>
<h1><a class="anchor-offset" name="ftp-proxy-helper"></a>FTP Proxy/helper</h1>
<p dir="auto">table &lt;vpns&gt;{  }<br />
no rdr on sis0 proto tcp from any to &lt;vpns&gt;port 21<br />
rdr on sis0 proto tcp from any to any port 21 -&gt; 127.0.0.1 port 8021<br />
no rdr on sis2 proto tcp from any to &lt;vpns&gt;port 21<br />
rdr on sis2 proto tcp from any to any port 21 -&gt; 127.0.0.1 port 8022</p>
<h1><a class="anchor-offset" name="imspector-rdr-anchor"></a>IMSpector rdr anchor</h1>
<p dir="auto">rdr-anchor "imspector"</p>
<h1><a class="anchor-offset" name="upnpd-rdr-anchor"></a>UPnPd rdr anchor</h1>
<p dir="auto">rdr-anchor "miniupnpd"</p>
<p dir="auto">block in all tag unshaped label "SHAPER: first match rule"<br />
pass in on  $DMZ from 192.168.100.2  to any  keep state tagged unshaped tag qPenaltyDown<br />
pass out on $wan from any to any keep state tagged qPenaltyDown tag qPenaltyUp<br />
pass in on  $wan from any  to 192.168.100.2  keep state tagged unshaped tag qPenaltyUp<br />
pass out on $DMZ from any to 192.168.100.2 keep state tagged qPenaltyUp tag qPenaltyDown<br />
pass in on  $wan proto tcp from any  to 192.168.100.0/24 port 4661:4665  keep state tagged unshaped tag qP2PUp<br />
pass out on $DMZ proto tcp from any to 192.168.100.0/24 port 4661:4665 keep state tagged qP2PUp tag qP2PDown<br />
pass in on  $DMZ proto tcp from 192.168.100.0/24  to any port 4661:4665  keep state tagged unshaped tag qP2PDown<br />
pass out on $wan proto tcp from any to any port 4661:4665 keep state tagged qP2PDown tag qP2PUp<br />
pass in on  $DMZ from 192.168.100.0/24  to any  keep state tagged unshaped tag qP2PDown<br />
pass out on $wan from any to any keep state tagged qP2PDown tag qP2PUp<br />
pass in on  $wan from any  to 192.168.100.0/24  keep state tagged unshaped tag qP2PUp<br />
pass out on $DMZ from any to 192.168.100.0/24 keep state tagged qP2PUp tag qP2PDown<br />
pass in on  $DMZ from 192.168.100.0/24  to any  keep state tagged unshaped tag qP2PDown<br />
pass out on $wan from any to any keep state tagged qP2PDown tag qP2PUp<br />
pass in on  $wan from any  to 192.168.100.0/24  keep state tagged unshaped tag qP2PUp<br />
pass out on $DMZ from any to 192.168.100.0/24 keep state tagged qP2PUp tag qP2PDown</p>
<p dir="auto">anchor "ftpsesame/*"<br />
anchor "firewallrules"</p>
<h1><a class="anchor-offset" name="we-use-the-mighty-pf-we-cannot-be-fooled."></a>We use the mighty pf, we cannot be fooled.</h1>
<p dir="auto">block quick proto { tcp, udp } from any port = 0 to any<br />
block quick proto { tcp, udp } from any to any port = 0</p>
<h1><a class="anchor-offset" name="snort2c"></a>snort2c</h1>
<p dir="auto">table &lt;snort2c&gt;persist<br />
block quick from &lt;snort2c&gt;to any label "Block snort2c hosts"<br />
block quick from any to &lt;snort2c&gt;label "Block snort2c hosts"</p>
<h1><a class="anchor-offset" name="loopback"></a>loopback</h1>
<p dir="auto">anchor "loopback"<br />
pass in quick on $loopback all label "pass loopback"<br />
pass out quick on $loopback all label "pass loopback"</p>
<h1><a class="anchor-offset" name="package-manager-early-specific-hook"></a>package manager early specific hook</h1>
<p dir="auto">anchor "packageearly"</p>
<h1><a class="anchor-offset" name="carp"></a>carp</h1>
<p dir="auto">anchor "carp"</p>
<h1><a class="anchor-offset" name="permit-wan-interface-to-ping-out-ping_hosts.sh"></a>permit wan interface to ping out (ping_hosts.sh)</h1>
<p dir="auto">pass quick proto icmp from 192.168.2.103 to any keep state</p>
<h1><a class="anchor-offset" name="nat-reflection-rules"></a>NAT Reflection rules</h1>
<h1><a class="anchor-offset" name="allow-access-to-dhcp-server-on-lan"></a>allow access to DHCP server on LAN</h1>
<p dir="auto">anchor "dhcpserverlan"<br />
pass in quick on $lan proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server on LAN"<br />
pass in quick on $lan proto udp from any port = 68 to 192.168.10.1 port = 67 label "allow access to DHCP server on LAN"<br />
pass out quick on $lan proto udp from 192.168.10.1 port = 67 to any port = 68 label "allow access to DHCP server on LAN"</p>
<h1><a class="anchor-offset" name="allow-access-to-dhcp-server-on-opt1"></a>allow access to DHCP server on opt1</h1>
<p dir="auto">anchor "dhcpserverDMZ"<br />
pass in quick on $DMZ proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"<br />
pass in quick on $DMZ proto udp from any port = 68 to 192.168.100.1 port = 67 label "allow access to DHCP server"<br />
pass out quick on $DMZ proto udp from 192.168.100.1 port = 67 to any port = 68 label "allow access to DHCP server"</p>
<h1><a class="anchor-offset" name="allow-our-dhcp-client-out-to-the-wan"></a>allow our DHCP client out to the WAN</h1>
<p dir="auto">anchor "wandhcp"<br />
pass out quick on $wan proto udp from any port = 68 to any port = 67 label "allow dhcp client out wan"<br />
block in log quick on $wan proto udp from any port = 67 to 192.168.10.0/24 port = 68 label "block dhcp client out wan"</p>
<h1><a class="anchor-offset" name="lan-opt-spoof-check-needs-to-be-after-dhcp-because-of-broadcast-addresses"></a>LAN/OPT spoof check (needs to be after DHCP because of broadcast addresses)</h1>
<p dir="auto">antispoof for sis0<br />
antispoof for sis2</p>
<p dir="auto">anchor "spoofing"</p>
<h1><a class="anchor-offset" name="block-anything-from-private-networks-on-wan-interface"></a>block anything from private networks on WAN interface</h1>
<p dir="auto">anchor "spoofing"<br />
antispoof for $wan<br />
block in log quick on $wan from 10.0.0.0/8 to any label "block private networks from wan block 10/8"<br />
block in log quick on $wan from 127.0.0.0/8 to any label "block private networks from wan block 127/8"<br />
block in log quick on $wan from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"<br />
block in log quick on $wan from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"</p>
<h1><a class="anchor-offset" name="support-for-allow-limiting-of-tcp-connections-by-establishment-rate"></a>Support for allow limiting of TCP connections by establishment rate</h1>
<p dir="auto">anchor "limitingesr"<br />
table &lt;virusprot&gt;block in quick from &lt;virusprot&gt;to any label "virusprot overload table"</p>
<h1><a class="anchor-offset" name="pass-traffic-from-firewall-gt-out"></a>pass traffic from firewall -&gt; out</h1>
<p dir="auto">anchor "firewallout"<br />
pass out quick on sis1 all keep state tagged qPenaltyUp queue (qPenaltyUp, qwanacks) label "let out anything from firewall host itself"<br />
pass out quick on sis1 all keep state tagged qP2PUp queue (qP2PUp, qwanacks) label "let out anything from firewall host itself"<br />
pass out quick on sis1 all keep state queue (qwandef, qwanacks) label "let out anything from firewall host itself"<br />
pass out quick on sis0 all keep state  label "let out anything from firewall host itself"<br />
pass out quick on sis2 all keep state tagged qPenaltyDown queue (qPenaltyDown, qDMZacks) label "let out anything from firewall host itself"<br />
pass out quick on sis2 all keep state tagged qP2PDown queue (qP2PDown, qDMZacks) label "let out anything from firewall host itself"<br />
pass out quick on sis2 all keep state queue (qDMZdef, qDMZacks) label "let out anything from firewall host itself"<br />
pass out quick on ath0 all keep state  label "let out anything from firewall host itself"<br />
pass out quick on $enc0 keep state label "IPSEC internal host to host"</p>
<h1><a class="anchor-offset" name="let-out-anything-from-the-firewall-host-itself-and-decrypted-ipsec-traffic"></a>let out anything from the firewall host itself and decrypted IPsec traffic</h1>
<p dir="auto">pass out quick on sis2 proto icmp keep state ( tcp.closed 5 ) label "let out anything from firewall host itself"<br />
pass out quick on $DMZ all keep state ( tcp.closed 5 ) label "let out anything from firewall host itself"</p>
<h1><a class="anchor-offset" name="make-sure-the-user-cannot-lock-himself-out-of-the-webgui-or-ssh"></a>make sure the user cannot lock himself out of the webGUI or SSH</h1>
<p dir="auto">anchor "anti-lockout"<br />
pass in quick on sis0 from any to 192.168.10.1 keep state label "anti-lockout web rule"</p>
<h1><a class="anchor-offset" name="ssh-lockout"></a>SSH lockout</h1>
<p dir="auto">block in log quick proto tcp from &lt;sshlockout&gt;to any port 22 label "sshlockout"</p>
<p dir="auto">anchor "ftpproxy"<br />
anchor "pftpx/*"</p>
<h1><a class="anchor-offset" name="user-defined-aliases-follow"></a>User-defined aliases follow</h1>
<h1><a class="anchor-offset" name="anchors-for-rules-that-might-be-matched-by-queues"></a>Anchors for rules that might be matched by queues</h1>
<p dir="auto">anchor qDMZRoot tagged qDMZRoot<br />
load anchor qDMZRoot from "/tmp/qDMZRoot.rules"<br />
anchor qwanRoot tagged qwanRoot<br />
load anchor qwanRoot from "/tmp/qwanRoot.rules"<br />
anchor qwandef tagged qwandef<br />
load anchor qwandef from "/tmp/qwandef.rules"<br />
anchor qDMZdef tagged qDMZdef<br />
load anchor qDMZdef from "/tmp/qDMZdef.rules"<br />
anchor qwanacks tagged qwanacks<br />
load anchor qwanacks from "/tmp/qwanacks.rules"<br />
anchor qDMZacks tagged qDMZacks<br />
load anchor qDMZacks from "/tmp/qDMZacks.rules"<br />
anchor qPenaltyUp tagged qPenaltyUp<br />
load anchor qPenaltyUp from "/tmp/qPenaltyUp.rules"<br />
anchor qPenaltyDown tagged qPenaltyDown<br />
load anchor qPenaltyDown from "/tmp/qPenaltyDown.rules"<br />
anchor qP2PUp tagged qP2PUp<br />
load anchor qP2PUp from "/tmp/qP2PUp.rules"<br />
anchor qP2PDown tagged qP2PDown<br />
load anchor qP2PDown from "/tmp/qP2PDown.rules"</p>
<h1><a class="anchor-offset" name="user-defined-rules-follow"></a>User-defined rules follow</h1>
<p dir="auto">pass in quick on $DMZ proto udp from 192.168.100.0/24 to any port = 53 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 80 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 443 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 21 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 4662 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto udp from 192.168.100.0/24 to any port = 4672 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 4661 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto udp from 192.168.100.0/24 to any port = 4665 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 4711 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $DMZ proto tcp from 192.168.100.0/24 to any port = 4712 keep state  queue (qDMZdef, qDMZacks)  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 22 keep state  label "USER_RULE: Default LAN -&gt; any"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 80 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 443 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 21 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 25 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 110 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 995 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 143 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 993 keep state  label "USER_RULE"<br />
pass in quick on $lan proto tcp from 192.168.10.0/24 to any port = 5001 keep state  label "USER_RULE: OpenVPN"<br />
#  sis2 opt2 array key does not exist for</p>
<h1><a class="anchor-offset" name="vpn-rules"></a>VPN Rules</h1>
<p dir="auto">pass in quick on sis0 inet proto tcp from any to $loopback port 8021 keep state label "FTP PROXY: Allow traffic to localhost"<br />
pass in quick on sis0 inet proto tcp from any to $loopback port 21 keep state label "FTP PROXY: Allow traffic to localhost"<br />
pass in quick on sis1 inet proto tcp from port 20 to (sis1) port &gt; 49000 flags S/SA keep state label "FTP PROXY: PASV mode data connection"</p>
<h1><a class="anchor-offset" name="enable-ftp-proxy"></a>enable ftp-proxy</h1>
<p dir="auto">pass in quick on sis2 inet proto tcp from any to $loopback port 8022 keep state label "FTP PROXY: Allow traffic to localhost"<br />
pass in quick on sis2 inet proto tcp from any to $loopback port 21 keep state label "FTP PROXY: Allow traffic to localhost"</p>
<h1><a class="anchor-offset" name="imspector"></a>IMSpector</h1>
<p dir="auto">anchor "imspector"</p>
<h1><a class="anchor-offset" name="upnpd"></a>uPnPd</h1>
<p dir="auto">anchor "miniupnpd"</p>
<p dir="auto">#–-------------------------------------------------------------------------</p>
<h1><a class="anchor-offset" name="default-deny-rules"></a>default deny rules</h1>
<p dir="auto">#---------------------------------------------------------------------------<br />
block in log quick all label "Default deny rule"<br />
block out log quick all label "Default deny rule"</p>
<p dir="auto">Execute Shell command<br />
Command:</p>
<p dir="auto">Download<br />
File to download:</p>
<p dir="auto">Upload<br />
File to upload:</p>
<p dir="auto">PHP Execute<br />
Command:</p>
<p dir="auto">Example: interfaces_carp_bring_up_final();<br />
pfSense is <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/00a9.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--copyright" style="height:23px;width:auto;vertical-align:middle" title="©" alt="©" /> 2004-2008 BSD Perimeter LLC. All Rights Reserved. [view license]<br />
[Commercial Support Available]</p>
<p dir="auto">Ich verstehe nicht was das Prob ist.<br />
habe ein 3000er Leitung<br />
und das Ganze Läuft auf einem WrapBoard 3 x ethx 1 x minipci für wlan</p>
<p dir="auto">egal was ich mache es funzt nicht</p>
<p dir="auto">ich will nur dem P2P nicht die ganze bandbreite geben</p>
<p dir="auto">3000 down<br />
446 up</p>
<p dir="auto">P2P 2000 Down Max<br />
P2P 300 up max</p>
<p dir="auto">der rechner zum P"P hängt an der DMZ (OPT1)<br />
der rest über einen switch am LAN<br />
WAN geht zum dsl router</p>
<p dir="auto">den rest hätte ich gerne zum surfen</p>
<p dir="auto">tipps währen net danke</p>
<p dir="auto">(hänge an dem ding schon den ganzen abend um komme nicht vorwärts)&lt;/sshlockout&gt;&lt;/virusprot&gt;&lt;/virusprot&gt;&lt;/snort2c&gt;&lt;/snort2c&gt;&lt;/snort2c&gt;&lt;/vpns&gt;&lt;/vpns&gt;&lt;/vpns&gt;&lt;/sshlockout&gt;</p>
]]></description><link>https://forum.netgate.com/post/186215</link><guid isPermaLink="true">https://forum.netgate.com/post/186215</guid><dc:creator><![CDATA[megazocker]]></dc:creator><pubDate>Thu, 04 Dec 2008 01:08:16 GMT</pubDate></item></channel></rss>