UNTUK GAME ONLINE MASUK SINI !!!!!!!!!
-
Tambahan lagi … Untuk rekan2 newbie yg menggunakan squid transparent gagal patch sealindo harap dicoba cara ini menggunakan putty console
squidclient -p 80 -m PURGE http://patch.sealindo.com/patch/normal/version.ini
semoga bermanfaat
suskes pfsense indonesia -
bro… saya sdh ikutin settingan dari halaman pertama.. agar kita tau lusca sudah berjalan dengan baik, caranya bagaimana>
Om_antoDIGIT tolong diterawang file /tmp/rules.debug saya doong.
#System aliases
loopback = "{ lo0 }"
WAN = "{ pppoe0 }"
LAN = "{ rl0 }"#SSH Lockout Table
table <sshlockout>persist
table <webconfiguratorlockout>persist
#pfSnortSam tables
table <snort2c>table <pfsnortsamout>table <pfsnortsamin>table <virusprot># User Aliases
Port_game_TCP = "{ 18900:18910 1818 39100:39220 49100 40000:40010 7777 19101 27780 29000 22100 5121 6000:6152 2001 9601:9602 8085 11011:11041 13413 19000 5105 10009 5340:5352 6000:6001 29200 10402 9600 15000:15002 16402:16502 3010 11031 4300 11005 6900 6112 14800 23800 13008:13009 16666 28012 5126 15001:15002 12011 12110 1202 7341:7350 7451 8421 6215:6217 12009 14004 }"
Port_game_UDP = "{ 40000:40010 9601:9602 11100:11125 11440:11460 12110 15002 7808:30000 12020:12080 13000:13080 42051:42052 }"Gateways
GWwan = " route-to ( pppoe0 125.161.156.1 ) "
set loginterface rl0
set optimization normal
set limit states 46000
set limit src-nodes 46000set skip on pfsync0
scrub in on $WAN all fragment reassemble
scrub in on $LAN all fragment reassemblenat-anchor "natearly/"
nat-anchor "natrules/"Outbound NAT rules
Subnets to NAT
tonatsubnets = "{ 192.168.222.0/29 127.0.0.0/8 }"
nat on $WAN from $tonatsubnets port 500 to any port 500 -> 125.161.159.233/32 port 500
nat on $WAN from $tonatsubnets to any -> 125.161.159.233/32 port 1024:65535Load balancing anchor
rdr-anchor "relayd/*"
TFTP proxy
rdr-anchor "tftp-proxy/*"
table <direct_networks>{ 125.161.159.233/32 192.168.222.0/29 }Setup Squid proxy redirect
rdr on rl0 proto tcp from any to !(rl0) port 80 -> 127.0.0.1 port 80
UPnPd rdr anchor
rdr-anchor "miniupnpd"
anchor "relayd/*"
#–-------------------------------------------------------------------------default deny rules
#---------------------------------------------------------------------------
block in log all label "Default deny rule"
block out log all label "Default deny rule"We use the mighty pf, we cannot be fooled.
block quick proto { tcp, udp } from any port = 0 to any
block quick proto { tcp, udp } from any to any port = 0Block all IPv6
block in quick inet6 all
block out quick inet6 allpfSnortSam
block quick from <snort2c>to any label "Block snort2c hosts"
block quick from any to <snort2c>label "Block snort2c hosts"
block quick from <pfsnortsamout>to any label "Block pfSnortSamOut hosts"
block quick from any to <pfsnortsamin>label "Block pfSnortSamIn hosts"SSH lockout
block in log quick proto tcp from <sshlockout>to any port 22 label "sshlockout"
webConfigurator lockout
block in log quick proto tcp from <webconfiguratorlockout>to any port 80 label "webConfiguratorlockout"
block in quick from <virusprot>to any label "virusprot overload table"
table <bogons>persist file "/etc/bogons"block bogon networks
http://www.cymru.com/Documents/bogon-bn-nonagg.txt
block in log quick on $WAN from <bogons>to any label "block bogon networks from WAN"
antispoof for pppoe0block anything from private networks on interfaces with the option set
antispoof for $WAN
block in log quick on $WAN from 10.0.0.0/8 to any label "block private networks from wan block 10/8"
block in log quick on $WAN from 127.0.0.0/8 to any label "block private networks from wan block 127/8"
block in log quick on $WAN from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"
block in log quick on $WAN from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
antispoof for rl0loopback
pass in on $loopback all label "pass loopback"
pass out on $loopback all label "pass loopback"let out anything from the firewall host itself and decrypted IPsec traffic
pass out all keep state allow-opts label "let out anything from firewall host itself"
pass out route-to ( pppoe0 125.161.156.1 ) from 125.161.159.233 to !125.161.159.233/32 keep state allow-opts label "let out anything from firewall host itself"make sure the user cannot lock himself out of the webConfigurator or SSH
pass in quick on rl0 proto tcp from any to (rl0) port { 80 22 } keep state label "anti-lockout rule"
User-defined rules follow
pass out proto udp from any to any queue (qVoIP) label "USER_RULE: DiffServ/Lowdelay/Upload"
pass out proto tcp from any to any port 6880 >< 7000 queue (qP2P) label "USER_RULE: m_P2P BitTorrent outbound"
pass out proto udp from any to any port 6880 >< 7000 queue (qP2P) label "USER_RULE: m_P2P BitTorrent outbound"
pass out proto tcp from any to any port 3389 queue (qOthersDefault,qACK) label "USER_RULE: m_Other MSRDP outbound"
pass out proto tcp from any to any port 5899 >< 5931 queue (qOthersDefault,qACK) label "USER_RULE: m_Other VNC outbound"
pass out proto tcp from any to any port 3283 queue (qOthersDefault,qACK) label "USER_RULE: m_Other AppleRemoteDesktop1 outbound"
pass out proto tcp from any to any port 5900 queue (qOthersDefault,qACK) label "USER_RULE: m_Other AppleRemoteDesktop2 outbound"
pass out proto udp from any to any port 3283 queue (qOthersDefault) label "USER_RULE: m_Other AppleRemoteDesktop3 outbound"
pass out proto udp from any to any port 5900 queue (qOthersDefault) label "USER_RULE: m_Other AppleRemoteDesktop4 outbound"
pass out proto tcp from any to any port 5631 queue (qOthersDefault,qACK) label "USER_RULE: m_Other pcany1 outbound"
pass out proto udp from any to any port 5632 queue (qOthersDefault) label "USER_RULE: m_Other pcany2 outbound"
pass out proto tcp from any to any port 6666 >< 6671 queue (qOthersDefault,qACK) label "USER_RULE: m_Other IRC outbound"
pass out proto tcp from any to any port 5222 queue (qOthersDefault,qACK) label "USER_RULE: m_Other IRC outbound"
pass out proto tcp from any to any port 5223 queue (qOthersDefault,qACK) label "USER_RULE: m_Other IRC outbound"
pass out proto tcp from any to any port 5269 queue (qOthersDefault,qACK) label "USER_RULE: m_Other IRC outbound"
pass out proto tcp from any to any port 5190 queue (qOthersDefault,qACK) label "USER_RULE: m_Other ICQ1 outbound"
pass out proto udp from any to any port 5190 queue (qOthersDefault) label "USER_RULE: m_Other ICQ2 outbound"
pass out proto tcp from any to any port 5190 queue (qOthersDefault,qACK) label "USER_RULE: m_Other AIM outbound"
pass out proto tcp from any to any port 1863 queue (qOthersDefault,qACK) label "USER_RULE: m_Other MSN1 outbound"
pass out proto tcp from any to any port 6890 >< 6901 queue (qOthersDefault,qACK) label "USER_RULE: m_Other MSN2 outbound"
pass out proto tcp from any to any port 6901 queue (qOthersDefault,qACK) label "USER_RULE: m_Other MSN3 outbound"
pass out proto udp from any to any port 6901 queue (qOthersDefault) label "USER_RULE: m_Other MSN4 outbound"
pass out proto tcp from any to any port 14534 queue (qOthersDefault,qACK) label "USER_RULE: m_Other teamspeak1 outbound"
pass out proto tcp from any to any port 51234 queue (qOthersDefault,qACK) label "USER_RULE: m_Other teamspeak2 outbound"
pass out proto udp from any to any port 8766 >< 8769 queue (qOthersDefault) label "USER_RULE: m_Other teamspeak3 outbound"
pass out proto tcp from any to any port 1723 queue (qOthersDefault,qACK) label "USER_RULE: m_Other PPTP outbound"
pass out proto gre from any to any queue (qOthersDefault) label "USER_RULE: m_Other PPTPGRE outbound"
pass out proto udp from any to any port 500 queue (qOthersDefault) label "USER_RULE: m_Other IPSEC outbound"
pass out proto ah from any to any queue (qOthersDefault) label "USER_RULE: m_Other IPSEC outbound"
pass out proto esp from any to any queue (qOthersDefault) label "USER_RULE: m_Other IPSEC outbound"
pass out proto tcp from any to any port 7999 >< 8101 queue (qOthersDefault,qACK) label "USER_RULE: m_Other STREAMINGMP3 outbound"
pass out proto tcp from any to any port 554 queue (qOthersDefault,qACK) label "USER_RULE: m_Other RTSP1 outbound"
pass out proto tcp from any to any port 80 queue (qOthersHigh,qACK) label "USER_RULE: m_Other HTTP outbound"
pass out proto tcp from any to any port 443 queue (qOthersHigh,qACK) label "USER_RULE: m_Other HTTPS outbound"
pass out proto tcp from any to any port 25 queue (qOthersLow,qACK) label "USER_RULE: m_Other SMTP outbound"
pass out proto tcp from any to any port 110 queue (qOthersLow,qACK) label "USER_RULE: m_Other POP3 outbound"
pass out proto tcp from any to any port 143 queue (qOthersLow,qACK) label "USER_RULE: m_Other IMAP outbound"
pass out proto tcp from any to any port 1352 queue (qOthersLow,qACK) label "USER_RULE: m_Other LotusNotes1 outbound"
pass out proto udp from any to any port 1352 queue (qOthersLow) label "USER_RULE: m_Other LotusNotes2 outbound"
pass out proto tcp from any to any port 53 queue (qOthersHigh,qACK) label "USER_RULE: m_Other DNS1 outbound"
pass out proto udp from any to any port 53 queue (qOthersHigh) label "USER_RULE: m_Other DNS2 outbound"
pass out inet proto icmp from any to any queue (qOthersDefault) label "USER_RULE: m_Other ICMP outbound"
pass out proto tcp from any to any port 445 queue (qOthersDefault,qACK) label "USER_RULE: m_Other SMB1 outbound"
pass out proto tcp from any to any port 136 >< 140 queue (qOthersDefault,qACK) label "USER_RULE: m_Other SMB2 outbound"
pass out proto tcp from any to any port 161 queue (qOthersDefault,qACK) label "USER_RULE: m_Other SNMP outbound"
pass out proto udp from any to any port 161 queue (qOthersDefault) label "USER_RULE: m_Other SNMP2 outbound"
pass out proto tcp from any to any port 3306 queue (qOthersDefault,qACK) label "USER_RULE: m_Other MySQL1 outbound"
pass out proto tcp from any to any port 119 queue (qOthersDefault,qACK) label "USER_RULE: m_Other NNTP1 outbound"
pass out proto udp from any to any port 119 queue (qOthersDefault) label "USER_RULE: m_Other NNTP2 outbound"
pass out proto tcp from any to any port 5999 queue (qOthersDefault,qACK) label "USER_RULE: m_Other cvsup outbound"
pass out proto tcp from any to any port 5001 queue (qOthersDefault,qACK) label "USER_RULE: m_Other Slingbox1 outbound"
pass out proto udp from any to any port 5001 queue (qOthersDefault) label "USER_RULE: m_Other Slingbox2 outbound"
pass out proto tcp from any to any port 3000 queue (qOthersDefault,qACK) label "USER_RULE: m_Other HBCI outbound"
pass in quick on $LAN proto tcp from any to any port 1972 flags S/SA keep state queue (qOthersHigh) label "USER_RULE: e-trading"
pass in quick on $LAN proto { tcp udp } from any to any port 53 keep state queue (qOthersHigh) label "USER_RULE: dns"
pass in quick on $LAN proto { tcp udp } from any to any port 5060 keep state queue (qVoIP) label "USER_RULE: nimbuzz"
pass in quick on $LAN proto udp from any to any port 4999 >< 5011 keep state queue (qVoIP) label "USER_RULE: Voice Chat "
pass in quick on $LAN proto { tcp udp } from any to any port 8877 keep state queue (qVoIP) label "USER_RULE: skype"
pass in quick on $LAN proto tcp from any to any port $Port_game_TCP flags S/SA keep state queue (qGames) label "USER_RULE"
pass in quick on $LAN proto udp from any to any port $Port_game_UDP keep state queue (qGames) label "USER_RULE"
pass in quick on $LAN proto tcp from 192.168.222.0/29 to any port 80 flags S/SA keep state queue (qOthersHigh) label "USER_RULE: http not hit s"
pass in quick on $LAN inet proto icmp from 192.168.222.0/29 to any keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto tcp from 192.168.222.0/29 to any port 81 flags S/SA keep state queue (qOthersDefault) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 20 keep state queue (qOthersDefault) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 21 keep state queue (qOthersHigh) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 22 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 23 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 25 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 465 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 993 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 587 keep state queue (qOthersLow) label "USER_RULE: smtp"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 110 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto tcp from 192.168.222.0/29 to any port 443 flags S/SA keep state queue (qOthersHigh) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 143 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 1755 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 7000 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 993 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 123 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 161 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 3000 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 5050 keep state queue (qOthersDefault) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 8000 >< 8003 keep state queue (qOthersLow) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from any to any port 4999 >< 5002 keep state queue (qVoIP) label "USER_RULE"
pass in quick on $LAN proto tcp from any to any port 5099 >< 5102 flags S/SA keep state queue (qOthersHigh) label "USER_RULE"
pass in quick on $LAN proto { tcp udp } from 192.168.222.0/29 to any port 58999 >< 61000 keep state queue (qP2P) label "USER_RULE: alokasi port utk P2P"
block in quick on $LAN proto { tcp udp } from 192.168.222.0/29 port 9666 to any label "USER_RULE"
block in quick on $LAN proto { tcp udp } from 192.168.222.0/29 port 8084 to any label "USER_RULE"VPN Rules
anchor "tftp-proxy/*"
Setup squid pass rules for proxy
pass in quick on rl0 proto tcp from any to !(rl0) port 80 flags S/SA keep state
pass in quick on rl0 proto tcp from any to !(rl0) port 3128 flags S/SA keep state</bogons></bogons></virusprot></webconfiguratorlockout></sshlockout></pfsnortsamin></pfsnortsamout></snort2c></snort2c></direct_networks></virusprot></pfsnortsamin></pfsnortsamout></snort2c></webconfiguratorlockout></sshlockout>Mohon Pencerahannya
tks… -
pake putty console
login : root
pass : suka-suka yg buatpilih no. 8 (shell) enter
ketik deh salah satu dibawah ini
1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah -
pake putty console
login : root
pass : suka-suka yg buatpilih no. 8 (shell) enter
ketik deh salah satu dibawah ini
1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lahyang no 1 hasilnya
tail: /var/squid/logs/access.log: No such file or directory
yang no 2 hasilnya :
HTTP/1.1 200 OK
Server: Lusca/LUSCA r14850 patched: chudy r14
Date: Fri, 17 Jun 2011 16:28:58 GMT
Content-Type: text/plain
Expires: Fri, 17 Jun 2011 16:28:58 GMT
X-Cache: MISS from localhost
Transfer-Encoding: chunked
Via: 1.0 localhost:3128 (Lusca/LUSCA r14850 patched: chudy r14)
Connection: close854
Squid Object Cache: Version LUSCA r14850 patched: chudy r14
Start Time: Fri, 17 Jun 2011 02:36:21 GMT
Current Time: Fri, 17 Jun 2011 16:28:58 GMT
Connection information for squid:
Number of clients accessing cache: 3
Number of HTTP requests received: 20749
Number of ICP messages received: 0
Number of ICP messages sent: 0
Number of queued ICP replies: 0
Request failure ratio: 0.00
Average HTTP requests per minute since start: 24.9
Average ICP messages per minute since start: 0.0
Select loop called: 2862271 times, 17.453 ms avg
Cache information for squid:
Request Hit Ratios: 5min: 22.9%, 60min: 13.5%
Byte Hit Ratios: 5min: 7.0%, 60min: 3.5%
Request Memory Hit Ratios: 5min: 5.1%, 60min: 26.4%
Request Disk Hit Ratios: 5min: 17.9%, 60min: 22.1%
Storage Swap size: 281228 KB
Storage Mem size: 85012 KB
Mean Object Size: 20.76 KB
Requests given to unlinkd: 0
Median Service Times (seconds) 5 min 60 min:
HTTP Requests (All): 0.14252 0.37825
Cache Misses: 0.35832 0.52331
Cache Hits: 0.00194 0.00179
Near Hits: 2.25116 0.15888
Not-Modified Replies: 0.00000 0.00000
DNS Lookups: 0.00000 0.00000
ICP Queries: 0.00000 0.00000
Resource usage for squid:
UP Time: 49956.441 seconds
CPU Time: 164.668 seconds
CPU Usage: 0.33%
CPU Usage, 5 minute avg: 0.49%
CPU Usage, 60 minute avg: 0.48%
Process Data Segment Size via sbrk(): 0 KB
Maximum Resident Size: 194880 KB
Page faults with physical i/o: 1
Memory accounted for:
Total accounted: 96820 KB
memPoolAlloc calls: 4545054
memPoolFree calls: 4248515
File descriptor usage for squid:
Maximum number of file descriptors: 58982
Largest file desc currently in use: 162
Number of file desc currently in use: 28
Files queued for open: 0
Available number of file descriptors: 58954
Reserved number of file descriptors: 100
Store Disk files open: 3
IO loop method: kqueue
Internal Data Structures:
13709 StoreEntries
11173 StoreEntries with MemObjects
11167 Hot Object Cache Items
13548 on-disk objects0
berjalan gak ya luscanya?
-
Udah jalan Lusca nya
mungkin harus pake
tail -f /var/squid/log/access.log –> tuk liat aktivitas squid
(settingan om anto_digit ya) dicoba ya..
-
pak abnisrea dan rekan2 disini, sdh pernah ada yang create server games DOTA di PfSense?
-
gan, di warnet ane banyak yang main seafight, biar loadingnya cepet gmn ngaturnya ya? lusca g bisa neg cache seafight ya? kl youtube bisa di cache.
bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.
-
bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.
kalau untuk create server DOTA bisa pak?
-
Memperlambat Laju Video pada PfSense bagi yg kekurangan bandwith
Untuk memperlambat laju Video baik dari Youtub dan lainnya adalah dengan cara menambahkan delay pool pada custom option. contoh
acl bad_sites url_regex -i youtube.com redtube.com porn.com –> masukkan link yg akan di perlambat
delay_pools 1
delay_class 1 1
delay_access 1 allow bad_sites
delay_parameters 1 64000/8192 -
Proxy server: General settings
Custom Options
Custom Option ku pd pfsense
Karena bandwidth aku prihatin aku coba-coba rubah PpSense kesayanganku Custom Option di Lusca ku
dan hasilnya cukup memuaskan dmana dengan Bandwidth 1M dari Spidol dapat dibagi untuk 20 Unit Client..acl admin src 192.168.1.2/255.255.255.255;
acl throttle_exts urlpath_regex -i "/var/squid/acl/throttle_exts.acl";
acl bad_sites url_regex -i youtube.com porn.com;
delay_pools 3;
delay_class 1 1;
delay_parameters 1 -1/-1;
delay_access 1 allow admin;
delay_access 1 deny all;
delay_class 2 1;
delay_parameters 2 49152/16384;
delay_access 2 allow bad_sites;
delay_access 2 deny all;
delay_class 3 1;
delay_parameters 3 12288/8192;
delay_initial_bucket_level 100;
delay_access 3 allow throttle_exts;
delay_access 3 deny all;
#zph_mode tos;
#zph_local 0x04;
#zph_parent 0;
#zph_option 136;
acl HTML url_regex .ini$;
no_cache deny HTML;
acl XYZZY url_regex ^http://122.102.49.132/audition/Update.ini$;
acl XYZZY url_regex ^http://patch.crossfire.web.id/download/version.ini$;
acl XYZZY url_regex ^http://patch.sealindo.com/patch/normal/version.ini$; -
Rekan2 ada yang tahu port utk game Ayodance ? ;D
selain TCP 18900:18909 -
sma tolong di share port PB thailand, nuhun
-
nyobain PB thailand katanyasih lebih bagus gambarnya dan jelas (pake proxy lusca bukan di IE internet explorer)
![PB_thai1 Patch.JPG](/public/imported_attachments/1/PB_thai1 Patch.JPG)
![PB_thai1 Patch.JPG_thumb](/public/imported_attachments/1/PB_thai1 Patch.JPG_thumb)
![PB_thai2 Luscahed.JPG](/public/imported_attachments/1/PB_thai2 Luscahed.JPG)
![PB_thai2 Luscahed.JPG_thumb](/public/imported_attachments/1/PB_thai2 Luscahed.JPG_thumb) -
PB Thailanthung..
http://pointblank.hitsplay.com/GameInfo/weapon2.aspx
http://pointblank.hitsplay.com/download/client.aspxUntuk Info lainnya
http://www.kaskus.us/showthread.php?t=3190237
-
Untuk Game PB yg gagal jalan atau security error dicoba melalui putty console
squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/afs.dat
squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/noupdate.ui
squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahn.ui
squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/patch/39/ahn.ui
squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahni2.dll -
Mohon bantuan untuk kanda" sekalian yang master dari pfsense…
saya sudah install pfsense dan berjalan normal... yang ingin saya tanyakan apakah ada settingan khusus agar patch game dari Cross Fire & GrandChase tercache??? soalnya kedua game tersebut ketika saya jalankan patchnya tidak tercache sehingga saya harus patch manual untuk setiap komputer client...
Untuk game lainnya seperti PB, Audition/AyoDance, Dan lain-lainnya gak ada masalah... semuanya bisa tercache dengan baik...
Mohon dibantu oleh para sesepuh disini agar bisa memecahkan masalah saya tersebut... terima kasih....
-
Numpang nanya gan,
Kalau game via facebook ato game berbasis web/http, masuk ke port mana itu ?
Apakah masuk ke port game ato port http ?
Jadi misalnya kita pake Dual Wan, 1 WAN 1 OPT, game ke OPT dan lainnya WAN.
Jadi game fb ato web tersebut mengambil akses internet yang mana ?
Dan bagaimana jika berjalan bersamaan, gamenya ?
terima kasih.
Mohon bantuannya. -
Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)
-
Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)
ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
apakah game fb itu masuk ke dalam port game online ?
apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ? -
Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)
ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
apakah game fb itu masuk ke dalam port game online ?
apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?bikin rule di firewall rules nya aja mas, TCP/UDP source addr > LAN subnet, Destination port > http/80, Gateway > WAN
untuk port game nya pake config aliase game online Gateway nya ke OPT