Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UNTUK GAME ONLINE MASUK SINI !!!!!!!!!

    Scheduled Pinned Locked Moved Indonesian
    169 Posts 35 Posters 172.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Q
      queues
      last edited by

      bro… saya sdh ikutin settingan dari halaman pertama.. agar kita tau lusca sudah berjalan dengan baik, caranya bagaimana>

      Om_antoDIGIT tolong diterawang file /tmp/rules.debug saya doong.

      #System aliases
       
      loopback = "{ lo0 }"
      WAN = "{ pppoe0 }"
      LAN = "{ rl0 }"

      #SSH Lockout Table
      table <sshlockout>persist
      table <webconfiguratorlockout>persist
      #pfSnortSam tables
      table <snort2c>table <pfsnortsamout>table <pfsnortsamin>table <virusprot># User Aliases
      Port_game_TCP = "{  18900:18910  1818  39100:39220  49100  40000:40010  7777  19101  27780  29000  22100  5121  6000:6152  2001  9601:9602  8085  11011:11041  13413  19000  5105  10009  5340:5352  6000:6001  29200  10402  9600  15000:15002  16402:16502  3010  11031  4300  11005  6900  6112  14800  23800  13008:13009  16666  28012  5126  15001:15002  12011  12110  1202  7341:7350  7451  8421  6215:6217  12009  14004 }"
      Port_game_UDP = "{  40000:40010  9601:9602  11100:11125  11440:11460  12110  15002  7808:30000  12020:12080  13000:13080  42051:42052 }"

      Gateways

      GWwan = " route-to ( pppoe0 125.161.156.1 ) "

      set loginterface rl0
      set optimization normal
      set limit states 46000
      set limit src-nodes 46000

      set skip on pfsync0

      scrub in on $WAN all    fragment reassemble
      scrub in on $LAN all    fragment reassemble

      nat-anchor "natearly/"
      nat-anchor "natrules/
      "

      Outbound NAT rules

      Subnets to NAT

      tonatsubnets = "{ 192.168.222.0/29 127.0.0.0/8  }"
      nat on $WAN  from $tonatsubnets port 500 to any port 500 -> 125.161.159.233/32 port 500 
      nat on $WAN  from $tonatsubnets to any -> 125.161.159.233/32 port 1024:65535

      Load balancing anchor

      rdr-anchor "relayd/*"

      TFTP proxy

      rdr-anchor "tftp-proxy/*"
      table <direct_networks>{ 125.161.159.233/32 192.168.222.0/29 }

      Setup Squid proxy redirect

      rdr on rl0 proto tcp from any to !(rl0) port 80 -> 127.0.0.1 port 80

      UPnPd rdr anchor

      rdr-anchor "miniupnpd"

      anchor "relayd/*"
      #–-------------------------------------------------------------------------

      default deny rules

      #---------------------------------------------------------------------------
      block in log all label "Default deny rule"
      block out log all label "Default deny rule"

      We use the mighty pf, we cannot be fooled.

      block quick proto { tcp, udp } from any port = 0 to any
      block quick proto { tcp, udp } from any to any port = 0

      Block all IPv6

      block in quick inet6 all
      block out quick inet6 all

      pfSnortSam

      block quick from <snort2c>to any label "Block snort2c hosts"
      block quick from any to <snort2c>label "Block snort2c hosts"
      block quick from <pfsnortsamout>to any label "Block pfSnortSamOut hosts"
      block quick from any to <pfsnortsamin>label "Block pfSnortSamIn hosts"

      SSH lockout

      block in log quick proto tcp from <sshlockout>to any port 22 label "sshlockout"

      webConfigurator lockout

      block in log quick proto tcp from <webconfiguratorlockout>to any port 80 label "webConfiguratorlockout"
      block in quick from <virusprot>to any label "virusprot overload table"
      table <bogons>persist file "/etc/bogons"

      block bogon networks

      http://www.cymru.com/Documents/bogon-bn-nonagg.txt

      block in log quick on $WAN from <bogons>to any label "block bogon networks from WAN"
      antispoof for pppoe0

      block anything from private networks on interfaces with the option set

      antispoof for $WAN
      block in log quick on $WAN from 10.0.0.0/8 to any label "block private networks from wan block 10/8"
      block in log quick on $WAN from 127.0.0.0/8 to any label "block private networks from wan block 127/8"
      block in log quick on $WAN from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"
      block in log quick on $WAN from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
      antispoof for rl0

      loopback

      pass in on $loopback all label "pass loopback"
      pass out on $loopback all label "pass loopback"

      let out anything from the firewall host itself and decrypted IPsec traffic

      pass out all keep state allow-opts label "let out anything from firewall host itself"
      pass out route-to ( pppoe0 125.161.156.1 ) from 125.161.159.233 to !125.161.159.233/32 keep state allow-opts label "let out anything from firewall host itself"

      make sure the user cannot lock himself out of the webConfigurator or SSH

      pass in quick on rl0 proto tcp from any to (rl0) port { 80 22 } keep state label "anti-lockout rule"

      User-defined rules follow

      pass  out  proto udp  from any to any  queue (qVoIP)  label "USER_RULE: DiffServ/Lowdelay/Upload"
      pass  out  proto tcp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
      pass  out  proto udp  from any to any port 6880 >< 7000  queue (qP2P)  label "USER_RULE: m_P2P BitTorrent outbound"
      pass  out  proto tcp  from any to any port 3389  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSRDP outbound"
      pass  out  proto tcp  from any to any port 5899 >< 5931  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other VNC outbound"
      pass  out  proto tcp  from any to any port 3283  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop1 outbound"
      pass  out  proto tcp  from any to any port 5900  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AppleRemoteDesktop2 outbound"
      pass  out  proto udp  from any to any port 3283  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop3 outbound"
      pass  out  proto udp  from any to any port 5900  queue (qOthersDefault)  label "USER_RULE: m_Other AppleRemoteDesktop4 outbound"
      pass  out  proto tcp  from any to any port 5631  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other pcany1 outbound"
      pass  out  proto udp  from any to any port 5632  queue (qOthersDefault)  label "USER_RULE: m_Other pcany2 outbound"
      pass  out  proto tcp  from any to any port 6666 >< 6671  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
      pass  out  proto tcp  from any to any port 5222  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
      pass  out  proto tcp  from any to any port 5223  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
      pass  out  proto tcp  from any to any port 5269  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other IRC outbound"
      pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other ICQ1 outbound"
      pass  out  proto udp  from any to any port 5190  queue (qOthersDefault)  label "USER_RULE: m_Other ICQ2 outbound"
      pass  out  proto tcp  from any to any port 5190  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other AIM outbound"
      pass  out  proto tcp  from any to any port 1863  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN1 outbound"
      pass  out  proto tcp  from any to any port 6890 >< 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN2 outbound"
      pass  out  proto tcp  from any to any port 6901  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MSN3 outbound"
      pass  out  proto udp  from any to any port 6901  queue (qOthersDefault)  label "USER_RULE: m_Other MSN4 outbound"
      pass  out  proto tcp  from any to any port 14534  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak1 outbound"
      pass  out  proto tcp  from any to any port 51234  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other teamspeak2 outbound"
      pass  out  proto udp  from any to any port 8766 >< 8769  queue (qOthersDefault)  label "USER_RULE: m_Other teamspeak3 outbound"
      pass  out  proto tcp  from any to any port 1723  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other PPTP outbound"
      pass  out  proto gre  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other PPTPGRE outbound"
      pass  out  proto udp  from any to any port 500  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
      pass  out  proto ah  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
      pass  out  proto esp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other IPSEC outbound"
      pass  out  proto tcp  from any to any port 7999 >< 8101  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other STREAMINGMP3 outbound"
      pass  out  proto tcp  from any to any port 554  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other RTSP1 outbound"
      pass  out  proto tcp  from any to any port 80  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTP outbound"
      pass  out  proto tcp  from any to any port 443  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other HTTPS outbound"
      pass  out  proto tcp  from any to any port 25  queue (qOthersLow,qACK)  label "USER_RULE: m_Other SMTP outbound"
      pass  out  proto tcp  from any to any port 110  queue (qOthersLow,qACK)  label "USER_RULE: m_Other POP3 outbound"
      pass  out  proto tcp  from any to any port 143  queue (qOthersLow,qACK)  label "USER_RULE: m_Other IMAP outbound"
      pass  out  proto tcp  from any to any port 1352  queue (qOthersLow,qACK)  label "USER_RULE: m_Other LotusNotes1 outbound"
      pass  out  proto udp  from any to any port 1352  queue (qOthersLow)  label "USER_RULE: m_Other LotusNotes2 outbound"
      pass  out  proto tcp  from any to any port 53  queue (qOthersHigh,qACK)  label "USER_RULE: m_Other DNS1 outbound"
      pass  out  proto udp  from any to any port 53  queue (qOthersHigh)  label "USER_RULE: m_Other DNS2 outbound"
      pass  out  inet proto icmp  from any to any  queue (qOthersDefault)  label "USER_RULE: m_Other ICMP outbound"
      pass  out  proto tcp  from any to any port 445  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB1 outbound"
      pass  out  proto tcp  from any to any port 136 >< 140  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SMB2 outbound"
      pass  out  proto tcp  from any to any port 161  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other SNMP outbound"
      pass  out  proto udp  from any to any port 161  queue (qOthersDefault)  label "USER_RULE: m_Other SNMP2 outbound"
      pass  out  proto tcp  from any to any port 3306  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other MySQL1 outbound"
      pass  out  proto tcp  from any to any port 119  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other NNTP1 outbound"
      pass  out  proto udp  from any to any port 119  queue (qOthersDefault)  label "USER_RULE: m_Other NNTP2 outbound"
      pass  out  proto tcp  from any to any port 5999  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other cvsup outbound"
      pass  out  proto tcp  from any to any port 5001  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other Slingbox1 outbound"
      pass  out  proto udp  from any to any port 5001  queue (qOthersDefault)  label "USER_RULE: m_Other Slingbox2 outbound"
      pass  out  proto tcp  from any to any port 3000  queue (qOthersDefault,qACK)  label "USER_RULE: m_Other HBCI outbound"
      pass  in  quick  on $LAN  proto tcp  from any to any port 1972  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: e-trading"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 53  keep state  queue (qOthersHigh)  label "USER_RULE: dns"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5060  keep state  queue (qVoIP)  label "USER_RULE: nimbuzz"
      pass  in  quick  on $LAN  proto udp  from any to any port 4999 >< 5011  keep state  queue (qVoIP)  label "USER_RULE: Voice Chat "
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8877  keep state  queue (qVoIP)  label "USER_RULE: skype"
      pass  in  quick  on $LAN  proto tcp  from any to any port $Port_game_TCP  flags S/SA keep state  queue (qGames)  label "USER_RULE"
      pass  in  quick  on $LAN  proto udp  from any to any port $Port_game_UDP  keep state  queue (qGames)  label "USER_RULE"
      pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 80  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE: http not hit s"
      pass  in  quick  on $LAN  inet proto icmp  from 192.168.222.0/29 to any keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 81  flags S/SA keep state  queue (qOthersDefault)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 20  keep state  queue (qOthersDefault)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 21  keep state  queue (qOthersHigh)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 22  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 23  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 25  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 465  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 587  keep state  queue (qOthersLow)  label "USER_RULE: smtp"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 110  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto tcp  from 192.168.222.0/29 to any port 443  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 143  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 1755  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 7000  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 993  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 123  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 161  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 3000  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 5050  keep state  queue (qOthersDefault)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 8000 >< 8003  keep state  queue (qOthersLow)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from any to any port 4999 >< 5002  keep state  queue (qVoIP)  label "USER_RULE"
      pass  in  quick  on $LAN  proto tcp  from any to any port 5099 >< 5102  flags S/SA keep state  queue (qOthersHigh)  label "USER_RULE"
      pass  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 to any port 58999 >< 61000  keep state  queue (qP2P)  label "USER_RULE: alokasi port utk P2P"
      block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 9666  to any  label "USER_RULE"
      block  in  quick  on $LAN  proto { tcp udp }  from 192.168.222.0/29 port 8084  to any  label "USER_RULE"

      VPN Rules

      anchor "tftp-proxy/*"

      Setup squid pass rules for proxy

      pass in quick on rl0 proto tcp from any to !(rl0) port 80 flags S/SA keep state
      pass in quick on rl0 proto tcp from any to !(rl0) port 3128 flags S/SA keep state</bogons></bogons></virusprot></webconfiguratorlockout></sshlockout></pfsnortsamin></pfsnortsamout></snort2c></snort2c></direct_networks></virusprot></pfsnortsamin></pfsnortsamout></snort2c></webconfiguratorlockout></sshlockout>

      Mohon Pencerahannya
      tks…

      1 Reply Last reply Reply Quote 0
      • A
        abnisrea
        last edited by

        pake putty console
        login : root
        pass : suka-suka yg buat

        pilih no. 8 (shell) enter

        ketik deh salah satu dibawah ini

        1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
        2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

        1 Reply Last reply Reply Quote 0
        • Q
          queues
          last edited by

          @abnisrea:

          pake putty console
          login : root
          pass : suka-suka yg buat

          pilih no. 8 (shell) enter

          ketik deh salah satu dibawah ini

          1. tail -f /var/squid/logs/access.log –> tuk liat aktivitas squid
          2. squidclient -p 80 mgr:info --> tuk liat ya mcem2 lah

          yang no 1 hasilnya

          tail: /var/squid/logs/access.log: No such file or directory

          yang no 2 hasilnya :

          HTTP/1.1 200 OK
          Server: Lusca/LUSCA r14850 patched: chudy r14
          Date: Fri, 17 Jun 2011 16:28:58 GMT
          Content-Type: text/plain
          Expires: Fri, 17 Jun 2011 16:28:58 GMT
          X-Cache: MISS from localhost
          Transfer-Encoding: chunked
          Via: 1.0 localhost:3128 (Lusca/LUSCA r14850 patched: chudy r14)
          Connection: close

          854
          Squid Object Cache: Version LUSCA r14850 patched: chudy r14
          Start Time:    Fri, 17 Jun 2011 02:36:21 GMT
          Current Time:  Fri, 17 Jun 2011 16:28:58 GMT
          Connection information for squid:
                  Number of clients accessing cache:      3
                  Number of HTTP requests received:      20749
                  Number of ICP messages received:        0
                  Number of ICP messages sent:    0
                  Number of queued ICP replies:  0
                  Request failure ratio:  0.00
                  Average HTTP requests per minute since start:  24.9
                  Average ICP messages per minute since start:    0.0
                  Select loop called: 2862271 times, 17.453 ms avg
          Cache information for squid:
                  Request Hit Ratios:    5min: 22.9%, 60min: 13.5%
                  Byte Hit Ratios:        5min: 7.0%, 60min: 3.5%
                  Request Memory Hit Ratios:      5min: 5.1%, 60min: 26.4%
                  Request Disk Hit Ratios:        5min: 17.9%, 60min: 22.1%
                  Storage Swap size:      281228 KB
                  Storage Mem size:      85012 KB
                  Mean Object Size:      20.76 KB
                  Requests given to unlinkd:      0
          Median Service Times (seconds)  5 min    60 min:
                  HTTP Requests (All):  0.14252  0.37825
                  Cache Misses:          0.35832  0.52331
                  Cache Hits:            0.00194  0.00179
                  Near Hits:            2.25116  0.15888
                  Not-Modified Replies:  0.00000  0.00000
                  DNS Lookups:          0.00000  0.00000
                  ICP Queries:          0.00000  0.00000
          Resource usage for squid:
                  UP Time:        49956.441 seconds
                  CPU Time:      164.668 seconds
                  CPU Usage:      0.33%
                  CPU Usage, 5 minute avg:        0.49%
                  CPU Usage, 60 minute avg:      0.48%
                  Process Data Segment Size via sbrk(): 0 KB
                  Maximum Resident Size: 194880 KB
                  Page faults with physical i/o: 1
          Memory accounted for:
                  Total accounted:        96820 KB
                  memPoolAlloc calls: 4545054
                  memPoolFree calls: 4248515
          File descriptor usage for squid:
                  Maximum number of file descriptors:  58982
                  Largest file desc currently in use:    162
                  Number of file desc currently in use:  28
                  Files queued for open:                  0
                  Available number of file descriptors: 58954
                  Reserved number of file descriptors:  100
                  Store Disk files open:                  3
                  IO loop method:                    kqueue
          Internal Data Structures:
                  13709 StoreEntries
                  11173 StoreEntries with MemObjects
                  11167 Hot Object Cache Items
                  13548 on-disk objects

          0

          berjalan gak ya luscanya?

          1 Reply Last reply Reply Quote 0
          • A
            abnisrea
            last edited by

            Udah jalan Lusca nya

            mungkin harus pake

            tail -f /var/squid/log/access.log –> tuk liat aktivitas squid

            (settingan om anto_digit ya) dicoba ya..

            1 Reply Last reply Reply Quote 0
            • Q
              queues
              last edited by

              pak abnisrea dan rekan2 disini, sdh pernah ada yang create server games DOTA di PfSense?

              1 Reply Last reply Reply Quote 0
              • D
                detrackmx
                last edited by

                @romee13:

                gan, di warnet ane banyak yang main seafight, biar loadingnya cepet gmn ngaturnya ya? lusca g bisa neg cache seafight ya? kl youtube bisa di cache.

                bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                1 Reply Last reply Reply Quote 0
                • Q
                  queues
                  last edited by

                  @detrackmx:

                  bisa kok lusca melakukan cache…..warnet ane lancar2 aja...tapi inget banyak virusnya itu game,masuk ke cache virusnya...jadi avira harus enable.

                  kalau untuk create server DOTA bisa pak?

                  1 Reply Last reply Reply Quote 0
                  • A
                    abnisrea
                    last edited by

                    Memperlambat Laju Video pada PfSense bagi yg kekurangan bandwith

                    Untuk memperlambat laju Video baik dari Youtub dan lainnya adalah dengan cara menambahkan delay pool pada custom option. contoh

                    acl bad_sites url_regex -i youtube.com redtube.com porn.com –> masukkan link yg akan di perlambat
                    delay_pools 1
                    delay_class 1 1
                    delay_access 1 allow bad_sites
                    delay_parameters 1 64000/8192

                    1 Reply Last reply Reply Quote 0
                    • A
                      abnisrea
                      last edited by

                      Proxy server: General settings

                      Custom Options

                      Custom Option ku pd pfsense
                      Karena bandwidth aku prihatin aku coba-coba rubah PpSense kesayanganku Custom Option di Lusca ku
                      dan hasilnya cukup memuaskan dmana dengan Bandwidth 1M dari Spidol dapat dibagi untuk 20 Unit Client..

                      acl admin src 192.168.1.2/255.255.255.255;
                      acl throttle_exts urlpath_regex -i "/var/squid/acl/throttle_exts.acl";
                      acl bad_sites url_regex -i youtube.com porn.com;
                      delay_pools 3;
                      delay_class 1 1;
                      delay_parameters 1 -1/-1;
                      delay_access 1 allow admin;
                      delay_access 1 deny all;
                      delay_class 2 1;
                      delay_parameters 2 49152/16384;
                      delay_access 2 allow bad_sites;
                      delay_access 2 deny all;
                      delay_class 3 1;
                      delay_parameters 3 12288/8192;
                      delay_initial_bucket_level 100;
                      delay_access 3 allow throttle_exts;
                      delay_access 3 deny all;
                      #zph_mode tos;
                      #zph_local 0x04;
                      #zph_parent 0;
                      #zph_option 136;
                      acl HTML url_regex .ini$;
                      no_cache deny HTML;
                      acl XYZZY url_regex ^http://122.102.49.132/audition/Update.ini$;
                      acl XYZZY url_regex ^http://patch.crossfire.web.id/download/version.ini$;
                      acl XYZZY url_regex ^http://patch.sealindo.com/patch/normal/version.ini$;

                      1 Reply Last reply Reply Quote 0
                      • A
                        anto_DIGIT
                        last edited by

                        Rekan2 ada yang tahu port utk game Ayodance ?  ;D
                        selain TCP 18900:18909

                        1 Reply Last reply Reply Quote 0
                        • P
                          poscom
                          last edited by

                          sma tolong di share port PB thailand, nuhun

                          1 Reply Last reply Reply Quote 0
                          • P
                            poscom
                            last edited by

                            nyobain PB thailand katanyasih lebih bagus gambarnya dan jelas (pake proxy lusca bukan di IE internet explorer)

                            ![PB_thai1 Patch.JPG](/public/imported_attachments/1/PB_thai1 Patch.JPG)
                            ![PB_thai1 Patch.JPG_thumb](/public/imported_attachments/1/PB_thai1 Patch.JPG_thumb)
                            ![PB_thai2 Luscahed.JPG](/public/imported_attachments/1/PB_thai2 Luscahed.JPG)
                            ![PB_thai2 Luscahed.JPG_thumb](/public/imported_attachments/1/PB_thai2 Luscahed.JPG_thumb)

                            1 Reply Last reply Reply Quote 0
                            • A
                              abnisrea
                              last edited by

                              PB Thailanthung..

                              http://pointblank.hitsplay.com/GameInfo/weapon2.aspx
                              http://pointblank.hitsplay.com/download/client.aspx

                              Untuk Info lainnya

                              http://www.kaskus.us/showthread.php?t=3190237

                              1 Reply Last reply Reply Quote 0
                              • A
                                abnisrea
                                last edited by

                                Untuk Game PB yg gagal jalan atau security error dicoba melalui putty console

                                squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/afs.dat
                                squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/noupdate.ui
                                squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahn.ui
                                squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/patch/39/ahn.ui
                                squidclient -p 80 -m purge http://file.pb.gemscool.com/hackshield/PatchSet/ahni2.dll

                                1 Reply Last reply Reply Quote 0
                                • R
                                  RudyPr1y4tn4
                                  last edited by

                                  Mohon bantuan untuk kanda" sekalian yang master dari pfsense…

                                  saya sudah install pfsense dan berjalan normal... yang ingin saya tanyakan apakah ada settingan khusus agar patch game dari Cross Fire & GrandChase tercache??? soalnya kedua game tersebut ketika saya jalankan patchnya tidak tercache sehingga saya harus patch manual untuk setiap komputer client...

                                  Untuk game lainnya seperti PB, Audition/AyoDance, Dan lain-lainnya gak ada masalah... semuanya bisa tercache dengan baik...

                                  Mohon dibantu oleh para sesepuh disini agar bisa memecahkan masalah saya tersebut... terima kasih....

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jundi49
                                    last edited by

                                    Numpang nanya gan,

                                    Kalau game via facebook ato game berbasis web/http, masuk ke port mana itu ?
                                    Apakah masuk ke port game ato port http ?
                                    Jadi misalnya kita pake Dual Wan, 1 WAN 1 OPT, game ke OPT dan lainnya WAN.
                                    Jadi game fb ato web tersebut mengambil akses internet yang mana ?
                                    Dan bagaimana jika berjalan bersamaan, gamenya ?
                                    terima kasih.
                                    Mohon bantuannya.

                                    1 Reply Last reply Reply Quote 0
                                    • N
                                      netcraft
                                      last edited by

                                      Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jundi49
                                        last edited by

                                        @netcraft:

                                        Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                        ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
                                        apakah game fb itu masuk ke dalam port game online ?
                                        apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          chiboik
                                          last edited by

                                          @jundi49:

                                          @netcraft:

                                          Kalo Game Berbasis Web Itu Tidak Terlalu Bermasalah Gan Di Dual WAN, Yang BErmasalah Tuh Kalo Game Online Kayak Point Blank, AVA, WarRock Dll.. (Harus Dibuatkan RULE Tersendiri Biar Routingnya Ga Bingung)

                                          ada kasus, dia bermain game online Lost Saga dan diminimize terus dia main game fb, pool dan ninja saga, pemakaian OPT (khusus game) menjadi besar.
                                          apakah game fb itu masuk ke dalam port game online ?
                                          apakah jika bermain bersamaan dalam 1 PC, akses netnya juga terpisah ato gabung ke salah 1 line ?

                                          bikin rule di firewall rules nya aja mas, TCP/UDP source addr > LAN subnet,  Destination port > http/80,  Gateway > WAN
                                          untuk port game nya pake config aliase game online Gateway nya ke OPT

                                          1 Reply Last reply Reply Quote 0
                                          • V
                                            vhantrenk
                                            last edited by

                                            @abnisrea:

                                            Untuk rekan2 newbie yg menggunakan squid transparent gagal patch ayodance harap dicoba cara ini menggunakan putty console

                                            squidclient -p 80 -m PURGE http://122.102.49.132/audition/Update.ini

                                            semoga bermanfaat
                                            suskes pfsense indonesia

                                            om abnisrea, ni funsinya tuk apa? net saya mengalami tidak bisa masuk ayodance klu lusca ON, tapi klu off bisa, apakah menggunakan perintah tsb cukup sekali, ataukah tiap gagal patch??

                                            thanks infonnya

                                            Seorang lulusan ekonomi senang komputer, autodidak n newbie

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.