Hi List,
I have here ASL version 6.004.
At the external interface QoS is activated and for Uplink/Downlink in each case 2048Kbits.
Likewise "monitor interface usage" activated for 95% UP/down.
The rules for QoS were changed.
Rules for VPN high priority, all other rules low priority.
As it works QoS does not look at all. One sees the following.
Although the external interface has more than 95% traffic, no notifications sent .
Although the VPN connections has high priority, other connections receive the whole bantwith.
Why? Is there possibly a problem because the external interface 20 IP Aliasse has?
One sees the following in the QoS log, all the same whether high or low traffic.
Chain POLICY_ROUTING_OUT (1 references)
pkts bytes target prot opt in out source destination
Chain POLICY_ROUTING_PRE (1 references)
pkts bytes target prot opt in out source destination
Chain PREROUTING (policy ACCEPT 6611K packets, 5537M bytes)
pkts bytes target prot opt in out source destination
0 0 ULOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 length 20:21 ULOG copy_range 40 nlgroup 1 prefix `INVALID_PKT: ' queue_threshold 50
0 0 ULOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 5 ULOG copy_range 40 nlgroup 1 prefix `ICMP REDIRECT: ' queue_threshold 50
6567K 5520M POLICY_ROUTING_PRE all -- * * 0.0.0.0/0 0.0.0.0/0
106 6072 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED helper match "ftp" ULOG copy_range 40 nlgroup 1 prefix `FTP_DATA: ' queue_threshold 50
Chain INPUT (policy ACCEPT 1549K packets, 753M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 5062K packets, 4785M bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 1519K packets, 752M bytes)
pkts bytes target prot opt in out source destination
1519K 752M POLICY_ROUTING_OUT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 5410K packets, 5081M bytes)
pkts bytes target prot opt in out source destination
887K 436M ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
260K 14M SET_PRIO_HIGH tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x10/0x10 length 50:100
343 36676 SET_PRIO_HIGH all -- * * 0.0.0.0/0 0.0.0.0/0 TOS match 0x10
2997 268K SET_PRIO_HIGH icmp -- * * 0.0.0.0/0 0.0.0.0/0
Chain SET_PRIO_HIGH (3 references)
pkts bytes target prot opt in out source destination
156K 8270K CLASSIFY all -- * eth1 0.0.0.0/0 0.0.0.0/0 CLASSIFY set 2:8
156K 8270K ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
107K 6507K CLASSIFY all -- * * 0.0.0.0/0 0.0.0.0/0 CLASSIFY set 0:8
107K 6507K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain SET_PRIO_LOW (0 references)
pkts bytes target prot opt in out source destination
0 0 CLASSIFY all -- * eth1 0.0.0.0/0 0.0.0.0/0 CLASSIFY set 2:5
0 0 ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
0 0 CLASSIFY all -- * * 0.0.0.0/0 0.0.0.0/0 CLASSIFY set 0:5
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
--------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------
Possibly someone an idea?
Stefan
This thread was automatically locked due to age.