Using ROS 6.27.
I’ve set up mangle to classify traffic in order to shape bandwidth in queue tree.
I see that some traffic (packets) that should be marked, actually aren’t, and cannot figure out why, so unless there are some “special” conditions under ros under which it doesn’t mark traffic otherwise specified to do so, there should be either a ROS, or L8 bug (most probably) ![]()
these are the mangle rules:
/ip firewall mangle
# HTTP/S SSTP
add action=mark-connection chain=forward comment=HTTP/S connection-state=new dst-port=80,443,5228 new-connection-mark=HTTP protocol=tcp
add action=mark-packet chain=forward comment=HTTP-Ficheros connection-bytes=5000000-0 connection-mark=HTTP new-packet-mark=HTTP_PD passthrough=no protocol=tcp
add action=mark-packet chain=forward comment=HTTP-Trafico connection-mark=HTTP new-packet-mark=HTTP_P passthrough=no
add action=log chain=forward comment=HTTP/S connection-mark=no-mark log=yes log-prefix=ESCAPANDO port=80,443,5228 protocol=tcp
# Email related
add action=mark-connection chain=forward comment=CORREO connection-state=new dst-port=25,57,109,110,993,995,143,465,587 new-connection-mark=CORREO protocol=tcp
add action=mark-packet chain=forward connection-mark=CORREO new-packet-mark=CORREO_P passthrough=no
# Management
add action=mark-connection chain=forward comment=MGMT connection-state=new dst-port=22,7490,3389,5900,8291 new-connection-mark=MGMT protocol=tcp
add action=mark-packet chain=forward connection-mark=MGMT new-packet-mark=MGMT_P passthrough=no
add action=mark-connection chain=forward comment=Resto connection-state=new new-connection-mark=RESTO
# GRE
add action=mark-connection chain=forward comment=GRE connection-state=new new-connection-mark=VPN protocol=gre
add action=mark-packet chain=forward connection-mark=VPN new-packet-mark=VPN_P passthrough=no
# All the rest
add action=mark-packet chain=forward connection-mark=RESTO new-packet-mark=Resto_P passthrough=no
# Direct marking DNS and ICMP
add action=mark-packet chain=forward comment="Marcado directo" dst-port=53 new-packet-mark=DNSU passthrough=no protocol=udp
add action=mark-packet chain=forward new-packet-mark=DNSD passthrough=no protocol=udp src-port=53
add action=mark-packet chain=forward icmp-options=8 new-packet-mark=ICMP_U passthrough=no protocol=icmp
add action=mark-packet chain=forward icmp-options=0 new-packet-mark=ICMP_D passthrough=no protocol=icmp
# Check unmarked
add action=log chain=forward log=yes log-prefix=SINMARCA packet-mark=no-mark
However, while in firewall > connections all appear as marked, I’m seeing lots of unmarked packets that otherwise should according to mangle conditions, i.e. that match HTTP_P, HTTP_PD, CORREO_P, etc but get logged with SINMARCA.
