Community discussions

 
alfred998
just joined
Topic Author
Posts: 24
Joined: Fri Apr 27, 2018 4:58 pm

Simple Queue

Thu Aug 01, 2019 2:23 pm

I am trying to configure bandwidth limits, but smth isn't working
[admin@Mikrotik] > queue simple print
Flags: X - disabled, I - invalid, D - dynamic 
 0    ;;; Test
      name="T-test" target=192.168.1.36/32 parent=none packet-marks="" priority=8/8 
      queue=default-small/default-small limit-at=0/0 max-limit=2M/512k burst-limit=0/0 burst-threshold=0/0 
      burst-time=0s/0s bucket-size=0.1/0.1 
 1    ;;; Test
      name="A-test" target=192.168.1.10/32 parent=none packet-marks="" priority=8/8 
      queue=default-small/default-small limit-at=0/0 max-limit=512k/512k burst-limit=0/0 
      burst-threshold=0/0 burst-time=0s/0s bucket-size=0.1/0.1 
Then speedtest results still show the available maximum of 20/20M.

This are my firewall rules
[admin@Mikrotik] > ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic 
 0  D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough 
 1    ;;; defconf: accept established,related,untracked
      chain=input action=accept connection-state=established,related,untracked log=no log-prefix="" 
 2    ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid log=no log-prefix="" 
 3    ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp log=no log-prefix="" 
 4    ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN log=no log-prefix="" 
 5    ;;; defconf: accept in ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec 
 6    ;;; defconf: accept out ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=out,ipsec 
 7    ;;; defconf: fasttrack
      chain=forward action=fasttrack-connection connection-state=established,related log=no log-prefix="" 
 8    ;;; defconf: accept established,related, untracked
      chain=forward action=accept connection-state=established,related,untracked log=no log-prefix="" 
 9    ;;; defconf: drop invalid
      chain=forward action=drop connection-state=invalid log=no log-prefix="" 
10    ;;; defconf:  drop all from WAN not DSTNATed
      chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN log=no log-prefix="" 
Am I missing smth ?
 
alfred998
just joined
Topic Author
Posts: 24
Joined: Fri Apr 27, 2018 4:58 pm

Re: Simple Queue

Thu Aug 01, 2019 5:29 pm

Disabling fasttrack enabled made the queues effective:
7 X  ;;; defconf: fasttrack
      chain=forward action=fasttrack-connection connection-state=established,related log=no log-prefix=""
I also should have mentioned that while doing speed tests at 20/20M, the bandwidth reported at queue for that specific IP was well below that. It seems this firewall rule somehow hided the real bandwidth on the IP.

Can anyone suggest a way to modify it instead of disabling ?
Last edited by alfred998 on Fri Aug 02, 2019 4:47 pm, edited 1 time in total.
 
User avatar
sebastia
Forum Guru
Forum Guru
Posts: 1700
Joined: Tue Oct 12, 2010 3:23 am
Location: Antwerp, BE

Re: Simple Queue

Thu Aug 01, 2019 11:24 pm

See https://wiki.mikrotik.com/wiki/Manual:IP/Fasttrack

Fasttrack bypasses among other things, simple queues. But you could enable (=> flag) connections for fasttrack selectively. These will then bypass mangling as well. Total output can then be controlled by Queue Tree attached to outgoing interface. On that tree all fast-track-ed traffic will be "no-mark"-ed.

Who is online

Users browsing this forum: No registered users and 25 guests