1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Asus RT-N16 QoS does not work, please help!

Discussion in 'Tomato Firmware' started by HKPolice, Apr 24, 2010.

  1. HKPolice

    HKPolice LI Guru Member

    I've tried Beta 07 both STD and Extra versions, I've tried Beta 10 both STD and Extra versions, none of them had working QoS :(

    After setting up the rules, the router was able to classify connections properly. IE Low, Medium or High, but the Inbound and Outbound limits set for those classes has no effect, everything was downloading/upload @ maximum.

    I did an NVRAM thorough reset through the web GUI every time I changed firmwares. Is there a way to manually reset NVRAM? I know holding the reset button on this router will only activate firmware flash mode.

    Using PPPoE, since Teddy_Bear is using DHCP and is unable to test PPPoE, can anyone else please test this?

    Thanks in advance. I hope this gets solved soon. :(
     
  2. Porter

    Porter LI Guru Member

    Please post some screenshots of your config (QoS) and ask yourself if there is any other information for the people trying to help you that might be useful.
     
  3. mstombs

    mstombs Network Guru Member

    The output of

    Code:
    iptables -nvL -t filter
    iptables -nvL -t nat
    iptables -nvL -t mangle
    may help to identify what is going on - obscure any personal IP addresses with something that gives a clue as to what it is i.e. WANIP.
     
  4. HKPolice

    HKPolice LI Guru Member

    Teddy_bear confirmed that it's a bug in the main K26 thread. http://www.linksysinfo.org/forums/showpost.php?p=362633&postcount=1353

    I tried hooking up the router's wan port to my LAN (192.168.1.0) and enabled DHCP (double NATing) and inbound QoS still wasn't working. Here are the outputs (RT-N16's LAN IP is 192.168.2.1)

    Code:
    root@unknown:/tmp/home/root# iptables -nvL -t filter
    Chain INPUT (policy DROP 18 packets, 2402 bytes)
     pkts bytes target     prot opt in     out     source               destination
    
        0     0 DROP       all  --  br0    *       0.0.0.0/0            192.168.1.15
    
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
            state INVALID
     1523  295K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
            state RELATED,ESTABLISHED
      410 23000 ACCEPT     all  --  br0    *       0.0.0.0/0            0.0.0.0/0
    
        1    60 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
    
    
    Chain FORWARD (policy DROP 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination
    
        0     0 ACCEPT     all  --  br0    br0     0.0.0.0/0            0.0.0.0/0
    
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
            state INVALID
      964 46260 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            tcp flags:0x06/0x02 TCPMSS clamp to PMTU
    53548   45M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
            state RELATED,ESTABLISHED
        0     0 wanin      all  --  vlan2  *       0.0.0.0/0            0.0.0.0/0
    
      505 26061 wanout     all  --  *      vlan2   0.0.0.0/0            0.0.0.0/0
    
      505 26061 ACCEPT     all  --  br0    *       0.0.0.0/0            0.0.0.0/0
    
    
    Chain OUTPUT (policy ACCEPT 1636 packets, 1111K bytes)
     pkts bytes target     prot opt in     out     source               destination
    
    
    Chain wanin (1 references)
     pkts bytes target     prot opt in     out     source               destination
    
    
    Chain wanout (1 references)
     pkts bytes target     prot opt in     out     source               destination
    Code:
    root@unknown:/tmp/home/root# iptables -nvL -t nat
    Chain PREROUTING (policy ACCEPT 1390 packets, 161K bytes)
     pkts bytes target     prot opt in     out     source               destination
    
        0     0 DROP       all  --  vlan2  *       0.0.0.0/0            192.168.2.0/
    24
        0     0 DNAT       icmp --  *      *       0.0.0.0/0            192.168.1.15
            to:192.168.2.1
    
    Chain POSTROUTING (policy ACCEPT 2 packets, 388 bytes)
     pkts bytes target     prot opt in     out     source               destination
    
      691 35880 MASQUERADE  all  --  *      vlan2   0.0.0.0/0            0.0.0.0/0
    
    
    Chain OUTPUT (policy ACCEPT 71 packets, 4971 bytes)
     pkts bytes target     prot opt in     out     source               destination
    Code:
    root@unknown:/tmp/home/root# iptables -nvL -t mangle
    Chain PREROUTING (policy ACCEPT 59637 packets, 46M bytes)
     pkts bytes target     prot opt in     out     source               destination
    
    35941   44M CONNMARK   all  --  vlan2  *       0.0.0.0/0            0.0.0.0/0
            CONNMARK restore mask 0xff
    
    Chain INPUT (policy ACCEPT 2632 packets, 430K bytes)
     pkts bytes target     prot opt in     out     source               destination
    
    
    Chain FORWARD (policy ACCEPT 56673 packets, 46M bytes)
     pkts bytes target     prot opt in     out     source               destination
    
    21135 2285K QOSO       all  --  *      vlan2   0.0.0.0/0            0.0.0.0/0
    
    
    Chain OUTPUT (policy ACCEPT 2190 packets, 1485K bytes)
     pkts bytes target     prot opt in     out     source               destination
    
       71  4706 QOSO       all  --  *      vlan2   0.0.0.0/0            0.0.0.0/0
    
    
    Chain POSTROUTING (policy ACCEPT 58865 packets, 47M bytes)
     pkts bytes target     prot opt in     out     source               destination
    
    
    Chain QOSO (2 references)
     pkts bytes target     prot opt in     out     source               destination
    
    21206 2290K BCOUNT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    
    21206 2290K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0
            CONNMARK restore mask 0xff
        0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0
            CONNMARK match !0x0/0xff00
     5420 1582K CONNMARK   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            mport dports 80,443 bcount --range 0:524287 CONNMARK set-return 0x2/0xff
    
        0     0 CONNMARK   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            mport dports 80,443 bcount --range 524288+ CONNMARK set-return 0x4/0xff
       70  4630 CONNMARK   udp  --  *      *       0.0.0.0/0            0.0.0.0/0
            udp dpt:53 bcount --range 0:2047 CONNMARK set-return 0x1/0xff
        0     0 CONNMARK   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            tcp dpt:53 bcount --range 0:2047 CONNMARK set-return 0x1/0xff
        0     0 CONNMARK   udp  --  *      *       0.0.0.0/0            0.0.0.0/0
            udp dpt:53 bcount --range 2048+ CONNMARK set-return 0x5/0xff
        0     0 CONNMARK   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            tcp dpt:53 bcount --range 2048+ CONNMARK set-return 0x5/0xff
       67  4964 CONNMARK   udp  --  *      *       0.0.0.0/0            0.0.0.0/0
            udp dpts:1024:65535 CONNMARK set-return 0x5/0xff
      408 51281 CONNMARK   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
            tcp dpts:1024:65535 CONNMARK set-return 0x5/0xff
    15241  648K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0
            CONNMARK set-return 0x4
     

Share This Page