Forums

Mansoor
Mansoor
Offline
Resolved
0 votes
Since I installed the clearOS as my network's gateway, my son has been complaining about longer ping time he gets on his playstation console, which badly affects online games performance. I don't want his connection to bypass the clearOS server completely because I'm planning to control his access times to the Internet as being discussed here: https://www.clearos.com/clearfoundation/social/community/matching-time-in-iptables-and-clearos-7-3

I'm wondering if there is a way to let the playstation's traffic to bypass all gateway checking, such as filtering, antimalware and intrusion detection. Maybe some iptables rule(s) can be set to make a shortcut for the console's ip to let its packets to pass directly from internal to external cards and vice versa. Any thoughts or ideas?

Thank you.
Saturday, September 23 2017, 02:04 PM
Share this post:
Responses (5)
  • Accepted Answer

    Saturday, September 23 2017, 08:19 PM - #Permalink
    Resolved
    0 votes
    Does the modem have a bridge mode. My VirginMedia cable modem/router does and connects by pure Ethernet. In the UK, BT cable uses VDSL. If you put this into bridge mode you have to then switch your ClearOS WAN to PPPoE.
    The reply is currently minimized Show
  • Accepted Answer

    Mansoor
    Mansoor
    Offline
    Saturday, September 23 2017, 08:10 PM - #Permalink
    Resolved
    0 votes
    The WAN is NAT'd through the fiber optic modem. It is setup as a DMZ server in modem.
    The reply is currently minimized Show
  • Accepted Answer

    Saturday, September 23 2017, 08:02 PM - #Permalink
    Resolved
    0 votes
    Unfortunately those drivers are the optimum. The problem NIC is the RTL8111/8168 but you don't have that.

    I don't know if you can bypass any internal processing of ClearOS except the proxy/content filter.

    In your set up does your WAN get a public IP or is it NAT'd through another modem or router? I can't remember the details of your other posts.
    The reply is currently minimized Show
  • Accepted Answer

    Mansoor
    Mansoor
    Offline
    Saturday, September 23 2017, 07:50 PM - #Permalink
    Resolved
    0 votes
    Here is the output (some old stuff here :) ) :
    02:00.0 Ethernet controller [0200]: Broadcom Limited NetXtreme BCM5721 Gigabit Ethernet PCI Express [14e4:1659] (rev 11)
    Subsystem: Hewlett-Packard Company Device [103c:3260]
    Kernel driver in use: tg3
    Kernel modules: tg3
    03:02.0 Ethernet controller [0200]: Broadcom Limited NetXtreme BCM5703 Gigabit Ethernet [14e4:16c7] (rev 10)
    Subsystem: Compaq Computer Corporation NC7771 Gigabit Server Adapter (PCI-X, 10,100,1000-T) [0e11:00ca]
    Kernel driver in use: tg3
    Kernel modules: tg3

    I'll apply the iptables rules you suggested for both source and destination and report back with the result.
    The reply is currently minimized Show
  • Accepted Answer

    Saturday, September 23 2017, 05:09 PM - #Permalink
    Resolved
    0 votes
    Before you go down that rout, can you just check your NIC drivers. There is one in particular we can do something about. What is the output of:
    lspci -knn | grep Eth -A 3


    For an iptables rule, try something like:
    iptables -I FORWARD -s your_son's_IP_address -j ACCEPT
    and perhaps the same with a "-d" instead of "-s". This may mess with any time rules you create as normally the first rule matched stops all further rule processing. You'd want to see the time blocks above this rule when you do an "iptables -nvL FORWARD"

    Also, with the above rule, if it works at the command line, change "iptables" to "$IPTABLES" for the custom firewall module.

    I am not sure this rule will help too much, though.
    The reply is currently minimized Show
Your Reply