Hi Dave, it did happen again even though I didn't make any QoS related changes.The only thing that changed in the hotfix is the ability to enable/disable the flushing. You also need to restart qos for the flushing setting to take effect on existing connections. Check if your iptables rules for Others traffic is being hit.
Code:iptables -t mangle -nvL POSTROUTING
The first example below is when there is no traffic shown under Other Class ( I might have missed part of the last line due to copy/paste)
Chain POSTROUTING (policy ACCEPT 13370 packets, 9601K bytes)
pkts bytes target prot opt in out source destination
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 500,4500 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 500,4500 MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp dpts:16384:16415 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp spts:16384:16415 MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 119,563 MARK xset 0x8003ffff/0x803fffff
0 0 MARK tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 119,563 MARK xset 0x4003ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80030005/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40030005/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:3478:3481 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:3478:3481 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:8801:8810 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:8801:8810 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80040050/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40040050/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x801400c2/0xc03fffff MARK xset 0x800affff/0x803fffff
pkts bytes target prot opt in out source destination
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 500,4500 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 500,4500 MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp dpts:16384:16415 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp spts:16384:16415 MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 119,563 MARK xset 0x8003ffff/0x803fffff
0 0 MARK tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 119,563 MARK xset 0x4003ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80030005/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40030005/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:3478:3481 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:3478:3481 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:8801:8810 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:8801:8810 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80040050/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40040050/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x801400c2/0xc03fffff MARK xset 0x800affff/0x803fffff
- 0 MA
and the second is with traffic shown normally
pkts bytes target prot opt in out source destination
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 500,4500 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 500,4500 MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp dpts:16384:16415 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp spts:16384:16415 MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 119,563 MARK xset 0x8003ffff/0x803fffff
0 0 MARK tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 119,563 MARK xset 0x4003ffff/0x403fffff
5344 7816K MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80030005/0xc03fffff MARK xset 0x800affff/0x803fffff
2978 154K MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40030005/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:3478:3481 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:3478:3481 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:8801:8810 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:8801:8810 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80040050/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40040050/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x801400c2/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x401400c2/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 500,4500 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 500,4500 MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp dpts:16384:16415 MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp spts:16384:16415 MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 0.0.0.0/0 multiport sports 119,563 MARK xset 0x8003ffff/0x803fffff
0 0 MARK tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 multiport dports 119,563 MARK xset 0x4003ffff/0x403fffff
5344 7816K MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80030005/0xc03fffff MARK xset 0x800affff/0x803fffff
2978 154K MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40030005/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:3478:3481 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:3478:3481 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK udp -- * br0 0.0.0.0/0 0.0.0.0/0 udp spts:8801:8810 mark match 0x80000000/0xc03fffff MARK xset 0x8006ffff/0x803fffff
0 0 MARK udp -- * ppp0 0.0.0.0/0 0.0.0.0/0 udp dpts:8801:8810 mark match 0x40000000/0xc03fffff MARK xset 0x4006ffff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x80040050/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x40040050/0xc03fffff MARK xset 0x400affff/0x403fffff
0 0 MARK tcp -- * br0 0.0.0.0/0 192.168.1.66 mark match 0x801400c2/0xc03fffff MARK xset 0x800affff/0x803fffff
0 0 MARK tcp -- * ppp0 192.168.1.66 0.0.0.0/0 mark match 0x401400c2/0xc03fffff MARK xset 0x400affff/0x403fffff
Can you see anything unusual?
EDIT: The only thing I did was to block and subsequently unblock one of my children devices from the Mobile App/Family section which make some changes to the permissions in the AiProtection which might have trigger it?
Last edited: