sharpz44
Occasional Visitor
Can anyone help with this please
Hi I am new, I have a 66u and recently update latest firmware, my main use is for gaming,when I did a test on my ps3 it says the router in use may not support ip fragments, it was fine before, I have no internet problems but this does not help in online games,please see the report below and thanks in advance
The ICSI Netalyzr
Start » Analysis » Results
Result Summary + – (help)
adsl-2-solo-175-93.claranet.co.uk / 80.168.175.**
Recorded at 17:57 EDT (21:57 UTC), Aug 03 2012. Permalink. Referrer. Client/server transcript.
Summary of Noteworthy Events + –
Minor Aberrations –
Certain TCP protocols are blocked in outbound traffic
Fragmented UDP traffic is blocked
The network path does not reply when it needs to fragment traffic
The measured packet loss was somewhat high
Network packet buffering may be excessive
The network blocks some or all EDNS replies
Not all DNS types were correctly processed
Address-based Tests + –
NAT detection (?): NAT Detected +
Local Network Interfaces (?): OK +
DNS-based host information (?): OK +
NAT support for Universal Plug and Play (UPnP) (?): Yes +
Reachability Tests + –
TCP connectivity (?): Note –
Direct TCP access to remote FTP servers (port 21) is allowed.
Direct TCP access to remote SSH servers (port 22) is allowed.
Direct TCP access to remote SMTP servers (port 25) is allowed.
Direct TCP access to remote DNS servers (port 53) is allowed.
Direct TCP access to remote HTTP servers (port 80) is allowed.
Direct TCP access to remote POP3 servers (port 110) is allowed.
Direct TCP access to remote RPC servers (port 135) is allowed.
Direct TCP access to remote NetBIOS servers (port 139) is allowed.
Direct TCP access to remote IMAP servers (port 143) is allowed.
Direct TCP access to remote SNMP servers (port 161) is allowed.
Direct TCP access to remote HTTPS servers (port 443) is allowed.
Direct TCP access to remote SMB servers (port 445) is allowed.
Direct TCP access to remote SMTP/SSL servers (port 465) is allowed.
Direct TCP access to remote secure IMAP servers (port 585) is allowed.
Direct TCP connections to remote authenticated SMTP servers (port 587) succeed, but do not receive the expected content.
The applet received the following reply instead of our expected header:
"421 Cannot establish SSL with SMTP server 67.202.32.138:465, SSL_connect error 336031996 "
Direct TCP access to remote IMAP/SSL servers (port 993) is allowed.
Direct TCP access to remote POP/SSL servers (port 995) is allowed.
Direct TCP access to remote OpenVPN servers (port 1194) is allowed.
Direct TCP access to remote PPTP Control servers (port 1723) is allowed.
Direct TCP access to remote SIP servers (port 5060) is allowed.
Direct TCP access to remote BitTorrent servers (port 6881) is allowed.
Direct TCP access to remote TOR servers (port 9001) is allowed.
UDP connectivity (?): Note –
Basic UDP access is available.
The applet was able to send fragmented UDP traffic.
The applet was unable to receive fragmented UDP traffic. The most likely cause is an error in your network's firewall configuration or NAT.
The maximum packet successfully received was 1464 bytes of payload.
Direct UDP access to remote DNS servers (port 53) is allowed.
Direct UDP access to remote NTP servers (port 123) is allowed.
Direct UDP access to remote NetBIOS NS servers (port 137) is allowed.
Direct UDP access to remote NetBIOS DGM servers (port 138) is allowed.
Direct UDP access to remote IKE key exchange servers (port 500) is allowed.
Direct UDP access to remote OpenVPN servers (port 1194) is allowed.
Direct UDP access to remote Slammer servers (port 1434) is allowed.
Direct UDP access to remote L2 tunneling servers (port 1701) is allowed.
Direct UDP access to remote IPSec NAT servers (port 4500) is allowed.
Direct UDP access to remote RTP servers (port 5004) is allowed.
Direct UDP access to remote RTCP servers (port 5005) is allowed.
Direct UDP access to remote SIP servers (port 5060) is allowed.
Direct UDP access to remote VoIP servers (port 7078) is allowed.
Direct UDP access to remote VoIP servers (port 7082) is allowed.
Direct UDP access to remote SCTP servers (port 9899) is allowed.
Direct UDP access to remote Steam gaming servers (port 27005) is allowed.
Direct UDP access to remote Steam gaming servers (port 27015) is allowed.
Traceroute (?): OK +
Path MTU (?): Warning –
The path between your network and our system supports an MTU of at least 1500 bytes, and the path between our system and your network has an MTU of 1492 bytes. The path MTU bottleneck that fails to properly report the ICMP "too big" is between 195.157.0.6 and 80.168.175.93. The path between our system and your network does not appear to report properly when the sender needs to fragment traffic.
Network Access Link Properties + –
Network latency measurements (?): Latency: 96ms Loss: 2.5% –
The round-trip time (RTT) between your computer and our server is 96 msec, which is good.
We recorded a packet loss of 2.5%. This loss rate can result in noticeable performance problems. It could be due either to significant load on our servers due to a large number of visitors, or problems with your network. Of the packet loss, at least 2.5% of the packets appear to have been lost on the path from your computer to our servers.
TCP connection setup latency (?): 80ms +
Network background health measurement (?): no transient outages +
Network bandwidth (?): Upload 1.1 Mbit/sec, Download 10 Mbit/sec +
Network buffer measurements (?): Uplink 490 ms, Downlink is good –
We estimate your uplink as having 490 msec of buffering. This level can in some situations prove somewhat high, and you may experience degraded performance when performing interactive tasks such as web-surfing while simultaneously conducting large uploads. Real-time applications, such as games or audio chat, may also work poorly when conducting large uploads at the same time.
We were not able to produce enough traffic to load the downlink buffer, or the downlink buffer is particularly small. You probably have excellent behavior when downloading files and attempting to do other tasks.
HTTP Tests + –
Address-based HTTP proxy detection (?): OK +
Content-based HTTP proxy detection (?): OK +
HTTP proxy detection via malformed requests (?): OK +
Filetype-based filtering (?): OK +
HTTP caching behavior (?): OK +
JavaScript-based tests (?): OK +
DNS Tests + –
Restricted domain DNS lookup (?): OK +
Unrestricted domain DNS lookup (?): OK +
Direct DNS support (?): OK +
Direct EDNS support (?): Note –
EDNS-enabled requests for small responses are answered successfully.
EDNS-enabled requests for medium-sized responses are answered successfully.
EDNS-enabled requests for large responses remain unanswered. This suggests that a proxy or firewall is unable to handle large extended DNS requests or fragmented UDP traffic.
DNS resolver address (?): OK +
DNS resolver properties (?): Lookup latency 170ms +
Direct probing of DNS resolvers (?) –
Your system is configured to use 1 DNS resolver(s).
The resolver at 192.168.1.1 (resolver03) could not process the following tested types:
Large (~3000B) TXT records fetched with EDNS0
It does not validate DNSSEC. It does not wildcard NXDOMAIN errors. The resolver reports a number of additional properties. Show them.
DNS glue policy (?): OK +
DNS resolver port randomization (?): OK +
DNS lookups of popular domains (?): OK +
DNS external proxy (?): OK +
DNS results wildcarding (?): OK +
DNS-level redirection of specific sites (?): OK +
Direct probing of DNS roots (?): +
IPv6 Tests + –
DNS support for IPv6 (?): OK +
IPv4, IPv6, and your web browser (?): No IPv6 support +
IPv6 connectivity (?): No IPv6 support +
Host Properties + –
System clock accuracy (?): OK +
Browser properties (?): OK +
Uploaded data (?): OK +
Feedback + –
User-provided feedback +
ID 43ca208a-19000-71618e96-1967-44d5-beae
Hi I am new, I have a 66u and recently update latest firmware, my main use is for gaming,when I did a test on my ps3 it says the router in use may not support ip fragments, it was fine before, I have no internet problems but this does not help in online games,please see the report below and thanks in advance
The ICSI Netalyzr
Start » Analysis » Results
Result Summary + – (help)
adsl-2-solo-175-93.claranet.co.uk / 80.168.175.**
Recorded at 17:57 EDT (21:57 UTC), Aug 03 2012. Permalink. Referrer. Client/server transcript.
Summary of Noteworthy Events + –
Minor Aberrations –
Certain TCP protocols are blocked in outbound traffic
Fragmented UDP traffic is blocked
The network path does not reply when it needs to fragment traffic
The measured packet loss was somewhat high
Network packet buffering may be excessive
The network blocks some or all EDNS replies
Not all DNS types were correctly processed
Address-based Tests + –
NAT detection (?): NAT Detected +
Local Network Interfaces (?): OK +
DNS-based host information (?): OK +
NAT support for Universal Plug and Play (UPnP) (?): Yes +
Reachability Tests + –
TCP connectivity (?): Note –
Direct TCP access to remote FTP servers (port 21) is allowed.
Direct TCP access to remote SSH servers (port 22) is allowed.
Direct TCP access to remote SMTP servers (port 25) is allowed.
Direct TCP access to remote DNS servers (port 53) is allowed.
Direct TCP access to remote HTTP servers (port 80) is allowed.
Direct TCP access to remote POP3 servers (port 110) is allowed.
Direct TCP access to remote RPC servers (port 135) is allowed.
Direct TCP access to remote NetBIOS servers (port 139) is allowed.
Direct TCP access to remote IMAP servers (port 143) is allowed.
Direct TCP access to remote SNMP servers (port 161) is allowed.
Direct TCP access to remote HTTPS servers (port 443) is allowed.
Direct TCP access to remote SMB servers (port 445) is allowed.
Direct TCP access to remote SMTP/SSL servers (port 465) is allowed.
Direct TCP access to remote secure IMAP servers (port 585) is allowed.
Direct TCP connections to remote authenticated SMTP servers (port 587) succeed, but do not receive the expected content.
The applet received the following reply instead of our expected header:
"421 Cannot establish SSL with SMTP server 67.202.32.138:465, SSL_connect error 336031996 "
Direct TCP access to remote IMAP/SSL servers (port 993) is allowed.
Direct TCP access to remote POP/SSL servers (port 995) is allowed.
Direct TCP access to remote OpenVPN servers (port 1194) is allowed.
Direct TCP access to remote PPTP Control servers (port 1723) is allowed.
Direct TCP access to remote SIP servers (port 5060) is allowed.
Direct TCP access to remote BitTorrent servers (port 6881) is allowed.
Direct TCP access to remote TOR servers (port 9001) is allowed.
UDP connectivity (?): Note –
Basic UDP access is available.
The applet was able to send fragmented UDP traffic.
The applet was unable to receive fragmented UDP traffic. The most likely cause is an error in your network's firewall configuration or NAT.
The maximum packet successfully received was 1464 bytes of payload.
Direct UDP access to remote DNS servers (port 53) is allowed.
Direct UDP access to remote NTP servers (port 123) is allowed.
Direct UDP access to remote NetBIOS NS servers (port 137) is allowed.
Direct UDP access to remote NetBIOS DGM servers (port 138) is allowed.
Direct UDP access to remote IKE key exchange servers (port 500) is allowed.
Direct UDP access to remote OpenVPN servers (port 1194) is allowed.
Direct UDP access to remote Slammer servers (port 1434) is allowed.
Direct UDP access to remote L2 tunneling servers (port 1701) is allowed.
Direct UDP access to remote IPSec NAT servers (port 4500) is allowed.
Direct UDP access to remote RTP servers (port 5004) is allowed.
Direct UDP access to remote RTCP servers (port 5005) is allowed.
Direct UDP access to remote SIP servers (port 5060) is allowed.
Direct UDP access to remote VoIP servers (port 7078) is allowed.
Direct UDP access to remote VoIP servers (port 7082) is allowed.
Direct UDP access to remote SCTP servers (port 9899) is allowed.
Direct UDP access to remote Steam gaming servers (port 27005) is allowed.
Direct UDP access to remote Steam gaming servers (port 27015) is allowed.
Traceroute (?): OK +
Path MTU (?): Warning –
The path between your network and our system supports an MTU of at least 1500 bytes, and the path between our system and your network has an MTU of 1492 bytes. The path MTU bottleneck that fails to properly report the ICMP "too big" is between 195.157.0.6 and 80.168.175.93. The path between our system and your network does not appear to report properly when the sender needs to fragment traffic.
Network Access Link Properties + –
Network latency measurements (?): Latency: 96ms Loss: 2.5% –
The round-trip time (RTT) between your computer and our server is 96 msec, which is good.
We recorded a packet loss of 2.5%. This loss rate can result in noticeable performance problems. It could be due either to significant load on our servers due to a large number of visitors, or problems with your network. Of the packet loss, at least 2.5% of the packets appear to have been lost on the path from your computer to our servers.
TCP connection setup latency (?): 80ms +
Network background health measurement (?): no transient outages +
Network bandwidth (?): Upload 1.1 Mbit/sec, Download 10 Mbit/sec +
Network buffer measurements (?): Uplink 490 ms, Downlink is good –
We estimate your uplink as having 490 msec of buffering. This level can in some situations prove somewhat high, and you may experience degraded performance when performing interactive tasks such as web-surfing while simultaneously conducting large uploads. Real-time applications, such as games or audio chat, may also work poorly when conducting large uploads at the same time.
We were not able to produce enough traffic to load the downlink buffer, or the downlink buffer is particularly small. You probably have excellent behavior when downloading files and attempting to do other tasks.
HTTP Tests + –
Address-based HTTP proxy detection (?): OK +
Content-based HTTP proxy detection (?): OK +
HTTP proxy detection via malformed requests (?): OK +
Filetype-based filtering (?): OK +
HTTP caching behavior (?): OK +
JavaScript-based tests (?): OK +
DNS Tests + –
Restricted domain DNS lookup (?): OK +
Unrestricted domain DNS lookup (?): OK +
Direct DNS support (?): OK +
Direct EDNS support (?): Note –
EDNS-enabled requests for small responses are answered successfully.
EDNS-enabled requests for medium-sized responses are answered successfully.
EDNS-enabled requests for large responses remain unanswered. This suggests that a proxy or firewall is unable to handle large extended DNS requests or fragmented UDP traffic.
DNS resolver address (?): OK +
DNS resolver properties (?): Lookup latency 170ms +
Direct probing of DNS resolvers (?) –
Your system is configured to use 1 DNS resolver(s).
The resolver at 192.168.1.1 (resolver03) could not process the following tested types:
Large (~3000B) TXT records fetched with EDNS0
It does not validate DNSSEC. It does not wildcard NXDOMAIN errors. The resolver reports a number of additional properties. Show them.
DNS glue policy (?): OK +
DNS resolver port randomization (?): OK +
DNS lookups of popular domains (?): OK +
DNS external proxy (?): OK +
DNS results wildcarding (?): OK +
DNS-level redirection of specific sites (?): OK +
Direct probing of DNS roots (?): +
IPv6 Tests + –
DNS support for IPv6 (?): OK +
IPv4, IPv6, and your web browser (?): No IPv6 support +
IPv6 connectivity (?): No IPv6 support +
Host Properties + –
System clock accuracy (?): OK +
Browser properties (?): OK +
Uploaded data (?): OK +
Feedback + –
User-provided feedback +
ID 43ca208a-19000-71618e96-1967-44d5-beae
Last edited: