There is
*NO* way to limit or classify Encrypted P2P traffic at this point.
Useing a firewall rule like this
add chain=forward p2p=all-p2p action=drop
Will drop Unencrypted and encrypted traffic.
Use mangle with p2p=all-p2p will not mark encrypted p2p traffic.
This is straight from MT:
Hello,
when p2p connection is beeing established some first pacets go unencrypted, so
if you manage to drop them you block it that way.
Regards,
Janis
Beccara <Beccara@> wrote:
> > Ok i will try this,
> >
> > But i dont understand how you can "drop" encrypted p2p traffic but cant
> > identify it for mangle.
> >
> > MikroTik Support [Janis] wrote:
>> > > Hello,
>> > > if you are facing encrypted p2p traffic only way to prioritise is to make
>> > > rules that set higher priority for all other traffic and that whats left set
>> > > low priority, it is like setting http then ftp, e-mail etc becose you cannot
>> > > identify encrypted p2p trafic.
>> > >
>> > > Regards,
>> > > Janis
>> > >
>> > > Beccara <beccara@> wrote:
>> > >
>> > >
>>> > >> I dont want to drop P2P traffic i want to alter its priority
>>> > >>
>>> > >> MikroTik Support [Janis] wrote:
>>> > >>
>>>> > >>> Hello,
>>>> > >>> pleace alter your configuration:
>>>> > >>>
>>>> > >>> 1)reamove all your p2p mangle rules
>>>> > >>> 2) add filter rule that detects whtere it is p2p packet and if it is then drop
>>>> > >>> it
>>>> > >>>
>>>> > >>> that way you should achieve 100% p2p drafic drop
>>>> > >>> and p2p is packet type not connection type
>>>> > >>>
>>>> > >>> Regards,
>>>> > >>> Janis
[/quote]