Hi Michal, Thanks for your much needed suggestion. Actually i have a video Delivey server(suppose it supports 240 simultaneous calls). It takes request from various users for video delivery. Now suppose if i want that after load reaches to 200, i should only allow premium users.In order to identify, non- preimum user,i check their diffserv value and drop their packets.This helps me to achieve QOS. Problem is that i have read various tutorials of tc but i am yet not comfertable. Default settings on my machine is: - [root@scotch root]# ip link list 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: <BROADCAST,MULTICAST,PROMISC,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:02:b3:f1:89:0c brd ff:ff:ff:ff:ff:ff 3: eth1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000 link/ether 00:02:b3:f1:89:0d brd ff:ff:ff:ff:ff:ff 4: sit0: <NOARP> mtu 1480 qdisc noop link/sit 0.0.0.0 brd 0.0.0.0 Can i user filter on the default qdisc attached on the eth0.If then how? (although i read somewhere that there is very little customization that we can do the default qdisc)? If i used some classful qdisc than how would i restore my default setting? Do we have better way achieving the same? Can you suggest me some useful tutorials? Please do reply. Regards, Raghuvendra Kumar | BTSL 414 | Ext 011-41619770 | Desk +91-9818143739 | Mobile raghuvendra.kumar@xxxxxxxxxxxxxxxxxx | EMail -----Original Message----- From: Michal Soltys [mailto:nozo@xxxxxxxx] Sent: Monday, September 17, 2007 2:07 AM To: Raghuvendra Kumar Cc: 'lartc@xxxxxxxxxxxxxxx' Subject: Re: using tc to drop packets based on the diffserc or tos value Raghuvendra Kumar wrote: > Hi all, > > [...] > > [root@scotch src]#tc filter add dev eth0 protocol ip u32 match ip dsfield 8 police drop > > its showing error "Illegal "match". > > Can any one of you guide me , what is the correct way of doing it. > Its imporatnt, Please post reply ASAP. > For instance: tc qdisc add dev eth0 root handle 1: hfsc default 99 # (.. remaining classes / etc. ..) tc filter add dev eth0 parent 1:0 protocol ip prio 1 u32 \ match ip dsfield 0x08 0xff action drop Remember that mask is mandatory. Also check out doc/actions directory for info about extended actions in iproute tarball. Out of curiosity - why not just: iptables -A OUTPUT -o eth0 -p udp --sport 5060 -j DROP ... or with something like -j REJECT --reject-with icmp-port-unreachable, depending on your needs. Assuming it's not just for testing purposes, and you actually want to drop the traffic generated by your host from that particular port. _______________________________________________ LARTC mailing list LARTC@xxxxxxxxxxxxxxx http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc