Jump to content

Jedi Academy turned 20 this year! We celebrated in a ton of different ways: mod contest, server event, podcast, etc. Thank you to all who have been a part of this game for the last two decades. Check out the anniversary content!

Read more

Welcome to JKHub

This community is dedicated to the games Star Wars: Jedi Outcast (2002) and Jedi Academy (2003). We host over 3,000 mods created by passionate fans around the world, and thousands of threads of people showcasing their works in progress and asking for assistance. From mods to art to troubleshooting help, we probably have it. If we don't, request or contribute!

Get started

This game turned 20 years old this year, and it is still one of the greatest Star Wars games of all time. If you're new or returning from a long hiatus, here are the basics of getting started with Star Wars Jedi Knight Jedi Academy in 2023.

Read more

Set maximum UDP PacketsPerSecond for GamePlay (eg. cvar unlocker or mem edit) [via FIREWALL (IPTABLES)] for LINUX


banhammer

The issue:
Video1 - w Netstatus
Video2 - w Lagometer

Not only memory editing but also cvar unlocked clients can have higher packet-settings than 100 - which equals cheating

 

Solving the problem:

Strictly limit the average rate of incoming UDP packets to 100 packets per second without allowing any burst beyond this rate, you can adjust the iptables rule accordingly. Here's how you can set it up:

 
sudo iptables -A INPUT -p udp --dport 12345 -m limit --limit 100/second -j ACCEPT

(Replace 12345 with your Server UDP Port)

Explanation:

  • -A INPUT: Appends a rule to the INPUT chain.
  • -p udp: Specifies that this rule applies to UDP packets.
  • --dport 12345: Filters packets based on destination port 12345.
  • -m limit: Uses the limit module to control the rate of incoming packets.
  • --limit 100/second: Sets the maximum average rate to 100 packets per second.
  • -j ACCEPT: Specifies that packets matching the criteria (port 12345, UDP, within rate limits) should be accepted.
  •  

How It Works:

This rule strictly limits the incoming UDP packets on port 12345 to an average rate of 100 packets per second. It does not allow any burst beyond this rate; hence, it ensures that the traffic conforms to a steady flow of up to 100 packets per second.

 

Additional Steps:

  1. View Current iptables Rules:

    To verify the current iptables rules, use:

     
    sudo iptables -L -v -n --line-numbers

     
  2. Save the iptables Rules:

    To ensure the rules persist after a reboot, save the rules:

    • Debian/Ubuntu:
       

      sudo netfilter-persistent save

       

    • Red Hat/CentOS:

       
      sudo service iptables save


       

This iptables rule effectively limits incoming UDP packets on port 12345 to a strict average rate of 100 packets per second, ensuring a controlled and consistent flow of network traffic without allowing any burst beyond this rate. Adjust the port number (--dport) and rate limits (--limit) as needed for your specific network requirements.

 


User Feedback

Recommended Comments

There are no comments to display.



Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...