@neil1 I would recommend trying with a simpler config.
The config you are using sets the default class for traffic to CS 1 (BULK / deprioritized) and then uses automated rules based on packet size to prioritize things again.
This is great when it manages to prioritize the right packets, but it can fail really badly if something is not prioritized, because those packets end up being in the lowest priority class.
And that could be the problem you are facing now too.
Additionally, most of these rules seem to be based on ideas for routers that had very basic QoS features and didn't support fq_codel or cake SQM.
But imho that's not necessary with cake. In most cases and for most users, once you configure cake correctly, it just works in most situations.
That's because both cake and fq_codel already implement many similar tweaks and their implementations are likely infinitely better than whatever rules someone can add to QoSify.
So there isn't really any further need for tweaking necessary on that level.
But if you do want to prioritize or deprioritize certain traffic (such as video conferencing or gaming), then this package is an excellent choice.
But imho it's best to keep it as close as possible to "vanilla cake".
With that out of the way, here is my config that has been working very well for me so far. It shouldn't have any unexpected side-effects.
/etc/config/qosify
config defaults
list defaults /etc/qosify/*.conf
# Don't override DSCP classes
# If none of the rules in `/etc/qosify/*.conf` apply,
# keep the DSCP class the application (egress) or ISP (ingress) set.
# option dscp_icmp besteffort
# option dscp_default_tcp besteffort
# option dscp_default_udp besteffort
config class bulk
# Traffic that you want to be deprioritized, such as torrents
# or large downloads.
option ingress CS1
option egress CS1
config class bulk_upload_only
# Traffic where you only want to deprioritize uploads, such as
# backup software or photo cloud syncing.
option ingress CS0
option egress CS1
config class besteffort
# The default class for traffic that is neither prioritized
# nor deprioritized.
#
# Most traffic should go in here.
option ingress CS0
option egress CS0
config class video_broadcast
# Used for priority uploads like live streams, such as YT live
# or twitch UPLOADS.
#
# Shouldn't be used for streaming sites like Netflix, because the video
# class is used for gaming too and the streaming sites would take away
# gaming bandwidth.
#
# Therefore streaming sites should stay in besteffort.
option ingress CS3
option egress CS3
config class video_network_sparse
# Used for services that should be prioritized while they are
# transmitting a small amount of data, but deprioritized as
# soon as they transmit a lot of data.
#
# Example:
# - SSH shell prioritized
# - SFTP transfer deprioritized
#
# Currently not working properly due to `bulk_trigger_timeout` issue.
option ingress CS3
option egress CS3
# If many packets come in quick succession,
# put the traffic back into best effort.
option bulk_trigger_pps 100
option bulk_trigger_timeout 5
option dscp_bulk CS0
config class video_network
# Used for low latency network services like Remote Desktop (RDP)
option ingress CS3
option egress CS3
config class video_gaming
# Should be used for online games and
# game streaming services like GeForce Now.
option ingress CS4
option egress CS4
config class video_conferencing
# Can be used for VIDEO conferencing, such as
# Zoom Video.
#
# But practically, I would put all
# video/audio calls into voice_telephony to give
# them a higher priority than gaming.
option ingress AF42
option egress AF42
config class voice_telephony
# Theoretically, this should be used for audio calls only.
# But practically you can't distinguish between audio and
# video streams for most conferencing apps.
#
# Therefore, to prioritize conferencing above games,
# this class should be used for all audio/video
# conferencing.
option ingress EF
option egress EF
config class voice_network
# Can be used for low bandwidth, high priority network services
# like DNS.
option ingress CS6
option egress CS6
# If many packets come in quick succession,
# put the traffic back into best effort
option bulk_trigger_pps 100
option bulk_trigger_timeout 5
option dscp_bulk CS0
config interface wan
option name wan
option disabled 0
option bandwidth_up 20mbit
option bandwidth_down 110mbit
option overhead_type "ethernet"
# defaults:
option ingress 1
option egress 1
option mode diffserv4
option nat 1
option host_isolate 1
option autorate_ingress 0
# Make sure to no add wash to these options
# if you want to be able to verify DSCP maks
# when sniffing the traffic.
option ingress_options ""
option egress_options ""
option options "ether-vlan"
/etc/qosify/00-defaults.conf
#
# Bulk Tin
#
# Apple iCloud
# iCloud Photos and Backup
# Status: Partially working
# Sometimes Apple is using non-Apple cloud storage services, such as
# Google Cloud (GCS) and Amazon Cloud (AWS).
#
# For GCS the hosts seem to be unique to Apple, but the AWS hosts are
# not. Therefore not all uploads are properly marked.
dns:*.icloud-content.com bulk_upload_only
dns_c:*.icloud-content.com bulk_upload_only
dns:gcs-*.content-storage-upload.googleapis.com bulk_upload_only
dns:gcs-*.content-storage-download.googleapis.com bulk_upload_only
# Apple App Store
# Status: Tested
dns:osxapps.itunes.apple.com bulk
dns:iosapps.itunes.apple.com bulk
# Apple Software Updated
# Status: Tested on macOS, but not on iOS
dns:swcdn.apple.com bulk
dns:updates.cdn-apple.com bulk
dns:*.swcdn.apple.com bulk
dns:*.aaplimg.com bulk
dns:*.apple.com.akadns.net bulk
# Microsoft Onedrive
# Status: Tested
# - Also works for ArqBackup uploads to Onedrive
dns:*1drv* bulk_upload_only
dns:*onedrive* bulk_upload_only
dns:*.storage.live.com bulk_upload_only
# Microsoft (Download)
# Status: Not Tested
dns:*backblaze* bulk_upload_only
dns:*backblazeb2* bulk_upload_only
dns:*ms-acdc.office* bulk_upload_only
dns:*sharepoint* bulk_upload_only
dns:*update.microsoft* bulk
dns:*windowsupdate* bulk
# MEGA (Download)
# Status: Tested
dns:*mega* bulk
# Dropbox
# Status: Not Tested
dns:*dropboxusercontent* bulk
# Google
# Status: Not Tested
dns:*drive.google* bulk
dns:*googleusercontent* bulk
# Steam (Download)
# Status: Tested
dns:*steamcontent* bulk
# Epic Games (Download)
# Status: Not Tested
dns:*download.epicgames* bulk
dns:*download2.epicgames* bulk
dns:*download3.epicgames* bulk
dns:*download4.epicgames* bulk
dns:*epicgames-download1* bulk
# BitTorrent
# Status: Not Tested
tcp:6881-7000 bulk
tcp:51413 bulk
udp:6771 bulk
udp:6881-7000 bulk
udp:51413 bulk
# Usenet
# Status: Not Tested
tcp:119 bulk
tcp:563 bulk
#
# Best Effort Tin
#
# Nothing here, because traffic is put here by default
#
# Video Tin
#
# SSH
# - Prioritize shell traffic
# - But keep SFTP traffic in best effort
#
# Status: Tested, but not working properly properly due to
# `bulk_trigger_timeout` issue.
tcp:22 video_network_sparse
# Microsoft Remote Desktop (RDP)
# Status: Tested
tcp:3389 video_network
udp:3389 video_network
# Parsec - Remote Desktop
# Status: Not Tested
udp:8000-8010 video_network
udp:9000 video_network
# TeamViewer - Remote Desktop
# Status: Not Tested
tcp:5938 video_network
udp:5938 video_network
# Live Streaming to YouTube Live, Twitch, Vimeo and LinkedIn Live
# Status: Not Tested
tcp:1935-1936 video_broadcast
tcp:2396 video_broadcast
tcp:2935 video_broadcast
# GeForce Now
# Status: Tested
tcp:49006 video_gaming
udp:49003-49006 video_gaming
dns:cloudmatchbeta.nvidiagrid.net video_gaming
dns:*.cloudmatchbeta.nvidiagrid.net video_gaming
# Stadia
# Status: Not Tested
tcp:44700-44899 video_gaming
udp:44700-44899 video_gaming
# Boosteroid (Game streaming service like GeForce Now)
# Status: Tested
dns:cloud.boosteroid.com video_gaming
dns:*.cloud.boosteroid.com video_gaming
# Xbox
# Status: Not Tested
tcp:3074 video_gaming
udp:88 video_gaming
#udp:500 video_gaming # UDP port already used in "VoWiFi" rules
udp:3074 video_gaming
udp:3544 video_gaming
#udp:4500 video_gaming # UDP port already used in "VoWiFi" rules
# PlayStation
# Status: Not Tested
tcp:3478-3480 video_gaming
#udp:3478-3479 video_gaming # UDP ports already used in "Zoom" rules
# Call of Duty
# Status: Not Tested
#tcp:3074 video_gaming # TCP port already used in "Xbox" rules
tcp:3075-3076 video_gaming
#udp:3074 video_gaming # UDP port already used in "Xbox" rules
udp:3075-3079 video_gaming
udp:3658 video_gaming
# FIFA
# Status: Not Tested
tcp:3659 video_gaming
udp:3659 video_gaming
# Minecraft
# Status: Not Tested
tcp:25565 video_gaming
udp:19132-19133 video_gaming
udp:25565 video_gaming
# Supercell Games
# Status: Not Tested
tcp:9339 video_gaming
udp:9339 video_gaming
#
# Voice Tin
#
# Telephony
# Zoom, Microsoft Teams, Skype, FaceTime and WhatsApp Calls
# (they use these same ports).
# Status: Tested for
# - Whatsapp
# - FaceTime (With additional ports)
udp:3478-3497 +voice_telephony
# Zoom
# Status: Tested
dns:*.zoom.us +voice_telephony
tcp:8801-8802 +voice_telephony
udp:8801-8810 +voice_telephony
# Skype
# Status: Not Tested
dns:*skype* +voice_telephony
# FaceTime
# Status: Tested with macOS 12.6 to iOS 16 FT
# udp:3478-3497 voice_telephony # Ports already used in "Telephony" rules
udp:16384-16387 +voice_telephony
udp:16393-16402 +voice_telephony
# GoToMeeting
# Status: Not Tested
udp:1853 +voice_telephony
udp:8200 +voice_telephony
# Webex Meeting
# Status: Not Tested
tcp:5004 +voice_telephony
udp:9000 +voice_telephony
# Jitsi Meet
# Status: Not Tested
tcp:5349 +voice_telephony
udp:10000 +voice_telephony
# Google Meet
# Status: Tested
udp:19302-19309 +voice_telephony
# Voice over Internet Protocol (VoIP)
# Status: Not Tested
tcp:5060-5061 +voice_telephony
udp:5060-5061 +voice_telephony
# Voice over WiFi or WiFi Calling (VoWiFi)
# Status: Not Tested
udp:500 +voice_telephony
udp:4500 +voice_telephony
So, considering trying to take that config and remove all the rules that are not important on your network. Then add the ports for your games and then see how it goes.
Additionally, I would also recommend installing wireshark and then follow my instructions in my previous post on how to verify if the prioritization works by sniffing the traffic.