Solved

Masquearde and size of PC needed to run it

Posted on 1997-07-16
4
185 Views
Last Modified: 2010-03-17
I have set up a linux box only to perform ip masquerading for our private network to the internet.  The machine I have in place is doing a perfect job.  It is a pentium 166, 64 MB RAM, and has a 1.2 GB hard drive.  I need that horsepower somewhere else.  My question is what size of machine would be adequate enough to perform masquerading for 60 workstations?
0
Comment
Question by:scrutchfield
  • 2
  • 2
4 Comments
 

Author Comment

by:scrutchfield
ID: 1585577
Edited text of question
0
 
LVL 1

Accepted Solution

by:
mgrcnk earned 20 total points
ID: 1585578
I don't think that machine size will affect anything.  You will however have to worry about bandwidth.  We have a Sparc 1 doing firewall service for our university and it runs fine.  True, you will be transforming IP addresses, but it doesn't take much horsepower to do that.  Instead, look at what ethernet card you have.  60 machines all trying to use a single 10BaseT card would bottleneck rather quickly.  A 100BaseT or even FibreChannel network adaptor would work much better (depending on how much bandwidth you need and have past that machine).

In any case, processor speed won't make much of a difference (unless you're talking about a 10 MHz processor or something else ridiculously slow).

chris
0
 

Author Comment

by:scrutchfield
ID: 1585579
So then would something like a 486 DX2 66 with 16 MB RAM be sufficient?
0
 
LVL 1

Expert Comment

by:mgrcnk
ID: 1585580
Definitely.  A Sparc 1 (our firewall) can handle a class B network (we have thousands of computers).  Granted, it only logs packets and forwards them on, but masquerading doesn't do much more than that.  It just translates addresses.

If would only start getting shakey if you were using a 386, 4 MB RAM, and running X.

For dedicated processes like that (we have DHCP boosters here), we use 486/50's I believe.  All they do is take a DHCP request from a remote network and tunnel it through a cable modem.  Never had a problem with that, so I doubt you will either.

chris
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now