Solved

Masquearde and size of PC needed to run it

Posted on 1997-07-16
4
225 Views
Last Modified: 2010-03-17
I have set up a linux box only to perform ip masquerading for our private network to the internet.  The machine I have in place is doing a perfect job.  It is a pentium 166, 64 MB RAM, and has a 1.2 GB hard drive.  I need that horsepower somewhere else.  My question is what size of machine would be adequate enough to perform masquerading for 60 workstations?
0
Comment
Question by:scrutchfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 

Author Comment

by:scrutchfield
ID: 1585577
Edited text of question
0
 
LVL 1

Accepted Solution

by:
mgrcnk earned 20 total points
ID: 1585578
I don't think that machine size will affect anything.  You will however have to worry about bandwidth.  We have a Sparc 1 doing firewall service for our university and it runs fine.  True, you will be transforming IP addresses, but it doesn't take much horsepower to do that.  Instead, look at what ethernet card you have.  60 machines all trying to use a single 10BaseT card would bottleneck rather quickly.  A 100BaseT or even FibreChannel network adaptor would work much better (depending on how much bandwidth you need and have past that machine).

In any case, processor speed won't make much of a difference (unless you're talking about a 10 MHz processor or something else ridiculously slow).

chris
0
 

Author Comment

by:scrutchfield
ID: 1585579
So then would something like a 486 DX2 66 with 16 MB RAM be sufficient?
0
 
LVL 1

Expert Comment

by:mgrcnk
ID: 1585580
Definitely.  A Sparc 1 (our firewall) can handle a class B network (we have thousands of computers).  Granted, it only logs packets and forwards them on, but masquerading doesn't do much more than that.  It just translates addresses.

If would only start getting shakey if you were using a 386, 4 MB RAM, and running X.

For dedicated processes like that (we have DHCP boosters here), we use 486/50's I believe.  All they do is take a DHCP request from a remote network and tunnel it through a cable modem.  Never had a problem with that, so I doubt you will either.

chris
0

Featured Post

Learn by Doing. Anytime. Anywhere.

Do you like to learn by doing?
Our labs and exercises give you the chance to do just that: Learn by performing actions on real environments.

Hands-on, scenario-based labs give you experience on real environments provided by us so you don't have to worry about breaking anything.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question