Solved

Reserve bandwith

Posted on 2004-08-11
1
239 Views
Last Modified: 2010-03-18
I need help to set up trafic shaping on my linux firewall.


It has 3 nic's.

eth0 connected to internet. 256k line
eth1 connected to dmz where I have sql server and www server and mail server and ssh.
eth2 Private network.


I like to host a web page and a sql server inside dmz for a customer and the bandwith for this and ssh should have the highest priority.
( it should never be slow when someone download a large file or send or recieve large e-mails)

Can someone help me set this up?
0
Comment
Question by:pucko
1 Comment
 
LVL 14

Accepted Solution

by:
pablouruguay earned 500 total points
ID: 11773397
maybe im not sure you need a port bandwith control woth shapin in here at the bottom you have an example of that

http://talk.trekweb.com/~jasonb/articles/linux_tc_minihowto.shtml

other option is a tool or gui for make this. "i never try this tool"

i post only a ideas :)

http://freshmeat.net/projects/tcss/?branch_id=51240&release_id=168054
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question