Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


ADSL Bandwidth Management HOW-TO need help

Posted on 2004-10-25
Medium Priority
Last Modified: 2013-12-03
Refer to ADSL Bandwidth Management HOW-TO. There are example script for inbound and outbound shaping. My question are
1 how to use it.
2 Is that complete script ? Do I need to add any command to make use ?
3 Do I need to add "nat" ?

My network is standard ,20 windows client ,1 ADSL Modem, 1 PC running RH9 for router.
I want to share internet to 20 client by using RH box running HTB+IMQ to manage bandwidth.
Previously use RH9 running IPtables command without HTB and IMQ with these script :

Assuming eth1 is connected to WAN, eth0 to LAN
echo "1" > /proc/sys/net/ipv4/ip_forward
/sbin/iptables -A FORWARD -i eth1 -o eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A FORWARD -i eth0 -o eth1 -j ACCEPT
/sbin/iptables -t nat -A POSTROUTING -o eth1 -j SNAT --to
Question by:bringmetoyourworld
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 38

Expert Comment

ID: 12403961

   The ip_forwarding, you need the "routed" running to make the Linux box as router.
Please install "routed" from RedHat 9 CD.

   Besides, please provide the link to "ADSL Bandwidth Management HOW-TO" so people can easier locate it and discuss on the same page.



Author Comment

ID: 12410867
Better follow this link,it is script that i am talking about.
LVL 38

Accepted Solution

wesly_chen earned 2000 total points
ID: 12411548
I think the script in
seems complete. However, you need to modify the value of "RATEUP" and "RATEDN" to fit your own need.


Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question