How to configure Redhat Enterprise 3 as PPPOE Server

Posted on 2006-03-26
Last Modified: 2009-07-29

 I'm Planning to configure a PPPOE Server for a company, the company request is :

1- they need to connect the linux server to LeasdLine or ADSL Line "Internet"
2- the Speed will be 2 MB internet
3- the server must be configured as PPPOE Server and all Clinets "Windows XP, 2000" must use PPPOE Client software to be connected to the server
4- all clients are connected to the same LAN
5- they need the 2 MB internet to be shared equally to the connected users
6- any suggested points you may add

    Thanks Alot
Question by:fadyz
    LVL 14

    Accepted Solution

    LVL 3

    Assisted Solution

    Sounds like you need a internet server or squid  proxy to control bandwitdh for users to access internet right?
    Based on my assumption. I recommend you to use squid for the job.

    Read up, squid's FAQ19
    Squid's faq comes with most of linux distro, including RHEL3
    /usr/share/doc/squid-2.5.STABLE6/FAQ-19.html#ss19.8          <--- mine is Centos4, your squid version will be diff.

    Try to follow the setup, this setting is called "delaypool".

    Then remember to configure each clients' Internet Explorer to point to this squid proxy port number 3128(default).

    Author Comment

    this sounds to be good, i checked it, thats good, it allow us to configure our internet bandwidth to be share as we want per host >>> it is ok

    but i also prefer to use an application or to create users and share the bandwidth according to users accounts not per host account, i'm sure that there is a program that can let us manage our bandwidth and user account based on them, so i can give User1 50k/p upload and 20k/s download as an example...

    it will be the best if i get this information ...
    thanks in advance


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
    Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now