?
Solved

rate limit / bandwidth throttling / shaping

Posted on 2007-12-01
1
Medium Priority
?
779 Views
Last Modified: 2008-02-01
I have been trying to use TC example from this thread but it does not seem to be working. The inbound and the outbound are the same and it give an error trying to add the outbound(already exist). It also looks like this was design for a router and I am trying to use this in a public server and limit all traffic to 512kb. I tried the to replace the private address with our public but still can't get it to work in any direction.

I am using RH ES4

http://www.experts-exchange.com/Networking/Linux_Networking/Q_20819743.html
0
Comment
Question by:redbaran28
1 Comment
 
LVL 43

Accepted Solution

by:
ravenpl earned 1500 total points
ID: 20390438
In the previous thread there's nothing about inbound limiting.
http://lartc.org/howto/lartc.imq.html # needs kernel pathing, but really works
http://tldp.org/HOWTO/Adv-Routing-HOWTO/lartc.adv-qdisc.ingress.html # it's really unusable, but...

For full examples refer
http://lartc.org/howto/lartc.cookbook.ultimate-tc.html
http://www.faqs.org/docs/Linux-HOWTO/Traffic-Control-tcng-HTB-HOWTO.html
use htb. If You need just limit outbound traffic to 512k

TC=/sbin/tc
DEV="dev eth0"
#flush qdisc
$TC qdisc del $DEV root 2>&1>/dev/null

#exit if $0 stop
[ _$1 = _stop ] && exit 0

#init qdisc, set default class for traffic
$TC qdisc add $DEV root handle 1:0 htb default 2
#root class with full NIC speed
$TC class add $DEV parent 1:0 classid 1:1 htb rate 100mbit ceil 100mbit burst 64k

#default class, general porpouse
$TC class add $DEV parent 1:1 classid 1:2 htb rate 512kbit ceil 512kbit burst 32k

#optionally attach SFQ to default class
$TC qdisc add dev eth2 parent 1:2 handle 20: sfq perturb 15
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question