shapecfg and squid configurations request

0 pts.
Tags:
Bandwidth
DataCenter
Network management software
Network monitoring
Remote management
Systems management software
Unisys
please who knows how to configure shapecfg (bandwidth manager) and squid (proxy) under redhat linux 9.2. I will like the person to give a step to step approach. please reply with urgency. Thanks
ASKED: July 6, 2005  9:23 PM
UPDATED: July 8, 2005  5:38 AM

Answer Wiki

Thanks. We'll let you know when a new response is added.

What are you trying to do? I don’t know about shapecfg but we are using squid with bandwidth limiting enabled on a windows server. With squid you can limit total bandwidth, bandwidth per net, and bandwidth per node. We are currently set up with just total bandwidth limiting.
rt

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • petkoa
    Hi, You really don't supply any information about the type of setup you need, so here are some general considerations about trafiic shaping with kernel shapers (shapecfg) and squid: (1) squid will shape just the proxied traffic (http, https, ftp) but can do it very well, with a reasonable granularity, as was mentioned in the response of Astronomer. (2) kernel shaper modules can shape anything with any granularity (sometimes unreasonable), but you have to know well what are you doing and you can get some idea about this here: http://www.tldp.org/HOWTO/Bandwidth-Limiting-HOWTO/ http://www.tldp.org/HOWTO/Traffic-Control-HOWTO/ http://www.tldp.org/HOWTO/Traffic-Control-tcng-HTB-HOWTO/ (3) If you do plan to implement transparent proxying, my feeling is that it should be announced to your users and worded accordingly in some kind of policy - it's easy to make it transparent, but quite hard to make it invisible. BR, Petko
    3,120 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following