10-01-2010
Quote:
Understandable! However I was under the impression that the hosts of a segment would be constantly broadcasting among them even if not much is actually "user generated traffic". Do I have the wrong impression?
Whether their traffic is all or even mostly broadcast depends
entirely on what they're doing. If something's spewing broadcast video or disk images etc. to the network you'll obviously have a lot of broadcast. If you've got a hundred people running web browsers the traffic will be almost all non-broadcast. (Yes, there will be
little bits of broadcast all the time, ARP requests and DHCP traffic and service announcements and all that, but these shouldn't amount to much.) Lacking my crystal ball, I really can't say whether you can put that many hosts on a subnet for what they're doing.
Quote:
Nevertheless, I wish to not miss the opportunity to ask you: by what rules could I come to the conclusion that the network is heavy on traffic?
The amount of available bandwidth versus the amount of used bandwidth, both between hosts and upstream/downstream.
Last edited by Corona688; 10-01-2010 at 12:31 PM..
This User Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. UNIX for Dummies Questions & Answers
Hi!
Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is:
hosts.allow
ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies
3. Shell Programming and Scripting
Hmmm, tough question for me, so I put it here.
I am trying to use shell script or mysql to do the following thing.
tableA, in which all are single ips.
sip
-------
1.2.3.4
8.8.8.8
123.3.32.1
....
and tableB, a list of our group subnets.
subnet
---------
1.0.0.0/8
20.0.1.0/24 (2 Replies)
Discussion started by: fedora
2 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone,
This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it.
I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies
5. IP Networking
Hi,
My project needs to migrate the existing Subnet (255.255.255.0) to a new subnet and change the ipaddresses (currently C class). How can I do that. I need some information.
John (0 Replies)
Discussion started by: johnmarsh
0 Replies
6. IP Networking
Hi,
How do I get subnet from this:
10.252.0.138/25
Tnx (2 Replies)
Discussion started by: mehrdad68
2 Replies
7. IP Networking
Hi. my english is not so good. sorry.
i have some problem. My isp give me second ip from subnet. One network is working, but secong don't.
fxp0 - my network
dc0 - network isp (that working)
re0 - network isp (don't working)
i try use ng_one2many, but it's don't working
ngctl mkpeer... (0 Replies)
Discussion started by: kil
0 Replies
8. Linux
Hello All,
We have added a windows host and its config files to Nagios master server and wanted to do a ping check alone at the moment however, the nagios master server identifies the host in its GUI and immediately disappears can anyone let me know the right approach to this one, We want to... (2 Replies)
Discussion started by: lovesaikrishna
2 Replies
9. AIX
hi all
just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box.
it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames.
the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies
10. Solaris
Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh.
Actions to perform within a single ssh session via shell script
- copy a file
- untar at destination (remote host)
OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
LEARN ABOUT DEBIAN
shorewall6-routestopped
SHOREWALL6-ROUTESTO(5) [FIXME: manual] SHOREWALL6-ROUTESTO(5)
NAME
routestopped - The Shorewall6 file that governs what traffic flows through the firewall while it is in 'stopped' state.
SYNOPSIS
/etc/shorewall6/routestopped
DESCRIPTION
This file is used to define the hosts that are accessible when the firewall is stopped or is being stopped. When shorewall6-shell is being
used, the file also determines those hosts that are accessible when the firewall is in the process of being [re]started.
The columns in the file are as follows (where the column name is followed by a different name in parentheses, the different name is used in
the alternate specification syntax).
INTERFACE - interface
Interface through which host(s) communicate with the firewall
HOST(S) - [-|address[,address]...]
Optional comma-separated list of IP/subnet addresses. If your kernel and ip6tables include iprange match support, IP address ranges are
also allowed.
If left empty or supplied as "-", 0.0.0.0/0 is assumed.
OPTIONS - [-|option[,option]...]
An optional comma-separated list of options. The order of the options is not important but the list can contain no embedded whitespace.
The currently-supported options are:
routeback
Set up a rule to ACCEPT traffic from these hosts back to themselves. Beginning with Shorewall 4.4.9, this option is automatically
set if routeback is specified in shorewall6-interfaces[1] (5) or if the rules compiler detects that the interface is a bridge.
source
Allow traffic from these hosts to ANY destination. Without this option or the dest option, only traffic from this host to other
listed hosts (and the firewall) is allowed. If source is specified then routeback is redundant.
dest
Allow traffic to these hosts from ANY source. Without this option or the source option, only traffic from this host to other listed
hosts (and the firewall) is allowed. If dest is specified then routeback is redundant.
critical
Allow traffic between the firewall and these hosts throughout '[re]start', 'stop' and 'clear'. Specifying critical on one or more
entries will cause your firewall to be "totally open" for a brief window during each of those operations. Examples of where you
might want to use this are:
o 'Ping' nodes with heartbeat.
o LDAP server(s) if you use LDAP Authentication
o NFS Server if you have an NFS-mounted root filesystem.
Note
The source and dest options work best when used in conjunction with ADMINISABSENTMINDED=Yes in shorewall6.conf[2](5).
EXAMPLE
Example 1:
#INTERFACE HOST(S) OPTIONS
eth2 2002:ce7c:92b4::/64
eth0 2002:ce7c:92b4:1::/64
br0 - routeback
eth3 - source
FILES
/etc/shorewall6/routestopped
SEE ALSO
http://shorewall.net/starting_and_stopping_shorewall.htm
http://shorewall.net/configuration_file_basics.htm#Pairs
shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5), shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
shorewall6-maclist(5), shoewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5),
shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5), shorewall6-tcrules(5),
shorewall6-tos(5), shorewall6-tunnels(5), shorewall6-zones(5)
NOTES
1. shorewall6-interfaces
http://www.shorewall.net/manpages6/shorewall6-interfaces.html
2. shorewall6.conf
http://www.shorewall.net/manpages6/shorewall6.conf.html
[FIXME: source] 06/28/2012 SHOREWALL6-ROUTESTO(5)