Linux Advanced Routing & Traffic Control HOWTOBert Hubert. Thomas Graf (Section Author)Gregory Maxwell (Section Author)Remco van Mook (Section Author)Martijn van Oosterhout (Section Author)Paul B Schroeder (Section Author)Jasper Spaans (Section Author)Pedro Larroy (Section Author)A very hands- on approach to iproute. Table of Contents. Dedication. 2. Introduction. Disclaimer & License. Prior knowledge. 2. What Linux can do for you. Housekeeping notes. Access, GIT & submitting updates.
Mailing list. 2. 7. Layout of this document. But since 2014, Google Images has also let users filter photos by license. And unlike Flickr, Google Images uses the most sophisticated search algorithms on the planet. Introduction to iproute. Why iproute. 2? 3. Prerequisites. 3. Exploring your current configuration. IP addresses. 3. 4. ARP4. Rules - routing policy database. Simple source policy routing. Routing for multiple uplinks/providers. Split access. 4. 2. Load balancing. 5. GRE and other tunnels. A few general remarks about tunnels: 5. IP in IP tunneling. GRE tunneling. 5. IPv. 4 Tunneling. IPv. 6 Tunneling. Userland tunnels. IPv. 6 tunneling with Cisco and/or 6bone. IPv. 6 Tunneling. IPSEC: secure IP over the Internet. Intro with Manual Keying. Automatic keying. Theory. 7. 2. 2. Example. Automatic keying using X. IPSEC tunnels. 7. Other IPSEC software. IPSEC interoperation with other systems. Windows. 7. 5. 2. Check Point VPN- 1. NG8. Multicast routing. Queueing Disciplines for Bandwidth Management. Queues and Queueing Disciplines explained. Simple, classless Queueing Disciplines. Token Bucket Filter. Stochastic Fairness Queueing. Advice for when to use which queue. Terminology. 9. 5. Classful Queueing Disciplines. Flow within classful qdiscs & classes. The qdisc family: roots, handles, siblings and parents. The PRIO qdisc. 9. The famous CBQ qdisc. Hierarchical Token Bucket. Classifying packets with filters. Some simple filtering examples. All the filtering commands you will normally need. The Intermediate queueing device (IMQ)9. Sample configuration. Load sharing over multiple interfaces. Caveats. 10. 2. Other possibilities. Netfilter & iproute - marking packets. Advanced filters for (re- )classifying packets. The u. 32 classifier. U3. 2 selector. 12. General selectors. Specific selectors. The route classifier. Policing filters. Ways to police. 12. Overlimit actions. Examples. 12. 4. Hashing filters for very fast massive filtering. Filtering IPv. 6 Traffic. How come that IPv. Marking IPv. 6 packets using ip. Using the u. 32 selector to match IPv. Kernel network parameters. Reverse Path Filtering. Obscure settings. Generic ipv. 41. 3. Per device settings. Neighbor policy. 13. Routing settings. Advanced & less common queueing disciplines. Parameters & usage. Clark- Shenker- Zhang algorithm (CSZ)1. DSMARK1. 4. 3. 1. Introduction. 14. What is Dsmark related to? Differentiated Services guidelines. Working with Dsmark. How SCH_DSMARK works. TC_INDEX Filter. 14. Ingress qdisc. 14. Parameters & usage. Random Early Detection (RED)1. Generic Random Early Detection. VC/ATM emulation. Weighted Round Robin (WRR)1. Cookbook. 15. 1. Running multiple sites with different SLAs. Protecting your host from SYN floods. Rate limit ICMP to prevent d. Do. S1. 5. 4. Prioritizing interactive traffic. Transparent web- caching using netfilter. Traffic flow diagram after implementation. Circumventing Path MTU Discovery issues with per route MTU settings. Solution. 15. 7. Circumventing Path MTU Discovery issues with MSS Clamping. ADSL, cable, PPPo. E & PPt. P users)1. The Ultimate Traffic Conditioner: Low Latency, Fast Up & Downloads. Why it doesn't work well by default. The actual script (CBQ)1. The actual script (HTB)1. Rate limiting a single host or netmask. Example of a full nat solution with Qo. S1. 5. 1. 0. 1. Let's begin optimizing that scarce bandwidth. Classifying packets. Improving our setup. Making all of the above start at boot. Building bridges, and pseudo- bridges with Proxy ARP1. State of bridging and iptables. Bridging and shaping. Pseudo- bridges with Proxy- ARP1. ARP & Proxy- ARP1. Implementing it. 17. Dynamic routing - OSPF and BGP1. Setting up OSPF with Zebra. Prerequisites. 17. Configuring Zebra. Running Zebra. 17. Setting up BGP4 with Zebra. Network Map (Example)1. Configuration (Example)1. Checking Configuration. Other possibilities. Further reading. 20. Acknowledgements. Chapter 1. Dedication This document is dedicated to lots of people, and is my attempt to do. To list but a few. Rusty Russell. Alexey N. Kuznetsov. The good folks from Google. The staff of Casema Internet. Chapter 2. Introduction. Welcome, gentle reader. This document hopes to enlighten you on how to do more with Linux 2. Unbeknownst to most users, you already run tools which allow you to. Commands like route and. I hope that this HOWTO will become as readable as the ones by Rusty Russell. You can always reach us by posting to the mailing list (see the relevant. HOWTO. We are no free helpdesk, but we often will answer questions. Before losing your way in this HOWTO, if all you want to do is simple. Other possibilities chapter, and read about CBQ. This document is distributed in the hope that it will be useful. WITHOUT ANY WARRANTY; without even the implied warranty of. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. In short, if your STM- 6. Sorry. Copyright (c) 2. Gregory Maxwell, Martijn van. Oosterhout, Remco van Mook, Paul B. Schroeder and others. This material may. Open Publication License, v. Please freely copy and distribute (sell or give away) this document in any. It's requested that corrections and/or comments be forwarded to the. It is also requested that if you publish this HOWTO in hardcopy that you. As the title implies, this is the "Advanced" HOWTO. While by no means rocket science, some prior knowledge is assumed. Here are some other references which might help teach you more. Rusty Russell's networking- concepts- HOWTOVery nice introduction, explaining what a network is, and how it is. Linux Networking- HOWTO (Previously the Net- 3 HOWTO)Great stuff, although very verbose. It teaches you a lot of stuff. Internet. Should be located in /usr/doc/HOWTO/NET3- 4- HOWTO. A small list of things that are possible: Throttle bandwidth for certain computers. Throttle bandwidth TO certain computers. Help you to fairly share your bandwidth. Protect your network from Do. S attacks. Protect the Internet from your customers. Multiplex several servers as one, for load balancing or. Restrict access to your computers. Limit access of your users to other hosts. Do routing based on user id (yes!), MAC address, source IP. Currently, not many people are using these advanced features. This is for. several reasons. While the provided documentation is verbose, it is not very. Traffic control is almost undocumented. There are several things which should be noted about this document. While I. wrote most of it, I really don't want it to stay that way. I am a strong. believer in Open Source, so I encourage you to send feedback, updates. Do not hesitate to inform me of typos or plain old errors. If my English sounds somewhat wooden, please realize that I'm not a native. Feel free to send suggestions. If you feel you are better qualified to maintain a section, or think that. The SGML. of this HOWTO is available via GIT, I very much envision more people. In aid of this, you will find lots of FIXME notices. Patches are always. Wherever you find a FIXME, you should know that you are treading in. This is not to say that there are no errors elsewhere. If you have validated something, please let us know so. FIXME notice. About this HOWTO, I will take some liberties along the road. For example, I. postulate a 1. Mbit Internet connection, while I know full well that those. The canonical location for the HOWTO is. We now have anonymous GIT access available to the world at large. This is. good in a number of ways. You can easily upgrade to newer versions of this. HOWTO and submitting patches is no work at all. Furthermore, it allows the authors to work on the source independently. HTTP). $ git clone http: //repo. Enter the checked out directory. If you want to update your local copy, run. If you made changes and want to contribute them, run git diff. LARTC mailing list < lartc@vger. Thanks! Please make sure that you edit the. A Makefile is supplied which should help you create postscript, dvi, pdf. You may need to install. Be careful not to edit 2. It contains an older version of the. HOWTO. The right file is lartc. The authors receive an increasing amount of mail about this HOWTO. Because. of the clear interest of the community, it has been decided to start a. Advanced Routing and. Traffic Control. You can subscribe to the list. Search Flickr Better With Google Images. At a for- profit editorial outlet like Lifehacker, when we need an image for our posts, we can’t just do a Google image search and slap up the first result. We have to use properly licensed photos. Sometimes we use our own original photos, sometimes Getty images that we pay for, sometimes the millions of Flickr photos licensed for free use through Creative Commons. But since 2. 01. 4, Google Images has also let users filter photos by license. And unlike Flickr, Google Images uses the most sophisticated search algorithms on the planet. So it can unearth some Flickr photos that even Flickr can’t. For a recent post, I needed a hero shot of hand towels. Searching “hand towels” on Flickr returned a lot of hands near and around towels, plus the usual Second Life screenshots and NSFW art. Flickr just knew I wanted content about hands and towels. But Google guessed that my phrasing mattered, and found more actual hand towels, like the beautiful red- and- yellow number in my post. Flickr knew that was a picture of a towel, but it couldn’t recognize the “hand” part, since that word appeared nowhere on the image’s main page. Google’s AI algorithms may have literally recognized this was a hand towel, or maybe Google just knew that other sites had linked or embedded the image with the relevant phrase. Either way, it dug up an image that hadn’t been explicitly labeled, but was exactly what I needed. So for any tricky image searches, you still might want to dig into Google’s “Tools” menu before trying a specialized engine. Google Images will filter images by size, color, recency, license, or even pick out photos, faces, line drawings, animations, or clip art. If you’re searching by license, you’ll still need to click through from the Google result to the image’s original page, to confirm the license and follow any restrictions, like giving attribution. Google’s powerful, but it’s not perfect, and you can’t blame it when someone comes at you for using their photo without following the rules.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
October 2017
Categories |