traffic shaping n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Traffic Shaping PowerPoint Presentation
Download Presentation
Traffic Shaping

play fullscreen
1 / 31

Traffic Shaping

165 Views Download Presentation
Download Presentation

Traffic Shaping

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Traffic Shaping By: Cole David Sam Littlefield Ronnie Julio

  2. What is Traffic Shaping Definition: Organizing and directing information within a computer network When used correctly it can provide benefits to a network, such as... • Optimization of bandwidth • Protection for users and information • Direct packets to specific locations

  3. Techniques • Reducing the bandwidth usable for each computer on the network • Reducing the bandwidth of certain servers • Redirecting certain activities to different servers • Blocking specific content completely

  4. Where is it implemented • Traffic shaping can be implemented on any network • Schools and workplaces utilize traffic shaping the most. • The bigger the network the more dramatic the results

  5. Traffic shaping in the workplace • Prevent exploitation of workplace resources • Using company time for personal matters(Facebook or gaming) • Viewing material which is unauthorized • Reduce unproductive network traffic • Gadgets • Noncritical software updates • Email • Direct the flow of information through specific servers or to specific computers • Throttling bandwidth

  6. Traffic Shaping in Schools • Limits activities and viewable material as much as possible • Often used to block content such as • Proxy Servers • Pornography • Games • Other inappropriate content

  7. Software There are many different choices and they generally provide similar usage. Lists are available online which contain websites and their genre of content. The software we looked into was Untangle and pfSense

  8. Untangle • History • Purpose • Products • Our use

  9. History • Created in 2003 • Founders were John Irwin and Dirk Morris • Original Product was called Metavize • Released in 2005 • In 2006 the company was sold to CMEA Ventures and Rustic Canyon Partners • Hired new CEO, Bob Walters • Metavize was renamed Untangle

  10. History • 2007 • Released Untangle Gateway Platform and surpasses 100,000 users in 2,000 organizations • 2008 • Received award for InfoWorld’s Best Open Source Software • 2009 • 1 Million protected users • Untangle 7.0, improved reporting • Untangle 7.1, web filtering and policy management

  11. History • 2010 • Untangle 7.2, Captive Portal and Save Face • Untangle 7.3, OEM hardware • Untangle 7.4, packages Lite, Standard, Premium • Launch Hardware devices • XE, R610, R610+ • Untangle 8.0, Bandwidth Control

  12. Purpose • The main purpose of Untangle is to provide unsurpassed security for their users • Anti-spam, Web Content Filtering, Antivirus, Anti-phishing, Anti-spyware, Intrusion prevention, Firewall, Open VPN, Router, Protocol Control, Attack Blocker, Reporting, Policy Manager, Kaspersky Virus Blocker, Commtouch Spam Booster, Esoft Web Filter, Directory Connectory, Captive Portal, Ad Blocker, WAN Balancer, WAN Failover, Bandwidth Control, Branding Manager on the Untangle Gateway Platform

  13. Products • Software • Untangle, newest version 8.0 • Hardware • Servers preloaded with Untangle • Untangle XE • Untangle R610 • Untangle R610 Plus

  14. Products • Untangle XE • Who’s it for? • Organizations of 100 or fewer users • What features does it have? • Robust, tower-form-factor server, ideal for a small business or classroom • Price? • $1,499

  15. Products • Untangle R610 • Who’s it for? • Aimed at organizations with hundreds of users • What features does it have? • Fast, quiet U1 rack-mountable server • Price? • $4,299

  16. Products • Untangle R610 Plus • Who’s it for? • Organizations with thousands of users • What features does it have? • Fast, quiet U1 rack-mountable server; Includes duel Intel XEON processors, duel hard drives with RAID 1, dual power supplies, and extra memory • Price? • $6,899

  17. Products

  18. Our use • The purpose of our lab was for traffic shaping. To fulfill this we used the web filtering application provided by Untangle for free. • Ways to use the web filter • Categorically • URL specific

  19. Our use • Categorically • Once launched you can choose specific features to block • URL specific • Able to block a specific site, not caught in the categories • Can block certain portions of sites while allowing others to be allowed • Also has the ability to flag instead of block • http://www.youtube.com/user/untangleinc#p/u/4/UPnRY6Zu4Ns

  20. m0n0wall project • Project aim for creating a complete, embedded firewall software package • Manuel Kasper • Wanted to create a GUI to control all aspects of his firewall without having to type a shell command • Fast, free, & simple

  21. pfSense • September 2004 • Chris Beuchler & Scott Ullrich • Full PC installations • Packet filter

  22. Features • CARP (Common Address Redundancy Protocol) for hardware failover support • pfsyncto maintain connections on failover • Outbound and inbound load balancing • Captive portal • Real time traffic monitor • RADIUS and redundant RADIUS server support

  23. Network Set Up

  24. System Requirements • 128 MB RAM • 300 MHz Processor • 1 GB hard drive • CD-ROM drive

  25. Web Interface

  26. Traffic Shaper Rules

  27. Bandwidthd

  28. darkstat

  29. vnstat

  30. Conclusion • Minimal startup time • Increases efficiency dramatically • Collected information can be invaluable The potential benefit far exceed the startup cost and because of this every large network should have some form of traffic shaping

  31. Bibliography • www.untangle.com • http://www.untangle.com/About-Us/Untangle-announces-availability-of-new-hardware-offering • http://www.untangle.com/hardware-appliances • http://en.wikipedia.org/wiki/Untangle#cite_note-14