How do I stop users from creating virtual tunnels and chewing up loads of bandwidth??
I noticed in /etc/ssh/ there is a config file. I am not sure if this is a good place to start. There really is no way to monitor this type of activity
running "top" command? At least I haven't found a way to isolate this type of activity. re-nice a process of suspicion isn't very helpful either.
Any insight on this would be greatly appreciated.
Thanks
Dave
I noticed in /etc/ssh/ there is a config file. I am not sure if this is a good place to start. There really is no way to monitor this type of activity
running "top" command? At least I haven't found a way to isolate this type of activity. re-nice a process of suspicion isn't very helpful either.
Any insight on this would be greatly appreciated.
Thanks
Dave