Published on January 30, 2014
SecPoint® Protector – Bandwidth Manager ProtectorTM Unified threat management http://www.secpoint.com/protector.html
Protector UTM – Bandwidth Management Bandwidth Management - Traffic Shaper This function is available through the new menu item “Traffic Shaper”. It allows to shape the outbound traffic depending on your needs. You can choose to give some computers in your LAN or some type of traffic a higher priority and a minimum guaranteed bandwidth, slowing down low-priority traffic (e.g. web surfing) when the need for bandwidth from critical services (e.g. Mail) is higher. On a Protector connected in bridge mode, traffic can be shaped independently on each network card. To define a traffic shaping on a network card, you should first enter the max. bandwidth available on that card, then you can start defining traffic Classes. To each Traffic Class it’s possible to associate a type of traffic (by IP, port, protocol) and a minimum bandwidth. You can also choose to let the class borrow some bandwidth from other classes when they are not using theirs. To do this, use the slider on the line of the Class. A class can borrow bandwidth up to the whole bandwidth available on the network card. To select the minimum bandwidth for each class, use the “Minimum Rate” slider. Here the blue line represents the whole bandwidth, and to change the minimum rate assigned to each class, you can simply move each slider to the right or left. Copyright © 1999-2014 SecPoint® Page 2 of 4
Protector UTM – Bandwidth Management When you create the first class, the Protector will automatically create a default class, which is designed to collect all unshaped traffic. A default class must always exist, and since it is a “catch-all” class, no filters can be created on it. In the Edit window, that appears when you create or edit an existing class, you can select the type of filter, the direction and a priority. The direction defines whether the filter will be active on traffic coming from that IP/port or going to it. In the example above, the direction is “Destination”, which means that the selected CIDR is the LAN. The priority defines in which order classes will be served. This is useful when, for example, there is an IP overlapping between two or more classes. In any case it is important to remember that traffic shaping is possible on outgoing traffic only. Copyright © 1999-2014 SecPoint® Page 3 of 4
Protector UTM – Bandwidth Management Copyright © 1999-2014 SecPoint® Page 4 of 4
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
Protector UTM – Bandwidth Management Bandwidth Management - Traffic Shaper. This function is available through the new menu item “Traffic Shaper”.
http://www.secpoint.com ... Browse all
Share Protector utm-next-gen-firewall-bandwidth-management. ... 1.SecPoint® Protector ...
Protector 12.0.3 Firmware release ProtectorTM UTM Firewall Appliance http://www.secpoint.com/protector.html Copyright © 1999 ...
Share Protector. Embed. size(px) start ...
... in bandwidth management spanning all vertical market segments. ... Protector utm-next-gen-firewall-bandwidth-management.
INTRODUCTION Laptop protector is a simple & compact electronic gadget which protects your valuable laptops against theft.
Sun UV Protector automatically locates your currentposition, ... Protector utm-next-gen-firewall-bandwidth-management Protector utm-next-gen-firewall-web ...