Abstract

This chapter deals with advanced policy options. To successfully implement traffic shaping to the exact requirements, each policy implemented must be researched. A poor configuration with traffic shaping can be as bad in some cases as not using traffic shaping at all. This chapter takes a look at the use of guaranteed bandwidth, traffic prioritization, and maximum bandwidth restrictions. These three components of traffic management allow ensuring that the available bandwidth is allocated to the policies that need it. Using counting can help to identify traffic patterns on a per policy basis. This can help identify which policies require more bandwidth and which use less bandwidth. Policies are typically in one of two states, enabled or disabled. When using scheduling it can be used to create schedule objects to specify which times the policies will be enforced and for how long policies are effective. Policy-based authentication forces a user to authenticate before using network resources. Using authentication on a policy not only authenticates the system by requiring the source Internet protocol (IP) address to match the policy, but also forces the user to authenticate to the firewall to ensure the right user is accessing the resources.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.