
•
Pipe Rules send traffic through Pipes.
•
A pipe can have a limit which is the maximum amount of traffic allowed.
•
A pipe can only know when it is full if a limit is specified.
•
A single pipe should handle traffic in only one direction (although 2 way pipes are allowed).
•
Pipes can be chained so that one pipe's traffic feeds into another pipe.
•
Specific traffic types can be given a priority in a pipe.
•
Priorities can be given a maximum limit which is also a guarantee. Traffic that exceeds this will
be sent at the minimum precedence which is also called the Best Effort precedence.
•
At the Best Effort precedence all packets are treated on a "first come, first forwarded" basis.
•
Within a pipe, traffic can also be separated on a Group basis. For example, by source IP address.
Each user in a group (for example, each source IP address) can be given a maximum limit and
precedences within a group can be given a limit/guarantee.
•
A pipe limit need not be specified if group members have a maximum limit.
•
Dynamic Balancing can be used to specify that all users in a group get a fair and equal amount
of bandwidth.
10.1.12. More Pipe Examples
This section looks at some more scenarios and how traffic shaping can be used to solve particular
problems.
A Basic Scenario
The first scenario will examine the configuration shown in the image below, in which incoming and
outgoing traffic is to be limited to 1 megabit per second.
Figure 10.6. A Basic Traffic Shaping Scenario
10.1.12. More Pipe Examples
Chapter 10. Traffic Management
390
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...