![D-Link DFL-1600 - Security Appliance Скачать руководство пользователя страница 467](http://html.mh-extra.com/html/d-link/dfl-1600-security-appliance/dfl-1600-security-appliance_user-manual_75084467.webp)
•
Select the traffic to manage through Pipe Rules.
•
Pipe Rules send traffic through Pipes.
•
A pipe can have a limit which is the maximum amount of traffic allowed.
•
A pipe can only know when it is full if a total limit for the pipe is specified.
•
A single pipe should handle traffic in only one direction (although 2 way pipes are allowed).
•
Pipes can be chained so that one pipe's traffic feeds into another pipe.
•
Specific traffic types can be given a priority in a pipe.
•
Priorities can be given a maximum limit which is also a guarantee. Traffic that exceeds this will
be sent at the minimum precedence which is also called the Best Effort precedence.
•
At the best effort precedence all packets are treated on a "first come, first forwarded" basis.
•
Within a pipe, traffic can also be separated on a Group basis. For example, by source IP address.
Each user in a group (for example, each source IP address) can be given a maximum limit and
precedences within a group can be given a limit/guarantee.
•
A pipe limit need not be specified if group members have a maximum limit.
•
Dynamic Balancing can be used to specify that all users in a group get a fair and equal amount
of bandwidth.
10.1.10. More Pipe Examples
This section looks at some more scenarios and how traffic shaping can be used to solve particular
problems.
A Basic Scenario
The first scenario will examine the configuration shown in the image below, in which incoming and
outgoing traffic is to be limited to 1 megabit per second.
10.1.10. More Pipe Examples
Chapter 10. Traffic Management
467
Содержание DFL-1600 - Security Appliance
Страница 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Страница 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Страница 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Страница 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Страница 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Страница 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Страница 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Страница 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Страница 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Страница 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Страница 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Страница 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Страница 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Страница 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Страница 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...