Instruction manuals

Traffic Shaping 50

Published
of 42
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
manejo trafico
Transcript
  FortiOS™ Handbook Traffic Shaping for FortiOS 5.0  Traffic Shaping for FortiOS 5.0 April 29, 20130150212009720130429Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Technical Documentationdocs.fortinet.comKnowledge Basekb.fortinet.comCustomer Service & Supportsupport.fortinet.comTraining Servicestraining.fortinet.comFortiGuardfortiguard.comDocument Feedbacktechdocs@fortinet.com  Page 3 Contents Introduction....................................................................................................... 5 Before you begin...................................................................................................... 5How this guide is organized............................................................................... 5 The purpose of traffic shaping........................................................................ 6 Quality of Service..................................................................................................... 6Traffic policing......................................................................................................... 7Bandwidth guarantee, limit, and priority interactions.............................................. 8FortiGate traffic.................................................................................................. 8Through traffic.................................................................................................... 9Important considerations....................................................................................... 13 Traffic shaping methods................................................................................ 15 Traffic shaping options.......................................................................................... 15Shared policy shaping........................................................................................... 16Per policy......................................................................................................... 16 All policies........................................................................................................ 16Maximum and guaranteed bandwidth............................................................. 16Traffic priority................................................................................................... 16 VLAN, VDOM and virtual interfaces................................................................. 17Shared traffic shaper configuration settings.................................................... 17PerIP shaping....................................................................................................... 18PerIP traffic shaping configuration settings................................................... 19 Application control shaping................................................................................... 19Example........................................................................................................... 20Enabling in the security policy............................................................................... 20Reverse direction traffic shaping..................................................................... 21Setting the reverse direction only.................................................................... 21 Application control shaper............................................................................... 21Type of Service priority.......................................................................................... 22TOS in FortiOS................................................................................................. 23Differentiated Services........................................................................................... 23DSCP examples............................................................................................... 24Tos and DSCP mapping........................................................................................ 28Traffic Shaper Monitor........................................................................................... 29 Examples......................................................................................................... 31 QoS using priority from security policies............................................................... 31Sample configuration....................................................................................... 32QoS using priority from ToS or differentiated services.......................................... 33Sample configuration....................................................................................... 34  Page 4Traffic Shaping for FortiOS 5.0 Example setup for VoIP......................................................................................... 35Creating the traffic shapers............................................................................. 35Creating security policies................................................................................. 37 Troubleshooting............................................................................................. 38 Interface diagnosis................................................................................................. 38Shaper diagnose commands................................................................................. 38TOS command................................................................................................. 38Shared shaper.................................................................................................. 39PerIP shaper................................................................................................... 39Packet loss with statistics on shapers............................................................. 39Packet lost with the debug flow............................................................................ 40Session list details with dual traffic shaper............................................................ 40 Additional Information............................................................................................ 41 Index................................................................................................................ 42
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks