beautypg.com

Traffic shaping – D-Link DFL-700 User Manual

Page 30

background image

30

the system administrators if email alerting is converted. There are two modes that can be
configured, either Inspection Only or Prevention. Inspection Only will only inspect the traffic
and if the DFL-700 sees anything it will log, email an alert (if configured) and pass on the
traffic, if Prevention is used the traffic will be dropped and logged and if configured a email
alert will be sent.

D-Link updates the attack database periodically. Since firmware version 1.30.00 automatic

updates are possible. If IDS or IDP is enabled for at least one of the policies or port mappings,
auto updating of the IDS database will be enabled. The firewall will then automatically
download the latest database from the D-Link website.

Traffic Shaping

The simplest way to obtain quality of service in a network, seen from a security as well as

a functionality perspective, is to have the components in the network, not the applications, be
responsible for network traffic control in well-defined choke points.

Traffic shaping works by measuring and queuing IP packets, in transit, with respect to a

number of configurable parameters. Differentiated rate limits and traffic guarantees based on
source, destination and protocol parameters can be created; much the same way firewall
policies are implemented.

There are three different priorities when configuring the traffic shaping, Normal, High and

Critical.

Limit works by limiting the inbound and outbound traffic to the specified speed. This is the

maximum bandwidth that can be used by traffic using this policy. Note however that if you
have other policies using limit; which in total is more then your total internet connection and
have configured the traffic limits on the WAN interface this limit is sometimes lowered to allow
traffic with higher priorities to have precedence.

By using Guarantee, you can traffic using a policy a minimum bandwidth, this will only

work if the traffic limits for the WAN interface are configured correctly.