It isn't difficult to understand why it would be useful to make sure nobody on your network hogs all of the bandwidth. It just isn't fair to others. Learn how to use a traffic shaper to create a fair experience for everyone that prioritizes data-based phone calls above all other types of traffic.
- [Instructor] It isn't difficult to understand … why it would be useful to make sure nobody on your network … hogs all of the bandwidth. … It just isn't fair to others … when one device needs as much data … as the network will provide, … a network without limitations will give that device … all of the bandwidth it possibly can … to the exclusion of others. … We want a network that fairly divides up the bandwidth, … making the experience acceptable for everyone. … The way we do this is with traffic shaping. … There are a lot of options for traffic shaping, … so let's talk about what they are … and how you might use them. … Traffic shaping is a quality of service technology … that prioritizes traffic that you define … as a higher priority than other traffic, … which will be a lower priority in the system. … Different strategies can be employed to accomplish this … by employing different types of network schedulers … that are also known as packet schedulers. … Different networking technology companies …
Author
Released
8/14/2019- Designing your network
- Creating firewall schedules and rules
- Setting up a virtual IP
- Using aliases to group hosts
- Preventing local traffic from exiting to the internet
- Using Snort and other intrusion detection systems
- Prioritizing VoIP traffic
- Blocking access to specific websites
- Troubleshooting gaming performance issues
- Interpreting TCP flag definitions
Skill Level Beginner
Duration
Views
Related Courses
-
Linux: Firewalls and SELinux
with Sean Colins2h 22m Intermediate -
Networking Foundations: IP Addressing
with Timothy Pintello2h 35m Intermediate -
Security Testing Essential Training
with Jerod Brennen2h 48m Beginner
-
Introduction
-
Why do you need a firewall?2m 51s
-
Types of firewalls4m 14s
-
What it won't do2m 36s
-
Plan for your firewall3m 14s
-
Design your network2m 35s
-
Document your design2m 59s
-
1. Basic Firewall Configuration
-
Understand protocols2m 47s
-
Initial setup5m 27s
-
Create firewall schedules2m 24s
-
Create firewall rules4m 57s
-
Create floating rules2m 35s
-
2. Advanced Firewall Configuration
-
Use ports in aliases4m 58s
-
Traffic shaping3m 11s
-
3. Configuration Case Studies
-
Prioritizing VOIP traffic6m 35s
-
Blocking access to websites4m 14s
-
Intrusion protection basics7m 47s
-
Understand proxies and SSL4m 24s
-
-
4. Troubleshooting
-
Firewall command-line access5m 35s
-
-
Conclusion
-
Next steps1m 7s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Traffic shaping