Bandwidth management can be implemented from different perspectives. For example, whether a user-defined rule can access the Internet through a computer is convenient and reasonable depends on the vro settings. Because a router is often the gateway of a LAN, it can be centrally managed through vro control, which is not easy to omit. The vro can check each incoming and outgoing packet and decide to prioritize or reject the packet so as to retain the bandwidth to more important applications. From the router's point of view, the most common bandwidth management methods are as follows:
Control by user or host: we can control Specific Lan or external hosts. For example, an internal computer is not allowed to access the Internet, or only a computer is allowed to access the Internet, or a network user is not allowed to access a host. This approach is controlled by limiting access to a user or host. For example, in the firewall configuration, we can see that in the access service rule setting, you can restrict or allow online access by setting the "source IP address" and "Destination IP address. The source address may be a LAN user or an external address that requires services. The destination IP address is also the same. Network management can be configured as needed.
Figure 5:One of the following methods can be used to control by user or host.
For LAN users, IP control is not completely flawed. Some smart users modify their own IP addresses to avoid router control. Some users may even change to the leading IP address to obtain higher permissions for information access and bandwidth utilization. For network administrators, this problem must be solved. Fortunately, each network card has a unique identification number, which is hard to be changed by users. Therefore, we can use the "IP and MAC binding" function to standardize certain MAC addresses when IP addresses are allocated, that is, the network card/host on the network, to obtain specific IP addresses. If it is set to another IP address, you cannot access the Internet. This function is important for Smart Community Practitioners and highly sensitive unit network management.
|
Figure 6: binding an IP address to a MAC address ensures control effectiveness |
Control by application: We can also control the network application port. This is like an example of military interference against specific channels and destruction of communication. Because common applications usually have specific port numbers, we only need to find the corresponding port numbers and execute permitted or restricted operations in the access rule settings. Control by application port. The following figure shows the commonly used application port number. You can control the inbound and outbound traffic of different application packets as long as the port number is set to allow or deny.
In addition to common application port numbers, in the face of ever-changing applications, the network management can also set their own applications and corresponding port numbers to simplify the future setting process.
|
Figure 7: application control is implemented by using the number of network application ports |
Based on content: the most direct approach is to control the transfer content. That is, if you do not want to transmit any content, you can use keywords or file name control. On the following control settings page, we can see that the webpage content control settings are controlled according to the strings contained in the webpage content. The webpage string is controlled by transmitting the webpage name or file name. With these two settings, the network management can block webpages with specific content, or webpages, services, or files in a specific file format.
|
Figure 8: control over transmitted content through keywords or file names |
WAN port: for multiple WAN routers, the bandwidth can also be allocated to different WAN ports in different WAN port allocation modes. Qno supports three different bandwidth allocation modes. An IP group is used to specify a specific IP user to a WAN port. The advantage of an IP group is that different groups can be separated by bandwidth. bandwidth usage in some groups does not affect other users. IP Server Load balancer distributes IP addresses to different WAN ports in order to balance bandwidth usage. The advantage is that the access flow of the same IP address is through the same WAN port, it can adapt to the communication characteristics of different applications and is not prone to errors. Smart Server Load balancer automatically distributes bandwidth based on the application, bandwidth usage, WAN Traffic, and IP address distribution. Bandwidth management can also be effectively implemented through WAN port restrictions.
Figure 9:For multi-WAN routers, bandwidth can also be allocated to different WAN ports through different WAN port allocation modes.
The following shows that different WAN ports can also be configured with various control methods for cross-application control.
|
Figure 10: different control methods need to be combined in actual applications |
In addition to the above control methods, other methods can be used to perform the "too many" operation. scalliancer and others running Running beer? BR> after learning about some bandwidth management techniques, I believe you have a basic understanding of how to manage bandwidth.
Related Articles]
- Security router configuration and management for SMEs
- Log Management for security routers of Small and Medium Enterprises
- Vro Remote Management Configuration for Small and Medium-sized Enterprises