Page 106 / 298 Scroll up to view Page 101 - 105
Vigor2930 Series User’s Guide
98
Profile Name
Type a name for such profile.
Log
None
– There is no log file will be recorded for this profile.
Pass
– Only the log about Pass will be recorded in Syslog.
Block
– Only the log about Block will be recorded in Syslog.
All
– All the actions (Pass and Block) will be recorded in Syslog.
White/Black List
Enable –
Activate white/black list function for such profile.
Group/Object Selections –
Click
Edit
to choose the group or
object profile as the content of white/black list.
Pass
-
allow
accessing into the corresponding webpage with the
characters listed on
Group/Object Selections
. If the web pages do
not match with the specified feature set here, they will be
processed with the categories listed on the box below.
Block
-
restrict
accessing into the corresponding webpage with the
characters listed on
Group/Object Selections
.
Page 107 / 298
igor2930 Series User’s Guide
99
If the web pages do not match with the specified feature set here,
they will be processed with the categories listed on the box below.
Action
Pass
- allow accessing into the corresponding webpage with the
categories listed on the box below.
Block
- restrict accessing into the corresponding webpage with the
categories listed on the box below.
If the web pages do not match with the specified feature set here, it
will be processed with reverse action.
3.7 Bandwidth Management
Below shows the menu items for Bandwidth Management.
3.7.1 Sessions Limit
A PC with private IP address can access to the Internet via NAT router. The router will
generate the records of NAT sessions for such connection. The P2P (Peer to Peer)
applications (e.g., BitTorrent) always need many sessions for procession and also they will
occupy over resources which might result in important accesses impacted. To solve the
problem, you can use limit session to limit the session procession for specified Hosts.
In the
Bandwidth Management
menu, click
Sessions Limit
to open the web page.
Page 108 / 298
Vigor2930 Series User’s Guide
100
To activate the function of limit session, simply click
Enable
and set the default session
limit.
Enable
Click this button to activate the function of limit session.
Disable
Click this button to close the function of limit session.
Default session limit
Defines the default session number used for each computer in
LAN.
Limitation List
Displays a list of specific limitations that you set on this web
page.
Start IP
Defines the start IP address for limit session.
End IP
Defines the end IP address for limit session.
Maximum Sessions
Defines the available session number for each host in the
specific range of IP addresses. If you do not set the session
number in this field, the system will use the default session
limit for the specific limitation you set for each index.
Add
Adds the specific session limitation onto the list above.
Edit
Allows you to edit the settings for the selected limitation.
Delete
Remove the selected settings existing on the limitation list.
Index (1-15) in Schedule
Setup
You can type in four sets of time schedule for your request.
All the schedules can be set previously in
Application –
Schedule
web page and you can use the number that you have
set in that web page.
Page 109 / 298
igor2930 Series User’s Guide
101
3.7.2 Bandwidth Limit
The downstream or upstream from FTP, HTTP or some P2P applications will occupy large
of bandwidth and affect the applications for other programs. Please use Limit Bandwidth to
make the bandwidth usage more efficient.
In the
Bandwidth Management
menu, click
Bandwidth Limit
to open the web page.
To activate the function of limit bandwidth, simply click
Enable
and set the default upstream
and downstream limit.
Enable
Click this button to activate the function of limit bandwidth.
Disable
Click this button to close the function of limit bandwidth.
Default TX limit
Define the default speed of the upstream for each computer in
LAN.
Default RX limit
Define the default speed of the downstream for each computer
in LAN.
Allow auto adjustment to
make the best utilization
of available bandwidth
Router will detect if there is enough bandwidth remained for
using according to the bandwidth limit set by the user. If yes,
the router will adjust the available bandwidth for users to
enhance the total utilization.
Limitation List
Display a list of specific limitations that you set on this web
page.
Start IP
Define the start IP address for limit bandwidth.
End IP
Define the end IP address for limit bandwidth.
Page 110 / 298
Vigor2930 Series User’s Guide
102
Each/Shared
Select
Each
to make each IP within the range of Start IP and
End IP having the same speed defined in TX limit and RX
limit fields; select
Shared
to make all the IPs within the range
of Start IP and End IP share the speed defined in TX limit and
RX limit fields.
TX limit
Define the limitation for the speed of the upstream. If you do
not set the limit in this field, the system will use the default
speed for the specific limitation you set for each index.
RX limit
Define the limitation for the speed of the downstream. If you
do not set the limit in this field, the system will use the default
speed for the specific limitation you set for each index.
Add
Add the specific speed limitation onto the list above.
Edit
Allows you to edit the settings for the selected limitation.
Delete
Remove the selected settings existing on the limitation list.
Index (1-15) in Schedule
Setup
You can type in four sets of time schedule for your request.
All the schedules can be set previously in
Application –
Schedule
web page and you can use the number that you
have set in that web page.
3.7.3 Quality of Service
Deploying QoS (Quality of Service) management to guarantee that all applications receive
the service levels required and sufficient bandwidth to meet performance expectations is
indeed one important aspect of modern enterprise network.
One reason for QoS is that numerous TCP-based applications tend to continually increase
their transmission rate and consume all available bandwidth, which is called TCP slow start.
If other applications are not protected by QoS, it will detract much from their performance in
the overcrowded network. This is especially essential to those are low tolerant of loss, delay
or jitter (delay variation).
Another reason is due to congestions at network intersections where speeds of
interconnected circuits mismatch or traffic aggregates, packets will queue up and traffic can
be throttled back to a lower speed. If there’s no defined priority to specify which packets
should be discarded (or in another term “dropped”) from an overflowing queue, packets of
sensitive applications mentioned above might be the ones to drop off. How this will affect
application performance?
There are two components within Primary configuration of QoS deployment:
z
Classification: Identifying low-latency or crucial applications and marking them for
high-priority service level enforcement throughout the network.
z
Scheduling: Based on classification of service level to assign packets to queues and
associated service types
The basic QoS implementation in Vigor routers is to classify and schedule packets based on
the service type information in the IP header. For instance, to ensure the connection with the
headquarter, a teleworker may enforce an index of QoS Control to reserve bandwidth for
HTTPS connection while using lots of application at the same time.
One more larger-scale implementation of QoS network is to apply DSCP (Differentiated
Service Code Point) and IP Precedence disciplines at Layer 3. Compared with legacy IP
Precedence that uses Type of Service (ToS) field in the IP header to define 8 service classes,
DSCP is a successor creating 64 classes possible with backward IP Precedence compatibility.

Rate

4 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top