Skip to main content

Traffic Management

SecureLink V2 provides comprehensive traffic management capabilities to control bandwidth usage, prioritize critical applications, and enforce security boundaries.

Concepts

Traffic Profiles

Traffic Profiles define bandwidth limits for upload and download speeds. These profiles are reusable and can be applied to multiple traffic limiters.

  • Upload Rate: Maximum upload speed (in Mbps) or Unlimited.
  • Download Rate: Maximum download speed (in Mbps) or Unlimited.

Traffic Limiters (QoS)

Traffic Limiters apply Traffic Profiles to specific traffic flows based on destination or application. They allows you to guarantee quality of service for business-critical applications while throttling recreational traffic.

  • Priority: High, Medium, or Low.
  • Scope: Can be applied globally or to specific Device Groups / Clients.
  • Matching Criteria:
    • Destination: IP address, subnet, or domain.
    • Application: Application signature (e.g., "Office365", "YouTube").

Trust Policies (Firewall)

Trust Policies act as an internal firewall, controlling which devices can communicate with specific destinations or applications.

  • Action: Permit or Deny.
  • Source: Device Group or specific Client.
  • Destination: IP address, subnet, or domain.
  • Reflexive: Automatically allow return traffic (stateful).

Configuring Traffic Management

Creating a Traffic Profile

  1. Navigate to Network > Traffic Management.
  2. Click Add Profile.
  3. Enter a Name and Description.
  4. Set the Upload and Download limits (set to 0 for unlimited, or check the Unlimited box).
  5. Click Save.

Creating a Traffic Limiter

Note: Traffic Limiters are currently managed via the API or individual Device/Group detail pages.

  1. Go to Equipment > Devices or Device Groups.
  2. Select a device or group.
  3. Navigate to the Traffic Limiters tab.
  4. Click Add Limiter.
  5. Select a Traffic Profile.
  6. Define the Destination and/or Application.
  7. Set the Priority.
  8. Click Save.

Creating a Trust Policy

Note: Trust Policies are managed via the Device Groups page.

  1. Go to Equipment > Device Groups.
  2. Select a group.
  3. Navigate to the Trust Policies tab.
  4. Click Add Policy.
  5. Choose Permit or Deny.
  6. Define the Destination and Application.
  7. Click Save.

Monitoring

You can monitor the effectiveness of your policies in the Monitoring > Traffic section.

  • Real-time charts show bandwidth usage per class (High/Medium/Low).
  • Dropped packets counters help identify if limits are too aggressive.