Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules 参照マニュアル

ページ / 631
Network and System Management
396
ProSecure Unified Threat Management (UTM) Appliance 
Configure VPN Tunnels
The UTM supports site-to-site IPSec VPN tunnels and dedicated SSL VPN tunnels. Each 
tunnel requires extensive processing for encryption and authentication, thereby increasing 
traffic through the WAN ports.
For information about IPSec VPN tunnels, see 
. For information about SSL VPN tunnels, see 
.
Use QoS and Bandwidth Assignments to Shift the Traffic Mix
By specifying QoS and bandwidth profiles and assigning these profiles to outbound and 
inbound firewall rules, you can shift the traffic mix to aim for optimum performance of the 
UTM.
Assign QoS Profiles
The QoS profile settings determine the priority and, in turn, the quality of service for the traffic 
passing through the UTM. After you have created a QoS profile, you can assign the QoS 
profile to firewall rules. The QoS is set individually for each service. You can change the mix 
of traffic through the WAN ports by granting some services a higher priority than others:
•     
You can accept the default priority defined by the service itself by not changing its QoS 
setting.
•     
You can change the priority to a higher or lower value than its default setting to give the 
service higher or lower priority than it otherwise would have.
For more information about QoS profiles, see 
Assign Bandwidth Profiles
When you apply a QoS profile, the WAN bandwidth does not change. You change the WAN 
bandwidth that is assigned to a service or application by applying a bandwidth profile. The 
purpose of bandwidth profiles is to provide a method for allocating and limiting traffic, thus 
allocating LAN users sufficient bandwidth while preventing them from consuming all the 
bandwidth on your WAN links.
For more information about bandwidth profiles, see 
Monitoring Tools for Traffic Management
The UTM includes several tools that can be used to monitor the traffic conditions of the 
firewall and content-filtering engine and to monitor the users’ access to the Internet and the 
types of traffic that they are allowed to have. See 
, for a description of these tools.