SonicWALL Bandwidth Management

Bandwidth management is a means of allocating bandwidth resources to critical applications on a network. By controlling the amount of bandwidth to an application or user, the network administrator can reduce network traffic congestion, prevent a small number of users from consuming all available bandwidth, or allow priority applications to run smoothly.

Bandwidth management works by allocating traffic to a class based upon application type, source or destination addresses, or a combination of both. Traffic is then scheduled according to minimum and maximum bandwidth configured for each traffic type.

Bandwidth Management is controlled by the SonicWALL Internet Security Appliance on outbound traffic only. It is activated in the Ethernet tab. Configuring Bandwidth Management is handled in the Rules tab of the Access section, which allows you to manage outgoing traffic according to TCP/IP or UDP ports, services (FTP, HTTP, E-mail, SIP, etc.) and source and destination IP addresses. VPN traffic can also be managed by enabling bandwidth management on the VPN Configure tab, and then specifying the Guaranteed, Maximum, and priority of all VPN traffic through the SonicWALL.

Alert Bandwidth management cannot be configured for individual VPN Security Associations. It can only be configured for all VPN traffic.

How SonicWALL Bandwidth Management Works

SonicWALL Bandwidth Management can assign a portion of the available bandwidth and a priority to each class of network traffic. Priorities rank from 0 (zero), highest, to 7, lowest. Defining a class of traffic that has 0 bandwidth allocated to it effectively blocks the traffic unless there is no other traffic with higher priority on the network.

The packet classifier analyzes a packet when it arrives for its packet protocol, source information, and destination information. It then allocates the packet to a class queue where it waits to be processed. If the queue is full, the packet is dropped. Normal retransmission of data ensures that the packet is sent again.

Class queues are processed based on the amount of bandwidth allocated (guaranteed and maximum), and the priority assigned to the class queue. Within the class queue, packets are processed on a first-in, first-out basis. When network traffic reaches the maximum allocated to the class, packets from the next class in priority order are processed.

Typically, each class is allocated a portion of the available bandwidth, and when that limit is reached, no more traffic for that particular class is forwarded. But if there is available bandwidth on the network that is not in use by a particular class, a class can temporarily borrow bandwidth and send traffic until the maximum bandwidth allocated to the class is reached.

Spare bandwidth is allocated among the highest priority classes until no more bandwidth is available or until all of those classes have reached their maximum bandwidth. If this happens, the remainder of the bandwidth is divided among the next priority classes. This process is repeated until all of the available bandwidth is consumed

Page 164 SonicWALL Internet Security Appliance Administrator’s Guide

Page 163
Image 163
SonicWALL Internet Security Appliances manual How SonicWALL Bandwidth Management Works

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.