官术网_书友最值得收藏!

Chapter 4: Taking Control of Sessions

In this chapter, you will see how you can ensure critical applications do not run out of bandwidth and less important applications are prevented from consuming too much bandwidth. You will learn how to bypass the routing table and make exceptions for certain sessions, as well as how to decrypt encrypted sessions and look within them to determine actual applications and stop threats.

In this chapter, we're going to cover the following main topics:

  • Controlling the bandwidth with quality of service policies
  • Leveraging SSL decryption to break open encrypted sessions
  • Redirecting sessions over different paths using policy-based forwarding
主站蜘蛛池模板: 牟定县| 沙湾县| 从江县| 福泉市| 岳阳市| 克什克腾旗| 福清市| 呼和浩特市| 金阳县| 措美县| 恩施市| 浮山县| 广东省| 房产| 柘城县| 大荔县| 邢台县| 禹州市| 阆中市| 临漳县| 乐安县| 南丹县| 西和县| 和顺县| 织金县| 油尖旺区| 敦化市| 仙桃市| 武宣县| 德格县| 奉节县| 区。| 三都| 承德县| 乐东| 南投市| 石泉县| 宜宾市| 郁南县| 丰原市| 黄冈市|