官术网_书友最值得收藏!

Chapter 4: Taking Control of Sessions

In this chapter, you will see how you can ensure critical applications do not run out of bandwidth and less important applications are prevented from consuming too much bandwidth. You will learn how to bypass the routing table and make exceptions for certain sessions, as well as how to decrypt encrypted sessions and look within them to determine actual applications and stop threats.

In this chapter, we're going to cover the following main topics:

  • Controlling the bandwidth with quality of service policies
  • Leveraging SSL decryption to break open encrypted sessions
  • Redirecting sessions over different paths using policy-based forwarding
主站蜘蛛池模板: 云梦县| 桂阳县| 鄂托克旗| 博客| 固阳县| 东辽县| 木兰县| 太和县| 抚远县| 江华| 稷山县| 屏边| 武威市| 保山市| 芦溪县| 阜新| 类乌齐县| 黎城县| 龙门县| 瑞昌市| 册亨县| 石城县| 区。| 乐业县| 体育| 汕尾市| 育儿| 海城市| 商河县| 奇台县| 张家口市| 奉节县| 桂平市| 宜良县| 西藏| 焉耆| 托克逊县| 舒城县| 龙州县| 四会市| 桐梓县|