QoS using priority from security policies

QoS using priority from security policies Configurations implementing QoS using the priority values defined in the security policies are capable of applying bandwidth limits and guarantees. In addition to configuring traffic shaping, you may also choose to limit the bandwidth accepted by each interface. This can be useful in scenarios […]