Solved

Setting Quality of Service for a Application

Posted on 2007-04-04
3
232 Views
Last Modified: 2010-03-05
Can anyone tell me how I would go about setting Quality of Service for some of the traffic on my network? I am using a Sonciwall PRO 3060 and I see the categories for QoS and where to attach them to a rule. I am just a little confused as to how this would work to give an application priority on my network - also, since this application is hosted by an external vendor, would QoS even help? Would tagging it with a priority even make a difference if the ISP does not recognize it? ANy input would be appreciated.
0
Comment
Question by:ainselyb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Accepted Solution

by:
dr_shivan earned 500 total points
ID: 18855129
QoS usually works like this. Let's take your bandwidth as a highway. Without QoS, its a free for all kinda highway with cars, trucks, bikes and etc.. all over the highway. With QoS, you can dedicate 1 lane for bikes, 1 lane for emergency lane and the other for multiple use. No matter what it is, setting up QoS would ensure your business flow would go smoothly without interruptions. A reminder, always set the minimal amount of bandwidth to the application to ensure uninterrupted workflow during peak hours.

Now that's a good question, whether setting up QoS affect applications hosted by an external vendor. You'll require some troubleshooting here. You need to find out where the bottleneck is? If its your vendor's side problem, inform and ensure that necessary steps are taken. You are the paying customer.
If its your end, then try to pinpoint the bottleneck. QoS would only work on the gateway end and not internally.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VLAN ip for Cisco switch 11 91
Enterprise level monitoring tools 2 38
Best alternatives to Solarwinds 14 102
asset tags - importance 3 70
This is a little timesaver I have been using for setting up Microsoft Small Business Server (SBS) in the simplest possible way. It may not be appropriate for every customer. However, when you get a situation where the person who owns the server is i…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question