Solved

QOS Quality of Service over Internet by user

Posted on 2014-04-18
8
334 Views
Last Modified: 2014-05-22
Our company would like to implement QOS Quality of Service over Internet and would like to give more bandwidth/speed and internet connections user experience priority to our VIP user. We are planning to implement proxy or internet gateway between our internal network and the internet.
We understanding that although we could control our outgoing internet traffic QOS but it is basically impractical or impossible to control the incoming internet traffic. My question is whether implementing QOS over internet based on users (or group of users) is feasible or not. If it is feasible how is this done or the mechanism behind it.
Highly appreciate your professional advice and comment in advance.

Patrick Tam (System Administrator)
0
Comment
Question by:patricktam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
8 Comments
 
LVL 17

Accepted Solution

by:
James H earned 250 total points
ID: 40008626
NextGen firewalls can manage that and limit the bandwidth by a given user. I would look at Palo Alto, Checkpoint, SourceFire. You can base your rules off of AD and control traffic that way.
0
 
LVL 10

Assisted Solution

by:Schuyler Dorsey
Schuyler Dorsey earned 250 total points
ID: 40008630
Spartan is absolutely correct. I deploy a lot of Palo Altos and do this exact thing. You can also QoS based on application, a.d. groups and so on.

I often set a QoS on YouTube to limit its bandwidth consumption.
0
 

Author Comment

by:patricktam
ID: 40008855
Thanks a lot for the advice. Will do some study on Palo Altos.
0
Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

 
LVL 10

Expert Comment

by:Schuyler Dorsey
ID: 40008865
No problem. Let me know if you have any questions or need anything. I have deployed quite a few. :)
0
 

Author Comment

by:patricktam
ID: 40061097
I've requested that this question be closed as follows:

Accepted answer: 0 points for patricktam's comment #a40008855

for the following reason:

Very good insight
0
 

Author Comment

by:patricktam
ID: 40061098
Thanks for the technical hints.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question