Can traffic shaping improve the security of my network?
Hello there, just wondering, except bandwidth management, can traffic shaping be used to improve security? If yes in what ways?
KOM last edited by
Shaping can be used to ensure that internal users aren't using all the bandwidth with none left for internal users or externally-available services. That's about all I can think of.
Shaping/limiting only deals with bandwidth management. It may improve the stability of your network.