Fortinet white logo
Fortinet white logo

Handbook

6.0.0

Configuring traffic shaping

Configuring traffic shaping

When you configure traffic shaping for your network, you control the flow of network traffic to ensure that the traffic you want gets through, while also limiting bandwidth for less important traffic or traffic that consumes a lot of bandwidth. Traffic shapers allow you to define how traffic will flow by setting the traffic priority, bandwidth, and DSCP options.

The FortiGate offers the following types of traffic shaping configurations. You can use all traffic shaping types together in different configurations.

Traffic shaping type

Description

Shared policy

  • Bandwidth management of security policies
  • Applies a total bandwidth to all traffic using the shaper
  • Scope can be per-policy or for all policies referencing the shaper

Per-IP

  • Bandwidth management of user IP addresses
  • Allows you to apply traffic shaping to all source IP addresses in the security policy
  • Bandwidth is equally divided among the group

Application control

  • Bandwidth managed by application

You create traffic shapers and then enable them within traffic shaping policies.

Configuring traffic shaping

Configuring traffic shaping

When you configure traffic shaping for your network, you control the flow of network traffic to ensure that the traffic you want gets through, while also limiting bandwidth for less important traffic or traffic that consumes a lot of bandwidth. Traffic shapers allow you to define how traffic will flow by setting the traffic priority, bandwidth, and DSCP options.

The FortiGate offers the following types of traffic shaping configurations. You can use all traffic shaping types together in different configurations.

Traffic shaping type

Description

Shared policy

  • Bandwidth management of security policies
  • Applies a total bandwidth to all traffic using the shaper
  • Scope can be per-policy or for all policies referencing the shaper

Per-IP

  • Bandwidth management of user IP addresses
  • Allows you to apply traffic shaping to all source IP addresses in the security policy
  • Bandwidth is equally divided among the group

Application control

  • Bandwidth managed by application

You create traffic shapers and then enable them within traffic shaping policies.