Whether traffic policy-based traffic reports on the USG6000 series rely on hard disks

1

Traffic policy-based traffic reports on the USG6000 series do not rely on hard disks.

Other related questions:
Query of the traffic report for the USG6000 series
For the USG6000 series, you can view details about the traffic report on the web UI as well as the traffic trend and rankings in different dimensions. 1. Choose Monitor > Report > Traffic Report. 2. Select one from the following: source address, destination address, application, application category, application subcategory, user, source zone, destination zone, or virtual system. 3. Select the report time range from the time range check box or the user-defined time range. 4. Click Search to display traffic trend and traffic rankings in different dimensions. Place the cursor at a change point on a traffic trend curve to display the time and traffic volume at this point. For details, see the USG6000 series product documentation.

Function of the traffic report for the USG6000 series
The function of the traffic report for the USG6000 series is as follows: Traffic reports display traffic trends and top rankings in various dimensions. You can effectively learn the traffic status of the current network based on traffic reports and therefore formulate the corresponding traffic measurement measures.

Configure a VLAN-based traffic policy on S series switch
Uplink and downlink definitions in traffic policies of the USG6000 series
Because traffic profiles are referenced by traffic policies, the uplink and downlink in traffic profiles are mapped to directions in traffic policies. It is determined as uplink in a traffic profile if traffic is in the same direction as the traffic policy, and determined as downlink if traffic is in the opposite direction. Before configuring a traffic profile, confirm the uplink and downlink directions based on the actual situation, for example, the traffic of an internal user accessing the external network is uplink traffic, and then map the traffic profile to a traffic policy (source address: user; destination address: external resource address). For example, to restrict the traffic from the trust zone to the untrust zone, configure traffic control as follows: �?In the traffic policy, if the source zone is the trust zone and the destination zone is the untrust zone, configure uplink traffic control in the traffic profile (same direction as the traffic policy). �?In the traffic policy, if the source zone is the untrust zone and the destination zone is the trust zone, configure downlink traffic control in the traffic profile (opposite direction to the traffic policy).

Configuring user-based traffic control on the USG6000 series
User-based traffic policies can be configured on the USG6000 series if users are authenticated on the device. If users are authenticated on other devices, user- or account-based traffic control cannot be implemented. The configuration procedure is as follows: 1. Configure a traffic profile and specify the bandwidth resources available for users. system-view [sysname] traffic-policy [sysname-policy-traffic] profile traffic_profile [sysname-policy-traffic-profile-traffic_profile] bandwidth maximum-bandwidth whole upstream 2000 2. Configure a traffic policy and enable the traffic policy to reference the configured traffic profile. [sysname-policy-traffic] rule name traffic_rule [sysname-policy-traffic-rule-traffic_rule] source-zone trust [sysname-policy-traffic-rule-traffic_rule] destination-zone untrust [sysname-policy-traffic-rule-traffic_rule] user username user1 [sysname-policy-traffic-rule-traffic_rule] action qos profile traffic_profile

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top